RSA

NSA will reveal its GHIDRA Reverse Engineering tool at RSA Conference

The National Security Agency (NSA) will release at the next RSA Conference a free reverse engineering framework called GHIDRA. GHIDRA…

5 years ago

Generalized RSA (GRSA) Using 2k Prime Numbers with Secure Key Generation

In this blog, we introduce a generalized algorithm over RSA which is advanced, adaptable and scalable in using the number of…

8 years ago

Talking with Azeem Aleem about the evolution of cyber threats

Azeem Aleem,  Director for the Advanced Cyber Defense Services Practice - EMEA at RSA, shares its vision on the evolution…

8 years ago

GlassRAT, the threat that remained stealth for years

A new RAT dubbed GlassRAT was discovered by RSA, it targets mainly Chinese citizens working in multinational companies in and…

8 years ago

Terracotta VPN, the Chinese VPN Service as Hacking Platform

A Chinese-language Virtual Private Network service provider dubbed Terracotta VPN offers a network of compromised servers as a stealth hacking…

9 years ago

Exploiting DNS Poisoning in Brazilian Boleto Fraud Scheme

In recent months Brazilian criminal crews have started using DNS poisoning technique to target Brazilian Boletos. Security experts at RSA…

9 years ago

Massive Boleto fraud in Brazil caused 3,75 USD billion losses

RSA Security has discovered a large-scale malware campaign, which hijacked Boleto payments causing an amount of financial losses for 3,75…

10 years ago

RSA – Malware proposal on the open web increasingly fearless

The RSA Research Team has discovered the offer of a complete collection of malware through open channels like social media…

10 years ago

NIST removes Dual_EC_DRBG algorithm from Draft Guidance suggesting to abandon it

The NIST announced it will request final public comments before Dual_EC_DRBG generator is officially removed from NIST Special Publication 800-90A,…

10 years ago

New iBanking mobile Trojan exploits Facebook platform

Security experts at ESET detected a new variant of iBanking Trojan offered in the underground that exploits Facebook platform as…

10 years ago

This website uses cookies.