Topic: data encryption
-
Moxie Marlinspike Aims to Revolutionize AI Like He Did Messaging
Moxie Marlinspike, creator of Signal, is leading a new open-source AI project called Confer, designed to prioritize user privacy in chatbot interactions through a secure, verifiable architecture. Confer uses a trusted execution environment (TEE) and local decryption keys to ensure conversations a...
Read More » -
Futurex & Spire Solutions Bring Enterprise Encryption to Middle East & Africa
Futurex and Spire Solutions have formed a strategic alliance to enhance the availability of advanced data protection services in the Middle East and Africa, combining Futurex's encryption technologies with Spire's regional expertise. The partnership addresses the growing demand for cybersecurity ...
Read More » -
Decoding the .7ga9lt4bur7 Ransomware (Mimic/Pay2Key)
A sophisticated ransomware attack has encrypted critical business files and exfiltrated sensitive company data, including employee records and financial documents. The attackers demand payment for a decryption tool and threaten to publish the stolen data, which could lead to regulatory fines, law...
Read More » -
Unmasking the .7ga9lt4bur7 File: A Mimic/Pay2Key Ransomware Threat
A new ransomware threat uses the **.7ga9lt4bur7 extension** to encrypt files and demands payment to prevent stolen data from being published. Attackers exfiltrate sensitive information before encryption, including employee records and financial documents, risking severe fines and reputational dam...
Read More » -
New Ransomware Encrypts Files with .enc, .iv, and .salt Extensions
A new ransomware strain encrypts files with .enc, .iv, and .salt extensions and demands Bitcoin payment to prevent public release of stolen data, claiming purely financial motives. The attackers emphasize their reputation for providing decryption tools and deleting data after payment to maintain ...
Read More » -
Identify and Remove E83myizMA.README.txt Ransomware
A file named E83myizMA.README.txt indicates a ransomware infection that has encrypted your personal files, demanding payment for decryption. The attackers provide contact emails and a unique ID to calculate the ransom, request payment in USDT cryptocurrency, and offer to decrypt one file as proof...
Read More » -
Coupang Data Breach: 33.7 Million Users at Risk
A massive data breach at a major South Korean e-commerce firm compromised 33.7 million customer accounts, exposing personal details and potentially triggering fines nearing $900 million. The breach went undetected for nearly five months, with a former employee suspected of using retained access k...
Read More » -
'End-to-End Encrypted' Smart Toilet Camera Lacks Promised Security
Kohler's Dekoda smart toilet camera claims to use "end-to-end encryption" for user data, but security experts clarify it actually employs standard TLS encryption, allowing the company potential access to images on its servers. The discrepancy in privacy promises is significant because true end-to...
Read More » -
Satellites Are Leaking Your Private Data: Calls, Texts, and Secrets
Researchers found that approximately half of geostationary satellite signals are unencrypted, allowing interception of sensitive communications like phone calls and military data with basic equipment. Using affordable hardware, the team captured private data including T-Mobile customer communicat...
Read More » -
UK Renews Push for Apple to Unlock Encrypted iCloud Data
The UK government is pressuring Apple to create access to encrypted iCloud data for British users, despite previous claims that such efforts had stopped. Apple has removed its Advanced Data Protection feature from the UK market and reaffirmed its commitment to not building backdoors into its serv...
Read More » -
Retailers Are Fighting Back Against Ransomware
The retail sector is seeing a decline in data encryption during ransomware attacks, but attackers are increasingly using extortion-only tactics and demanding higher ransoms, which have doubled to a median of two million dollars. Recovery costs and times have improved, with expenses dropping by 40...
Read More » -
Microsoft: SesameOp Malware Exploits OpenAI API in Attacks
Microsoft discovered the SesameOp backdoor, which exploits the OpenAI Assistants API as a covert command-and-control channel to maintain persistent access in compromised systems. The malware evades detection by using legitimate cloud services for communication, blending malicious traffic with nor...
Read More » -
UTMStack: Open-Source UTM for Complete Threat Management
UTMStack is an open-source unified threat management platform that integrates SIEM and XDR functionalities for real-time correlation of security data to detect sophisticated, multi-stage attacks. Its architecture features pre-ingestion analysis for faster response times and is built from the grou...
Read More » -
Leaked: Which Pixel Phones Are Vulnerable to Cellebrite Hacks
A leak revealed that Google Pixel 6, 7, 8, and 9 series smartphones are vulnerable to data extraction by Cellebrite's forensic tools, while the Pixel 10 series was not mentioned. The vulnerability status was disclosed by an anonymous source who shared details from a private Cellebrite briefing on...
Read More » -
Who Else Has Access to Your Wearable's Heartbeat Data?
The proliferation of smartwatches and connected medical devices enables remote health monitoring and personalized care, but it also introduces significant security vulnerabilities due to the constant flow of sensitive data. Ambiguity in health data ownership and sharing practices raises privacy c...
Read More » -
Genetec Adds Audio to Security Centre SaaS
Genetec Inc. has integrated cloud-native audio communications into its Security Centre SaaS platform, enhancing real-time voice capabilities alongside existing video surveillance, access control, and intrusion monitoring in a unified system. This integration allows security teams to verify identi...
Read More » -
Gentlemen Ransomware Strikes Romanian Energy Provider
A ransomware attack on Romania's Oltenia Energy Complex, a major power supplier, disrupted its IT systems during the holiday period but did not compromise the national energy grid's stability. The attack is attributed to the Gentlemen ransomware group, which uses specific tactics like unique file...
Read More » -
Morphisec's Enhanced Anti-Ransomware Blocks Evasive Attacks
Morphisec's Anti-Ransomware Assurance Suite has been upgraded with new features, including Network Share Ransomware Protection, Identity Risk Visibility, and enhanced EDR Tamper Protection, to proactively address critical security gaps. The Network Share Protection blocks ransomware encryption at...
Read More » -
NAKIVO v11.1: Enhanced Disaster Recovery & MSP Tools
NAKIVO Backup & Replication v11.1 enhances data protection with new disaster recovery tools and improved management features for MSPs, supporting virtual, physical, cloud, and SaaS infrastructures. The update introduces multilingual support in five languages, real-time replication for VMware, and...
Read More » -
Bluesky's New 'Find Friends' Protects Privacy, No Spam
Bluesky's new "Find Friends" feature connects users via phone contacts but requires explicit dual consent from both parties, prioritizing privacy over growth. The system uses hashed encryption for contact data and separates the encryption key, preventing data leaks and allowing users to delete th...
Read More » -
Kohler's Smart Toilet Cameras Claim E2EE Despite Data Access
Kohler's smart toilet camera, which analyzes waste for health insights, claims to use end-to-end encryption (E2EE) for privacy, but experts challenge this as the company itself can decrypt and access the sensitive data. The company's interpretation of E2EE means data is encrypted in transit to it...
Read More » -
Camera Support Could Be the Boost Matter Needs
Matter 1.5 introduces security camera integration, enabling interoperability across brands and platforms, allowing users to add any certified camera to their preferred smart home system. Cameras will use local protocols like Matter-over-WiFi or ethernet for enhanced reliability and reduced latenc...
Read More » -
State Actor Behind SonicWall Cloud Backup Hack
A state-sponsored threat actor breached SonicWall's cloud backup service using brute-force techniques, accessing all stored backup files through an API call in a sophisticated nation-state level operation. SonicWall confirmed that core products, internal systems, and customer infrastructures were...
Read More » -
Qilin Ransomware Exposes 40+ Victims Monthly
The Qilin ransomware group has intensified global attacks, listing over 40 new victims monthly and primarily targeting the manufacturing industry, along with professional services and wholesale trade. Qilin uses a double-extortion tactic, encrypting victims' data and stealing sensitive informatio...
Read More » -
Avnet Data Breach: Stolen Data Deemed Unreadable
Avnet confirmed a data breach involving externally hosted cloud storage, where unauthorized individuals accessed a database for an internal sales application in the EMEA region, but the proprietary platform itself was not compromised. The company detected the intrusion on September 26, immediatel...
Read More » -
Google Analytics Adds Unnormalized Benchmarking Data
Google Analytics has expanded its Benchmarking feature with twenty new unnormalized metrics, such as New Users and Total Revenue, enabling businesses to compare actual performance numbers against industry peers. The system calculates fair benchmark ranges using peer group data adjusted for your a...
Read More » -
Top Infosec Products Launched This Week: September 12, 2025
Several leading vendors launched innovative security tools this week, addressing key areas such as vendor risk management, data encryption, threat detection, and AI governance. Cynomi's TPRM platform significantly reduces vendor assessment times by up to 79%, boosting operational efficiency and p...
Read More » -
Why You Should Never Share Health Data With a Chatbot
Millions are using AI chatbots for health advice, but experts warn against sharing sensitive medical data as these platforms lack the strict legal protections of traditional healthcare settings like HIPAA. AI health tools operate under company privacy policies that can change, not under enforceab...
Read More » -
Amazon's Starlink Rival Debuts With Fastest Satellite Antenna
Amazon has launched the Leo Ultra antenna for business and government customers, entering the satellite internet market as a competitor to services like Starlink, with a commercial release expected next year. The Leo Ultra is claimed to be the fastest customer terminal, offering download speeds u...
Read More » -
AI's Success Hinges on Trusted, Well-Governed Data
Many businesses are struggling to implement AI effectively due to a lack of trusted, well-governed data, which is essential for reliable and secure outcomes. A significant challenge is the complexity and security risks associated with unstructured data, with many organizations citing budget const...
Read More » -
Open Science in Cybersecurity: Real-World Impact
Scientific research environments prioritize system availability over strict confidentiality, requiring a fundamental shift from standard enterprise cybersecurity models to balance data protection with global collaboration. A key challenge is securing legacy and custom-built scientific infrastruct...
Read More » -
This Bathroom Sensor Could Revolutionize Your Health
Dekoda is a discreet, clip-on toilet sensor that uses optical technology to monitor key health indicators like hydration and gut health in real-time, requiring no complex installation. The system employs a proprietary platform with machine learning to analyze sensor data, establish personal basel...
Read More » -
FTC Orders Illuminate to Delete Student Data in Landmark Settlement
The FTC has proposed a settlement requiring Illuminate Education to delete vast amounts of student data and overhaul its security, following a 2021 breach that compromised millions of students' sensitive information. The breach occurred due to inadequate security, including using a former employe...
Read More » -
Uber Tests In-App Video Recording for Drivers in India
Uber has launched a pilot program in India introducing an in-app video recording feature for drivers to enhance safety and document incidents, addressing concerns over false passenger complaints. The feature is currently active in ten major Indian cities, with recordings being double-encrypted, s...
Read More » -
Ditch Your Router's USB Port: What Tech Pros Use Instead
Security experts strongly advise against using a router's USB port due to outdated, insecure protocols like FTP and SMBv1, which can expose your network to data breaches and unauthorized access. Using a router's USB port for file sharing often degrades network performance, causing slower internet...
Read More » -
Android's Emergency Live Video & Pixel Watch 4 Gestures Revealed
Android users in the U.S., Germany, and Mexico can now share a live, encrypted video stream with emergency dispatchers during a 911 call or text, providing crucial real-time visual information with simple user consent. Google is introducing new gesture controls, Double Pinch and Wrist Turn, for t...
Read More » -
F5 Hack Puts Thousands of Networks at Imminent Risk
A sophisticated nation-state hacking group breached F5's network, exposing proprietary source code and undisclosed vulnerability data, endangering thousands of government and corporate networks that rely on BIG-IP appliances. The attackers maintained persistent access for years, gaining control o...
Read More » -
Get Paid $30/Day to Record Calls for AI: Is It Worth It?
Neon - Money Talks is a free app that pays users for recording their phone conversations, which are then sold as anonymized data to AI companies for training language models. The app records only calls made through it, with a tiered payment system offering up to 30 cents per minute, and includes ...
Read More » -
Ransomware's New Tactic: Creating Chaos
Ransomware attacks are increasing in frequency and sophistication, with over half occurring during weekends or holidays to exploit reduced staffing, and groups now employing aggressive tactics like quadruple extortion to cause operational paralysis. The economics are shifting as fewer victims pay...
Read More » -
Top Black Friday 2025 Cybersecurity Deals to Secure
Black Friday 2025 offers significant discounts on cybersecurity tools, making enterprise-grade protection more affordable for businesses to secure their systems and data. Featured products include Passwork for password management, NordLayer for network security, NordPass for credential management...
Read More » -
SonicWall VPN Breach: Hackers Exploit Stolen Credentials
Attackers breached over 100 SonicWall SSLVPN accounts using stolen credentials, with malicious activity detected from October 4th to at least October 10th by Huntress. The intrusions utilized previously compromised valid credentials, not brute-force methods, and involved network reconnaissance an...
Read More » -
Business Leaders Demand New Paths to AI Value and Trust
Business leaders are universally adopting AI but face trust and governance barriers that limit implementation beyond experimental stages, prompting increased investment in observability solutions. Security applications are a major focus of AI investment, with most organizations using AI for compl...
Read More » -
Ring Doorbells Now Use AI Facial Recognition
Amazon's Ring has launched a "Familiar Faces" AI feature in the U.S., allowing users to label and receive customized alerts for up to fifty recognized individuals like family or delivery drivers. The feature has sparked significant privacy and security concerns from advocates and lawmakers, citin...
Read More »