Back to Feed

Tag

Cryptography

Encryption, quantum threats, protocol weaknesses

48 items tagged #cryptography

Articles

Hitachi Energy GMS600

Hitachi Energy GMS600 versions 1.3.0–1.3.1 vulnerable to OpenSSL timing attack (CVE-2022-4304)

RetoSwap has been drained of 7,000 XMR ($2.7 Million) after a flaw in the Haveno protocol. https:...

RetoSwap loses 7,000 XMR ($2.7M) due to Haveno protocol vulnerability.

Microsoft acknowledges the YellowKey BitLocker bypass vulnerability and releases mitigations htt...

Microsoft acknowledges YellowKey BitLocker bypass vulnerability and releases mitigations.

‼️OHNO allegedly breached exposing Telegram user IDs, crypto wallets, and private keys from the o...

OHNO crypto trading platform allegedly breached, exposing Telegram IDs, wallets, and private keys.

State of ransomware in 2026

Kaspersky reports 2026 ransomware trends: EDR killers rising, shift to encryptionless extortion, post-quantum crypto

TrickMo Android banker adopts TON blockchain for covert comms

TrickMo Android banker adopts TON blockchain for covert C2 communications in European campaigns.

MAXHUB Pivot Client Application

MAXHUB Pivot client application CVE-2026-6411 uses hardcoded AES key allowing email disclosure

ABB B&R Automation Studio

ABB B&R Automation Studio certificate validation flaw allows server spoofing.

When a Screensaver Cracked the Internet's Trust Layer: Inside the DigiCert Hack https://t.co/LCp...

DigiCert breach compromised certificate issuance infrastructure via screensaver exploit.

Telegram Mini Apps abused for crypto scams, Android malware delivery

Telegram Mini Apps abused in large-scale FEMITBOT operation for crypto scams and Android malware distribution.

🚨 Litecoin has confirmed a zero-day bug caused a DoS attack that disrupted major mining pools. N...

Litecoin zero-day bug causes DoS attack on mining pools via invalid MWEB transactions.

⚠️ The history of cyberwar just got rewritten. 🔬 @LabsSentinel has discovered fast16 — a state-g...

LabsSentinel discovers fast16, a state-grade sabotage framework from 2005, predating Stuxnet by five years.

Kyber ransomware gang toys with post-quantum encryption on Windows

Kyber ransomware targets Windows and VMware ESXi with post-quantum encryption claims.

Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

Microsoft patches critical ASP.NET Core privilege escalation bug CVE-2026-40372 with CVSS 9.1

$290 Million Kelp DAO Crypto Heist Blamed on North Korea

Lazarus Group blamed for $290M Kelp DAO crypto heist via LayerZero DVN compromise.

KelpDAO suffers $290 million heist tied to Lazarus hackers

Lazarus Group steals $290M from KelpDAO DeFi protocol via compromised cross-chain verification.

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Sanctioned Grinex cryptocurrency exchange loses $13.74M in hack, blames Western intelligence agencies.

The Race to Quantum-Proof the Internet Has Already Begun

Quantum computing threat spurs urgent global migration to post-quantum cryptography standards.

wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update to 5.9.1 Now

Critical wolfSSL flaw CVE-2026-5194 allows certificate forgery across 5B devices; patch to 5.9.1 released.

Critical flaw in wolfSSL library enables forged certificate use

Critical wolfSSL cryptographic validation flaw allows forged certificate acceptance via weak ECDSA signatures.

‼️ A threat actor is selling a sophisticated phishing suite designed to mimic Ledger cryptocurren...

Threat actor sells phishing suite mimicking Ledger wallet to steal crypto credentials.

Why is the timeline to quantum-proof everything constantly shrinking?

Google accelerates quantum-resistant encryption migration as research suggests quantum computers could break classical

‼️ M6Plus Proof of Concept (POC) CVE-2026-4583 (Missing Replay Protection) The M6PLUS Bluetooth...

M6PLUS Bluetooth protocol lacks replay protection; POC released for CVE-2026-4583.

Data Leakage Vulnerability Patched in OpenSSL

Seven vulnerabilities patched in OpenSSL, including moderate-severity data leakage flaw.

Severe StrongBox Vulnerability Patched in Android

Android security updates patch critical DoS flaw and high-severity StrongBox keystore vulnerability.

Hong Kong Police Can Force You to Reveal Your Encryption Keys - Schneier on Security

Hong Kong police gain power to force encryption key disclosure under National Security Law.

Hong Kong Police Can Force You to Reveal Your Encryption Keys https://t.co/HPa2LFO8Tj

Hong Kong police gain legal power to compel encryption key disclosure.

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

SparkCat malware variant found on iOS and Android app stores steals crypto wallet recovery phrases.

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

REF1695 operation deploys RATs and crypto miners via ISO file lures since November 2023.

Google Sets 2029 Deadline for Quantum-Safe Cryptography

Google commits to quantum-safe cryptography migration by 2029.

Google Moves Q-Day Estimate to 2029 – Industry Experts Say the Clock Is Already Ticking

Google accelerates post-quantum cryptography migration to 2029 amid faster quantum computing progress.

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

Weekly threat roundup covers PQC migration, AI vuln hunting, Sandworm backdoors, crypto wallet scams, and phishing kits.

Google moves post-quantum encryption timeline up to 2029

Google accelerates post-quantum encryption migration timeline from 2035 to 2029.

New Torg Grabber infostealer malware targets 728 crypto wallets

Torg Grabber infostealer malware targets 728 crypto wallets and 850 browser extensions.

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

GlassWorm malware evolves with Solana dead drops, RAT, and hardware wallet phishing.

Fake OpenClaw Token Giveaway Targets GitHub Devs with Wallet-Draining Scam

Fake OpenClaw token giveaway phishing campaign targets GitHub developers to drain crypto wallets.

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

Phishing campaign targets French enterprises with fake resumes to deploy crypto miners and credential stealers.

The Danger Behind Meta’s Decision to Kill End-to-End Encrypted Instagram DMs
Critical ScreenConnect Vulnerability Exposes Machine Keys
ConnectWise patches new flaw allowing ScreenConnect hijacking
Sector Drainer Advertised as Crypto Wallet Drainer-as-a-Service With 0-Day Phantom Bypass, Hidden Drain, and Autowithdraw Capabilities
‼️ Sector Drainer Advertised as Crypto Wallet Drainer-as-a-Service With 0-Day Phantom Bypass, Hid...
LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
Attackers don’t just target wallets. They exploit every weak point in the architecture: • Front-e...
Azury Infostealer Source Code Sold for $100 With Full Operator Panel, Crypto Wallet Theft, and Keylogging Capabilities
Quantum-Resistant Data Diode Secures Sensitive Data on Edge Devices, Critical Systems

Events