Aggregator
CVE-2024-40620 | Rockwell Automation Pavilion8 5.20 missing encryption (icsa-24-226-04)
CVE-2024-7507 | Rockwell Automation Compact GuardLogix 5380 prior 34.014/35.013/36.011 PCCC Message denial of service (icsa-24-226-09)
CVE-2024-7513 | Rockwell Automation FactoryTalk View Site Edition 13.0 permission assignment (icsa-24-226-06)
CVE-2024-40619 | Rockwell Automation ControlLogix 5580/GuardLogix 5580 34.011 unusual condition (icsa-24-226-03)
CVE-2024-6078 | Rockwell Automation DataMosaix Private Cloud prior 7.09 Cookie improper authentication (icsa-24-226-05)
CVE-2023-31366 | AMD μProf Tool prior 3.4.494 denial of service
CVE-2024-37015 | Ada Web Server 20.0 SSL/TLS certificate validation
Elon Musk claims that a DDoS attack caused problems with the livestream interview with Donald Trump
CVE-2024-41614 | Symphony CMS up to 2.7.10 Comment Component cross site scripting
CVE-2024-41613 | Symphony CMS 2.7.10 Note cross site scripting
CVE-2024-6619 | Ocean Data Systems AVEVA Reports for Operations 2023 permission assignment (icsa-24-226-08)
CVE-2023-31356 | AMD EPYC 7003 Processors/EPYC 9004 Processors SEV Firmware memory corruption
Windows 10 KB5041580 update released with 14 fixes, security updates
Operation Uncle Scam – AI-Powered Phishing Attack Steals Microsoft Dynamics 365 Credentials
Security researchers at Perception Point have uncovered a sophisticated phishing campaign, dubbed “Uncle Scam.” In this AI-powered campaign, threat actors impersonate U.S. government agencies to send fraudulent tender invitations to numerous American enterprises. The attackers employ advanced techniques, including interactive kits and large language models (LLMs), to create highly convincing phishing emails. The phishing operation […]
The post Operation Uncle Scam – AI-Powered Phishing Attack Steals Microsoft Dynamics 365 Credentials appeared first on Cyber Security News.
Private AI For All: Our End-To-End Approach to AI Privacy on Android
Randall Munroe’s XKCD ‘Meteor Shower PSA’
via the comic & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Meteor Shower PSA’ appeared first on Security Boulevard.
Biden-Harris Campaign, Trump Operative Stone Also Target of Hackers
Hackers, possibly from Iran, sent phishing emails to the Biden-Harris campaign and Trump operative Roger Stone hoping to gain access into the systems of both presidential campaigns. It worked with Stone, who compromised email account opened the door to the Trump campaign infrastructure.
The post Biden-Harris Campaign, Trump Operative Stone Also Target of Hackers appeared first on Security Boulevard.
4 Executive Travel Vulnerabilities You May be Overlooking
Learn how to minimize the impact of vulnerabilities like social media use, private jet tracking, and more As an executive protection (EP) professional, you’re likely experiencing a rise in physical threats against your principal(s). You’re not alone. According to Ontic’s State of Protective Intelligence Report, 8 out of 9 EPs say their companies are experiencing…
The post 4 Executive Travel Vulnerabilities You May be Overlooking appeared first on Ontic.
The post 4 Executive Travel Vulnerabilities You May be Overlooking appeared first on Security Boulevard.
The Post-Quantum Cryptography Algorithms are finalized! Now what?
The Post-Quantum Cryptography Algorithms are finalized! Now what?
josh.pearson@t…
Tue, 08/13/2024 - 16:11
With the recent release from NIST about their final, published Post-Quantum Cryptography (PQC) algorithms (ML-KEM (formerly Kyber), ML-DSA (formerly Dilithium), SLH-DSA (formerly SPHINCS+) and with it the imminent end-of-life of the encryption foundations we have relied upon for decades, many organizations are left wondering exactly what they should do next.
Encryption Data Security Todd Moore | Vice President, Data Security Products, Thales
More About This Author >
With the recent release from NIST about their final, published Post-Quantum Cryptography (PQC) algorithms (ML-KEM (formerly Kyber), ML-DSA (formerly Dilithium), SLH-DSA (formerly SPHINCS+) and with it the imminent end-of-life of the encryption foundations we have relied upon for decades, many organizations are left wondering exactly what they should do next.
To help our customers unravel this massive undertaking, Thales has been preparing for this moment for well over a decade. In this time, while learning to harness the power of Quantum computers, we recognize and are preparing for the new risks and dangers to guard against, particularly when it comes to data and identities, the core of our global digital society.
With great research, comes great responsibilities…Thales researchers are playing a central role in the quantum revolution and are now developing the next generation of quantum solutions that will shape the Post-Quantum world. Broadly speaking this research can be grouped into 3 different categories: 1) quantum sensors, 2) quantum communications, and 3) post-quantum cryptography.
1) Quantum SensorsSensors have long been used but most recently they can be found in devices such as smart homes, self-driving cars, medical devices, etc. They also play a vital role in our defense and security systems, for land, sea, and air. New Quantum sensors, based off the principles of Quantum mechanics and principles, have been found to augment and expand the human senses so that we may better understand the environment around us. The principles of Quantum physics allow for devices to understand data inputs much faster and compute multiple different types of logic at the same time ensuring more efficient and more accurate sensing capabilities. From Superconducting devices to solid-state sensors to cold atom technology, Thales is at the forefront of imagining and designing new Quantum sensors that will impact everything from the medical world to military applications.
2) Quantum CommunicationsQuantum technologies are set to directly impact the speed and scale of digital communications. By harnessing the quantum properties of light, quantum technologies will make it possible to secure communications with Quantum-safe cryptographic keys across large-scale networks and the Internet of the future. Thales is pioneering the design of these future network architectures, both for ground-based network elements and for the space-based components needed to share cryptographic keys over long distances. To put this into practice, Thales is part of EuroQCI, a large-scale European project working to deploy a quantum secured Europe-wide network for sharing sensitive data.
3) Post-Quantum CryptographyTo assist our customers with their transformation to PQC, Thales is a participant in NIST’s National Cybersecurity Center of Excellence (NCCoE)’s Migration to PQC Project. By submitting our products to the NCCoE lab, Thales is helping to develop practices that will ease migration from current algorithms to replacement post-quantum algorithms, while also providing platforms for PQC interoperability testing. Of critical importance is crypto agility, which allows our customers to deploy flexible, upgradeable solutions that support classic crypto, emerging quantum-resistant crypto standards, and approved hybrid techniques.
Simultaneously, Thales is actively involved in Post-Quantum Cryptography (PQC) Research & Development, as well as participating in various standardization efforts with many industry regulatory bodies. The company is engaged in multiple research projects in the United States, France (RISQ) and across Europe, and is also financing numerous doctoral theses on the subject. Thales also co-authored the Falcon digital signature algorithm which was selected by NIST in 2022 as a candidate for PQC standardization. Additionally, Thales sits on several PQC Consortiums in North America and Europe, including RESQUE, the Post-Quantum Cryptography Alliance, PKI Consortium, CFDIR Quantum-Readiness Working Group, among others.
Strengthening TrustWith crypto agility implemented across its product lines, Thales has also actively prototyped NIST PQC algorithm finalists within its products and is now focusing on the selected PQC algorithms. With Quantum-safe network encryption solutions and Hardware Security Modules that are already available for purchase, with starter kits ready now for testing the impacts across applications and devices. In addition to the quantum resistant algorithms, Thales High Speed Encryptors are compatible with ESTI standard QKD devices and support QRNG, while our Hardware Security Modules have several partner integrations that can facilitate these additional capabilities. Thales is also accelerating practical Proof of Concepts with customers and partners, notably for hybrid algorithms in digital signatures and key exchange mechanisms.
Whether you are looking to strengthen and future-proof digital identities, such as with government electronic documents or solutions that facilitate, manage, and provide security for cellular connectivity with products such as SIM cards / eSIM, which are integral to the Internet of Things, or if you are needing a cybersecurity solution that will protect your data and applications – Thales is dedicated to supporting our customers today to protect against “Harvest Now, Decrypt Later (HNDL)” attacks, right through the Quantum revolution.
After all, as stewards of trust, Thales is right there alongside you as you evaluate risks and anticipate threats in a Post-Quantum era.
Explore how Thales can help your organization with Post-Quantum Cryptography Solutions.
Schema studio THALES BLOG The Post-Quantum Cryptography Algorithms are finalized! Now what?August 13, 2024
The post The Post-Quantum Cryptography Algorithms are finalized! Now what? appeared first on Security Boulevard.