'

Ransomware gang files SEC complaint against company that refused to negotiate

Ransomware gang files SEC complaint against company that refused to negotiate

The BlackCat ransomware gang has begun abusing upcoming US Securities and Exchange Commission (SEC) cyber incident reporting rules to put pressure on organizations that refuse to negotiate ransom payments. The attackers filed an SEC complaint against one victim already, in a move that’s likely to become a common practice once the new regulations go into … Read more

Can bcrypt Passwords Be Cracked?

Can bcrypt Passwords Be Cracked?

Specops Software, an Outpost24 company, have released new research about bcrypt-passwords – and how easy (or not) they are to crack. This research follows previously released data on how long it takes attackers to brute force MD5 hashed user passwords with the help of newer hardware. bcrypt is becoming an increasingly popular way to secure passwords, … Read more

How to execute an object file: Part 4, AArch64 edition

How to execute an object file: Part 4, AArch64 edition

Translating source code written in a high-level programming language into an executable binary typically involves a series of steps, namely compiling and assembling the code into object files, and then linking those object files into the final executable. However, there are certain scenarios where it can be useful to apply an alternate approach that involves … Read more

Cloud Security Alliance announces new zero-trust security credential

Cloud Security Alliance announces new zero-trust security credential

The Cloud Security Alliance (CSA) raised the curtain Wednesday on a new credential and training materials to enable security professionals to build the knowledge they will need to implement and manage a zero-trust strategy in their organizations. “From industrial control systems to cloud computing to generative AI, the world of pervasive technology has outraced legacy … Read more