Please turn on your JavaScript for this page to function normally.
cryptographic attack
![SSH](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19110357/ssh-1400-400x200.jpg)
SSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)
Security researchers have discovered a vulnerability (CVE-2023-48795) in the SSH cryptographic network protocol that could allow an attacker to downgrade the …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/18183052/numbers-box-400x200.jpg)
Outdated cryptographic protocols put vast amounts of network traffic at risk
Cryptography is largely taken for granted – rarely evaluated or checked – a practice that could have devastating consequences for businesses as attack surfaces continue to …
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/08130506/android-logo-white-400x200.jpg)
Popular Android apps are rife with cryptographic vulnerabilities
Columbia University researchers have released Crylogger, an open source dynamic analysis tool that shows which Android apps feature cryptographic vulnerabilities. They also …
![open lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113144/open_lock-400x200.jpg)
Networking vendors patch against new cryptographic attack
Vulnerable IPSec IKE implementations used in Cisco, Huawei, ZyXel and Clavister networking devices can allow attackers to retrieve session keys and decrypt connections, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD