Back to Feed

Tag

Cryptography

Encryption, quantum threats, protocol weaknesses

24 items tagged #cryptography

Articles

‼️ M6Plus Proof of Concept (POC) CVE-2026-4583 (Missing Replay Protection) The M6PLUS Bluetooth...

M6PLUS Bluetooth protocol lacks replay protection; POC released for CVE-2026-4583.

Data Leakage Vulnerability Patched in OpenSSL

Seven vulnerabilities patched in OpenSSL, including moderate-severity data leakage flaw.

Severe StrongBox Vulnerability Patched in Android

Android security updates patch critical DoS flaw and high-severity StrongBox keystore vulnerability.

Hong Kong Police Can Force You to Reveal Your Encryption Keys - Schneier on Security

Hong Kong police gain power to force encryption key disclosure under National Security Law.

Hong Kong Police Can Force You to Reveal Your Encryption Keys https://t.co/HPa2LFO8Tj

Hong Kong police gain legal power to compel encryption key disclosure.

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

SparkCat malware variant found on iOS and Android app stores steals crypto wallet recovery phrases.

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

REF1695 operation deploys RATs and crypto miners via ISO file lures since November 2023.

Google Sets 2029 Deadline for Quantum-Safe Cryptography

Google commits to quantum-safe cryptography migration by 2029.

Google Moves Q-Day Estimate to 2029 – Industry Experts Say the Clock Is Already Ticking

Google accelerates post-quantum cryptography migration to 2029 amid faster quantum computing progress.

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

Weekly threat roundup covers PQC migration, AI vuln hunting, Sandworm backdoors, crypto wallet scams, and phishing kits.

Google moves post-quantum encryption timeline up to 2029

Google accelerates post-quantum encryption migration timeline from 2035 to 2029.

New Torg Grabber infostealer malware targets 728 crypto wallets

Torg Grabber infostealer malware targets 728 crypto wallets and 850 browser extensions.

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

GlassWorm malware evolves with Solana dead drops, RAT, and hardware wallet phishing.

Fake OpenClaw Token Giveaway Targets GitHub Devs with Wallet-Draining Scam

Fake OpenClaw token giveaway phishing campaign targets GitHub developers to drain crypto wallets.

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

Phishing campaign targets French enterprises with fake resumes to deploy crypto miners and credential stealers.

The Danger Behind Meta’s Decision to Kill End-to-End Encrypted Instagram DMs
Critical ScreenConnect Vulnerability Exposes Machine Keys
ConnectWise patches new flaw allowing ScreenConnect hijacking
Sector Drainer Advertised as Crypto Wallet Drainer-as-a-Service With 0-Day Phantom Bypass, Hidden Drain, and Autowithdraw Capabilities
‼️ Sector Drainer Advertised as Crypto Wallet Drainer-as-a-Service With 0-Day Phantom Bypass, Hid...
LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
Attackers don’t just target wallets. They exploit every weak point in the architecture: • Front-e...
Azury Infostealer Source Code Sold for $100 With Full Operator Panel, Crypto Wallet Theft, and Keylogging Capabilities
Quantum-Resistant Data Diode Secures Sensitive Data on Edge Devices, Critical Systems