#hpke

[ follow ]
#cybersecurity
Information security
fromThe Hacker News
5 hours ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Privacy technologies
fromYahoo Tech
3 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromZDNET
3 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromThe Hacker News
5 hours ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Privacy technologies
fromYahoo Tech
3 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromZDNET
3 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Privacy professionals
fromWIRED
5 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#openclaw
DevOps
fromInfoWorld
1 week ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
1 week ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
#quantum-computing
Information security
fromComputerWeekly.com
1 week ago

Shrinking PQC timeline highlights immediate risk to data security | Computer Weekly

Google's accelerated timeline for post-quantum cryptography highlights urgent data security risks posed by quantum computers that need immediate attention.
Information security
fromTelecompetitor
2 months ago

Quantum security efforts must start now: Report

Quantum computing will break current public-key encryption; urgent deployment of post-quantum cryptography and migration strategies is required to protect long-term data confidentiality.
Science
fromArs Technica
1 week ago

New quantum-computing advances heighten threat to elliptic curve cryptosystems

Utility-scale quantum computers can break elliptic curve cryptography much more efficiently than previously thought.
Information security
fromTheregister
4 days ago

Cryptographers place $5,000 bet whether quantum will matter

Quantum computing poses a potential threat to cryptography, prompting the development of Post-Quantum Cryptography to address future vulnerabilities.
Information security
fromnews.bitcoin.com
1 week ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Information security
fromComputerWeekly.com
1 week ago

Shrinking PQC timeline highlights immediate risk to data security | Computer Weekly

Google's accelerated timeline for post-quantum cryptography highlights urgent data security risks posed by quantum computers that need immediate attention.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#vpn
Privacy professionals
fromWIRED
2 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Privacy professionals
fromWIRED
2 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
Privacy technologies
fromEngadget
1 week ago

Proton adds a secure video conferencing service called Meet to its toolbox

Proton launches Meet, a privacy-focused video-calling service, competing with Microsoft and Google while ensuring user anonymity and security.
DevOps
fromInfoQ
2 weeks ago

Panel: Security Against Modern Threats

Modern threats to software supply chains require resilience by design, integrating security into engineering workflows and empowering developers with the right tools.
#quantum-cryptography
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromThe Hacker News
5 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
#ai-privacy
Privacy technologies
fromWIRED
3 weeks ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
Information security
fromTelecompetitor
1 week ago

Quantum network supports high-security QKD: How it works, why it matters

Quantum technology presents both risks and benefits for network security, particularly through quantum key distribution (QKD) as a solution to encryption vulnerabilities.
fromCointelegraph
6 months ago

Applied MEV protection via Shutter's threshold encryption

MEV is especially notorious on Ethereum, where it continues to be extracted at a rate equivalent to 11% of block rewards. Data shows that nearly $300,000 was lost in sandwich attacks in September. This reveals that MEV is a recurring hidden fee, not a minor inefficiency, hitting large trades hardest in volatile markets.
Cryptocurrency
Information security
fromSecurityWeek
1 week ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Miscellaneous
fromZDNET
1 month ago

Rolling out AI? 5 security tactics your business can't get wrong - and why

AI's useful capabilities also make it exploitable, requiring professionals to balance security with competitive implementation through knowledge sharing, partnerships, and automation.
fromBleepingComputer
1 week ago

New RoadK1ll WebSocket implant used to pivot on breached networks

"Its sole function is to convert a single compromised machine into a controllable relay point, an access amplifier, through which an operator can pivot to internal systems, services, and network segments that would otherwise be unreachable from outside the perimeter."
Information security
Privacy technologies
fromTech Times
1 month ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Information security
fromTheregister
2 weeks ago

Security boffins harvest bumper crop of API keys from web

Almost 2,000 API credentials were found exposed on 10,000 webpages, posing significant security risks to organizations and critical infrastructure.
fromComputerworld
3 weeks ago

Chrome encryption bypass discovered: New malware steals passwords and cookies

The bypass requires neither privilege escalation nor code injection, making it a stealthier approach compared to alternative ABE bypass methods.
Information security
Miscellaneous
fromBitcoin Magazine
1 month ago

The Core Issue: Libsecp256k1, Bitcoin's Cryptographic Heart

Libsecp256k1 evolved from a hobby project into essential consensus-critical software protecting Bitcoin's multi-trillion dollar network through secure elliptic curve cryptography implementation.
Higher education
fromNature
2 months ago

Six steps to protect researchers' digital security

Academic freedom and researchers' safety are deteriorating globally due to harassment, political interference, legal threats, and underreporting.
fromTheregister
2 months ago

Matrix messaging gaining ground in government IT

FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Software development
Gadgets
fromEngadget
2 months ago

How much do VPNs cost?

Compare VPNs using the same subscription duration and tier to avoid misleading advertised monthly rates and identify fair value.
Information security
fromTechzine Global
3 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
fromEntrepreneur
2 months ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
Information security
fromArs Technica
3 weeks ago

Researchers disclose vulnerabilities in IP KVMs from four manufacturers

IP KVMs pose severe network security risks because compromising them enables attackers to bypass system security and access remotely managed servers.
Gadgets
fromZDNET
2 months ago

Your Bluetooth earphones could be vulnerable to attack - here's what to do next

WhisperPair vulnerabilities in improper Fast Pair implementations allow attackers to hijack, control, and eavesdrop on Bluetooth audio devices; patches exist but many devices remain vulnerable.
#credential-theft
fromSecurityWeek
4 weeks ago
Information security

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
Information security
fromTheregister
1 month ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
Information security
fromSecurityWeek
4 weeks ago

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
Information security
fromTheregister
1 month ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
Information security
fromSecurityWeek
4 weeks ago

Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

HPE released patches for a critical vulnerability in Aruba Networking AOS-CX switches that allows remote, unauthenticated attackers to reset administrator passwords and gain full system control.
#whatsapp
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

#post-quantum-cryptography
Information security
fromInfoQ
1 month ago

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Cloudflare implemented hybrid ML-KEM encryption in IPsec to meet NIST's 2030 quantum-resistant deadline without requiring hardware upgrades or complex configurations.
Information security
fromThe Hacker News
1 month ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Information security
fromInfoQ
1 month ago

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Cloudflare implemented hybrid ML-KEM encryption in IPsec to meet NIST's 2030 quantum-resistant deadline without requiring hardware upgrades or complex configurations.
Information security
fromThe Hacker News
1 month ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
fromEngadget
2 months ago

Are VPNs really safe? The security factors to consider before using one

can conceal online activity that local or national governments deem illegal - up to and including, say, circumventing ID checks for age verification. Consumers aren't helped by the sheer amount of duds sold in app stores right next to the best VPNs, especially when they're purposefully exploiting moments that have people rushing to shore up their online anonymity. If you've almost decided to start using a VPN, you may be wondering if the services you're looking at are actually safe.
Privacy technologies
#end-to-end-encryption
fromZDNET
2 months ago
Privacy technologies

Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats

fromZDNET
2 months ago
Privacy technologies

Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats

Information security
fromSecurityWeek
1 month ago

Google Working Towards Quantum-Safe Chrome HTTPS Certificates

Google plans to enhance Chrome's HTTPS certificate resilience against quantum computers using Merkle Tree Certificates that reduce bandwidth while maintaining security and transparency.
fromZDNET
2 months ago

Your default home Wi-Fi setup isn't nearly as private as it should be - 6 free ways to improve it

We live in a time where privacy is something we actually have to work to enjoy. Achieving a level of privacy we once had takes work, and you need to start thinking beyond a single desktop, laptop, tablet, or phone -- all the way to your LAN. Before I scare you all off, understand that this starts on the desktop and extends to the LAN. By beefing up both your devices and your network, you'll achieve a level of privacy that you wouldn't otherwise have.
Privacy technologies
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
#password-security
fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Firewalls can fail, passwords can be stolen, but strong encryption remains your last line of defense. InToday's digital world, protect sensitive personal details is more critical and important than ever. The AES algorithm (Advanced Encryption Standard) algorithm is one of the most trusted and widely used way or method for securing data against unauthorized access and frauded. Advanced Encryption Standard supports different levels like 128-bit, 192-bit, and 256-bit encryption, providing strong security for personal data and more.
Information security
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
#bitlocker
fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromZDNET
2 months ago
Information security

Microsoft may give your encryption key to law enforcement upon valid request - here's how to keep it safe

fromComputerworld
2 months ago
Information security

Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns

fromZDNET
2 months ago
Information security

How to keep your PC encryption key safe - from Microsoft and the FBI

fromZDNET
2 months ago
Information security

Microsoft may give your encryption key to law enforcement upon valid request - here's how to keep it safe

fromComputerworld
2 months ago
Information security

Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns

fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Information security
fromTheregister
1 month ago

Password managers don't protect secrets if pwned

Bitwarden, LastPass, and Dashlane can fail to protect credentials under server-compromise scenarios, allowing disclosure or alteration of user passwords.
fromZDNET
1 month ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
Information security
fromTechzine Global
2 months ago

Secure networking: the foundation for the AI era

Organizations must modernize and simplify networks, strengthen security, and automate to maintain resilience against increasingly sophisticated, fast-moving cyberattacks and AI-driven pressure.
Information security
fromThe Hacker News
2 months ago

[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl

Agentic AI that can execute code expands attack surface through Machine Control Protocols; securing MCPs, APIs, and shadow keys is essential to prevent automation-driven breaches.
Information security
fromEmptywheel
2 months ago

"Tor Stinks" ... because It Requires Manual (Digital) Tails

Tor resists systematic de-anonymization; NSA can de-anonymize only a very small fraction manually and cannot reliably combine Tor attacks with passive SIGINT.
Information security
fromCointelegraph
1 month ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Information security
fromTechRepublic
7 months ago

This 'Lethal Trifecta' Can Trick AI Browsers Into Stealing Your Data

AI-enabled browsers that combine web access, account access, and external communication can be exploited to steal accounts via hidden instructions in webpages.
fromTheregister
2 months ago

ATM flashes a port or two for the enterprising hacker

When we talk about installation, we're usually referring to Windows 2000 turning up on a ticket machine, Windows 7 showing its face where it isn't welcome, or even Windows 10 having a moment on an information display. Today's bork, however, is a bit different. Spied by an eagle-eyed Register reader, this installation is all about the hardware: a router connected to an ATM to provide connectivity.
Information security
[ Load more ]