Remove Cryptocurrency Remove Encryption Remove Manufacturing
article thumbnail

Top Cybersecurity Trends to Watch Out For in 2025

Centraleyes

Expect to see more investments in privacy-enhancing technologies (PETs) such as encryption, anonymization, and data masking. Quantum Computings Impact on Cybersecurity Quantum computing, although still in its early stages, poses a future threat to current encryption standards.

article thumbnail

Medusa ransomware hit over 300 critical infrastructure organizations until February 2025

Security Affairs

As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing.” The attackers are also spotted manually disabling and encrypting virtual machines.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Triada strikes back

SecureList

Specifically, they can modify cryptocurrency wallet addresses during transfer attempts, replace links in browsers, send arbitrary text messages and intercept replies, and steal login credentials for messaging and social media apps. Neither payload is encrypted. Package name check Based on the package name, binder. services class.

article thumbnail

Zanubis in motion: Tracing the active evolution of the Android banking malware

SecureList

The threat actors behind Zanubis continue to refine its code adding features, switching between encryption algorithms, shifting targets, and tweaking social engineering techniques to accelerate infection rates. Communication with the C2 API was encrypted with RC4 using a hardcoded key and Base64-encoded.

Banking 101
article thumbnail

Quantum Computing's Impact on Cybersecurity and the Road Ahead

SecureWorld News

While quantum power poses risks to traditional encryption, it also opens the door to revolutionary cybersecurity advancements that could redefine how we protect data, detect threats, and secure critical infrastructure.

article thumbnail

Operation SyncHole: Lazarus APT goes back to the well

SecureList

The campaign, dubbed “Operation SyncHole”, has impacted at least six organizations in South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, and we are confident that many more companies have actually been compromised. All traffic is encrypted with the generated AES key.

Malware 140
article thumbnail

IT threat evolution Q3 2024

SecureList

The threat actor specializes in encrypting and then deleting its targets’ data, which suggests that the group’s primary objective is to cause as much damage as possible. Head Mare post on X Head Mare has targeted a variety of industries, including government, energy, transportation, manufacturing and entertainment.