How to allow users to securely use their private key to decrypt data in the browser [duplicate]

I’m working on an application where encrypted data can be stored on the server. Users can do this by obtaining public keys from the server, and use them to encrypt data locally before sending it to the server. This encryption feature provi… Continue reading How to allow users to securely use their private key to decrypt data in the browser [duplicate]

Digital artists targeted in RedLine infostealer campaign

In this post, we’ll look at a campaign, that targeted multiple 3D or digital artists using NFT, with malware named RedLine. This malware is a so called “infostealer” or “information stealer” that is capable of extracting sensitive data from your machi… Continue reading Digital artists targeted in RedLine infostealer campaign

Satan ransomware rebrands as 5ss5c ransomware

The cybercrime group that brought us Satan, DBGer and Lucky ransomware and perhaps Iron ransomware, has now come up with a new version or rebranding named “5ss5c”.
In a previous blog post, Satan ransomware adds EternalBlue exploit, I described ho… Continue reading Satan ransomware rebrands as 5ss5c ransomware

Analysing a massive Office 365 phishing campaign

Last week, a friend of mine reached out with a query: a contact in his address book had sent him a suspicious email. As it turns out, it was. In this blog post, we’ll have a quick look at an Office 365 phishing campaign, which turned out to be massive…. Continue reading Analysing a massive Office 365 phishing campaign