RSA

NSA will reveal its GHIDRA Reverse Engineering tool at RSA Conference

The National Security Agency (NSA) will release at the next RSA Conference a free reverse engineering framework called GHIDRA. GHIDRA…

7 years ago

Generalized RSA (GRSA) Using 2k Prime Numbers with Secure Key Generation

In this blog, we introduce a generalized algorithm over RSA which is advanced, adaptable and scalable in using the number of…

9 years ago

Talking with Azeem Aleem about the evolution of cyber threats

Azeem Aleem,  Director for the Advanced Cyber Defense Services Practice - EMEA at RSA, shares its vision on the evolution…

10 years ago

GlassRAT, the threat that remained stealth for years

A new RAT dubbed GlassRAT was discovered by RSA, it targets mainly Chinese citizens working in multinational companies in and…

10 years ago

Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking…

11 years ago

Exploiting DNS Poisoning in Brazilian Boleto Fraud Scheme

In recent months Brazilian criminal crews have started using DNS poisoning technique to target Brazilian Boletos. Security experts at RSA…

11 years ago

Massive Boleto fraud in Brazil caused 3,75 USD billion losses

RSA Security has discovered a large-scale malware campaign, which hijacked Boleto payments causing an amount of financial losses for 3,75…

12 years ago

RSA – Malware proposal on the open web increasingly fearless

The RSA Research Team has discovered the offer of a complete collection of malware through open channels like social media…

12 years ago

NIST removes Dual_EC_DRBG algorithm from Draft Guidance suggesting to abandon it

The NIST announced it will request final public comments before Dual_EC_DRBG generator is officially removed from NIST Special Publication 800-90A,…

12 years ago

New iBanking mobile Trojan exploits Facebook platform

Security experts at ESET detected a new variant of iBanking Trojan offered in the underground that exploits Facebook platform as…

12 years ago

This website uses cookies.