article thumbnail

Quantum Threats and How to Protect Your Data

SecureWorld News

Recent progress has sparked discussions, but current capabilities are still far from threatening encryption standards like 2048-bit RSA. It is essential to understand the risks posed by quantum computing, as future advancements could compromise today's encrypted data, opening new opportunities for threat actors.

article thumbnail

Authorities released free decryptor for Phobos and 8base ransomware

Security Affairs

NoMoreRansom warns users to remove the malware first with a reliable antivirus before using the decryptor, or files may be re-encrypted repeatedly. In 2023, 8Base emerged from Phobos affiliates, using a modified encryptor and double extortion—encrypting and stealing data to force ransom payments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

However, industries reliant on shared devices—such as healthcare, retail, and manufacturing—face unique challenges. Similarly, in retail and manufacturing, delays caused by authentication procedures reduce overall efficiency. These fast-paced environments need a more flexible approach to balance security, speed, and user privacy.

article thumbnail

MY TAKE: Securing the Internet of Everything: why self-healing devices are the next frontier

The Last Watchdog

New generations of microchips can embed encryption, monitoring and control capabilities into devices at the edge at scale. And in manufacturing plants, theyre increasingly found in industrial control systems and autonomous robotics. The chipmakers, software developers and device manufacturers all have a role to play.

article thumbnail

Top Cybersecurity Trends to Watch Out For in 2025

Centraleyes

Expect to see more investments in privacy-enhancing technologies (PETs) such as encryption, anonymization, and data masking. Quantum Computings Impact on Cybersecurity Quantum computing, although still in its early stages, poses a future threat to current encryption standards.

article thumbnail

The Cyber Resilience Act (CRA)!

Adam Shostack

For example: “protect the confidentiality of stored, transmitted or otherwise processed data, personal or other, such as by encrypting relevant data at rest or in transit by state of the art mechanisms, and by using other technical means;” (Annex I, Part I, para (e)) Threats are violations of a desired property.

article thumbnail

Operation Phobos Aetor: Police dismantled 8Base ransomware gang

Security Affairs

“They allegedly used the Phobos malware to encrypt information on the networks, blocking the companies from accessing the data unless a ransom was paid and a decryption key was provided by the gang. Generation of target list of extensions and folders to encrypt. ” reported the website Nation Thailand.