6 links
tagged with all of: cybersecurity + encryption
Click any tag below to further narrow down your results
Links
PCI DSS 4.0.1 emphasizes industry collaboration in cybersecurity, focusing on outcomes rather than methods. The update strengthens encryption requirements and highlights the need for continuous monitoring of security measures. This version serves as a valuable standard for improving cybersecurity within the payment card industry.
Lattica has unveiled a new platform utilizing fully homomorphic encryption (FHE) to allow AI models to process encrypted data without exposure. The company secured $3.25 million in pre-seed funding to enhance the security and privacy of AI applications. This innovative approach enables AI providers to host and manage models while ensuring that sensitive data remains protected.
As quantum computing advances, traditional encryption methods face potential obsolescence, prompting a dilemma for organizations on whether to invest in quantum-resistant algorithms. Amidst industry hesitance, the Signal Protocol team has successfully updated its encryption to enhance quantum resistance, showcasing a significant engineering achievement. This development marks a notable step toward securing private communications against future quantum threats.
Harvest now, decrypt later (HNDL) attacks represent a significant risk as attackers collect encrypted data today, anticipating the future capabilities of quantum computers to break the encryption. This stealthy approach allows them to exploit sensitive information once quantum computing becomes advanced enough to decrypt previously captured data. Organizations must proactively adopt post-quantum cryptographic measures to safeguard against this looming threat.
Research reveals significant security flaws in the OPC UA protocol, commonly used in industrial settings. These vulnerabilities could allow attackers to exploit configurations, leading to severe disruptions in operational technology environments. Recommendations for patching and securing implementations are provided.
A significant ransomware campaign has exploited over 1,200 unique AWS access keys to encrypt files in S3 storage buckets, leaving ransom notes demanding payment in Bitcoin. The attackers are using AWS's own encryption features to hide their activities, making it difficult for victims to detect breaches or recover their data.