This Week in Security: Office 0-day, ForcedEntry, ProtonMail, and OMIGOD

A particularly nasty 0-day was discovered in the wild, CVE-2021-40444, a flaw in how Microsoft’s MSHTML engine handled Office documents. Not all of the details are clear yet, but the …read more Continue reading This Week in Security: Office 0-day, ForcedEntry, ProtonMail, and OMIGOD

Smashing Security podcast #242: ProtonMail privacy questioned, and Banksy blunder

ProtonMail finds itself in a privacy pickle, the big problem with Facebook’s algorithmic amplification, and strange things are happening on Banksy’s website.

All this and much more is discussed in the latest edition of the award-winning “Smashing Se… Continue reading Smashing Security podcast #242: ProtonMail privacy questioned, and Banksy blunder

ProtonMail logged, shared activist’s IP address with Swiss police

By ghostadmin
ProtonMail is being criticized for sharing French activist’s IP address with Swiss authorities while claiming it does not save logs. End-to-end encrypted email hosting service provider ProtonMail is currently facing criticism after … Continue reading ProtonMail logged, shared activist’s IP address with Swiss police

ProtonMail said Swiss court order left no choice but to log activist’s IP address

ProtonMail, the encrypted email service that’s built a reputation for safeguarding user data, said it had no choice but to provide details about an activist to French authorities, amid mounting questions about the privacy protections in the popular mail client. Swiss-based ProtonMail is an end-to-end encrypted service that markets itself as a tool that encrypts messages and other user data before the company accesses it. It’s a technique that, for more than 50 million users, aims to provide additional layers of protection than are available with more common email options, such as Gmail. A French police report published on Sept. 2 appears to show that police used ProtonMail to collect the IP address, a specific number that pertains to an individual computer, of an unnamed French activist who was demonstrating against real estate gentrification in Paris. The case appears to undercut ProtonMail’s assurance that it does not log the IP […]

The post ProtonMail said Swiss court order left no choice but to log activist’s IP address appeared first on CyberScoop.

Continue reading ProtonMail said Swiss court order left no choice but to log activist’s IP address

Is using email (protonmail with Tor Browser / obfs4 bridges) to contact embassy in potentially hostile foreign countries safe?

Suppose one wants to use email (say using protonmail with Tor Browser / obfs4 bridges) to discuss sensitive matters (such as asylum seeking / embassy protection) with embassy in potentially hostile foreign countries.

To be more precise,

Continue reading Is using email (protonmail with Tor Browser / obfs4 bridges) to contact embassy in potentially hostile foreign countries safe?

Exposing Protonmail and Tutanota’s Illicit Abuse by Ransomware Gangs – A Compilation of Currently Active Ransomware-Themed Email Addresses – Part Two

Dear blog readers,
I’ve decided to continue the “Exposing Protonmail and Tutanota’s Illicit Abuse by Ransomware Gangs – A Compilation of Currently Active Ransomware-Themed Email Addresses” blog post series and offer an in-depth tactical and actionabl… Continue reading Exposing Protonmail and Tutanota’s Illicit Abuse by Ransomware Gangs – A Compilation of Currently Active Ransomware-Themed Email Addresses – Part Two

Exposing Protonmail and Tutanota’s Illicit Abuse by Ransomware Gangs – A Compilation of Currently Active Ransomware-Themed Email Addresses – Part Two

Dear blog readers,I’ve decided to continue the “Exposing Protonmail and Tutanota’s Illicit Abuse by Ransomware Gangs – A Compilation of Currently Active Ransomware-Themed Email Addresses” blog post series and offer an in-depth tactical and actionable t… Continue reading Exposing Protonmail and Tutanota’s Illicit Abuse by Ransomware Gangs – A Compilation of Currently Active Ransomware-Themed Email Addresses – Part Two

Conti ransomware gang victimized US health care, first-responder networks, FBI says

The FBI tracked at least 16 Conti ransomware attacks that struck U.S. health care and first-responder networks within the last year, the bureau said in an alert this week. That accounting only factors in attacks in the past year, and incidents that the FBI itself identified. In all, the alert said Conti has hit 400 organizations, nearly 300 of which were in the U.S. The recent first responder victims include law 9-1-1 dispatch centers, emergency medical services, law enforcement agencies and municipalities, the FBI said. The Conti gang has sought as much as $25 million to decrypt systems it locked up, according to the alert. The FBI warning comes as the Irish health care system is contending with its own Conti ransomware attack. It also comes shortly after a report that CNA Insurance paid a $40 million extortion demand — the biggest yet revealed, as extortionists continue to ratchet up […]

The post Conti ransomware gang victimized US health care, first-responder networks, FBI says appeared first on CyberScoop.

Continue reading Conti ransomware gang victimized US health care, first-responder networks, FBI says

Are emails sent from ProtonMail to Tutanota (or vice versa) ever not encrypted?

Both mail accounts, ProtonMail and Tutanota are encrypted, and as the knowledge base from ProtonMail states, ‘emails from ProtonMail users to non-ProtonMail users’ are ‘otherwise encrypted with TLS if the non-ProtonMail mail server support… Continue reading Are emails sent from ProtonMail to Tutanota (or vice versa) ever not encrypted?

Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses – Part Two

Continuing the “Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses” series including the original “Exposing Protonmail and Tutanota’s Illicit Abuse by Ransomware Gangs – A Compilation of Cu… Continue reading Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses – Part Two