Afghanistan, Turkmenistan and Tajikistan victims experienced the highest share of banking Trojans

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

Microsoft rolls out expanded logging six months after Chinese breach

February 21, 2024 0 Comments 0 tags

When hackers working on behalf of the Chinese government stole a Microsoft signing key and used it to breach the email accounts of senior U.S. government officials last year, that

CISA emergency directive tells agencies to fix credentials after Microsoft breach

April 11, 2024 0 Comments 0 tags

The Cybersecurity and Infrastructure Security Agency published an emergency directive Thursday in response to a Russian intelligence-linked hacking campaign that breached Microsoft, telling affected federal civilian agencies whose emails were

New Lattice Cryptanalytic Technique

April 15, 2024 0 Comments 0 tags

A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms, since many of them base their