Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour

A late-stage candidate encryption algorithm that was meant to withstand decryption by powerful quantum computers in the future has been trivially cracked by using a computer running Intel Xeon CPU in an hour’s time.
The algorithm in question is SIKE —… Continue reading Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour

Posted in Uncategorized

Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike

Researchers have disclosed a new offensive framework referred to as Manjusaka that they call is a “Chinese sibling of Sliver and Cobalt Strike.”
“A fully functional version of the command-and-control (C2), written in Golang with a User Interface in Si… Continue reading Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike

Posted in Uncategorized

New ‘ParseThru’ Parameter Smuggling Vulnerability Affects Golang-based Applications

Security researchers have discovered a new vulnerability called ParseThru affecting Golang-based applications that could be abused to gain unauthorized access to cloud-based applications.
“The newly discovered vulnerability allows a threat actor to by… Continue reading New ‘ParseThru’ Parameter Smuggling Vulnerability Affects Golang-based Applications

Posted in Uncategorized

Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers

The operators of the Gootkit access-as-a-service (AaaS) malware have resurfaced with updated techniques to compromise unsuspecting victims.
“In the past, Gootkit used freeware installers to mask malicious files; now it uses legal documents to trick us… Continue reading Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers

Posted in Uncategorized