Tag: Hash
-
Kesakode: A Remote Hash Lookup Service To Identify Malware Samples
Today marks a significant milestone for Malcat users with the release of version 0.9.6, introducing Kesakode, a remote hash lookup service. …
-
SLAM Attack Gets Root Password Hash in 30 Seconds
Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to …
-
Hackers to NVIDIA: Remove mining cap or we leak hardware data
The Lapsus$ data extortion group has released what they claim to be data stolen from the Nvidia GPU designer. The cache is an archive that …
-
Ransomware Hackers Demands Nvidia Lite Lift Hash Rate Restriction
Hacker group Lapsus$ obtained access to Nvidia’s servers for a week and took 1TB of driver and firmware files. The group is seeking for the …
-
NVIDIA 170HX Crypto Mining Processor Card with 164 MH/s Hash Rate Spotted
Early this year, NVIDIA announced Turing based Crypto Mining Processor (CMP) cards that ranged in speed from 26MH/s to an astonishing …
-
AMD Radeon RX 6700 XT’s Alleged Ethereum Crypto Mining Hash Rate Revealed
When it comes to Ethereum mining, NVIDIA has been getting a bulk of the attention in recent weeks for all the wrong reasons. Its newly …
-
Weak Hash Exposes Millions of Passwords on Cannabis Site
A community website for cannabis growers has unwittingly exposed over 3.4 million user records, including information on individuals from …
-
A Needle in a Hash Stack: Why It’s Time to Move Beyond Threat Intelligence
Many of us read the recent news stories and advisories about APT29 (a.k.a. Cozy Bear)’s targeted assault on COVID-19 vaccine developers …
-
Git Transitioning Away from the Aging SHA-1 Hash
The developers of ubiquitous git software version control system have announced they are now beginning the transition to move away from the …
-
Hash snag: Security shamans shame SHA-1 standard, confirm crucial collisions citing circa $45k chip cost
SHA-1 stands for Secure Hash Algorithm but version 1, developed in 1995, isn’t secure at all. It has been vulnerable in theory since 2004 …
-
Blockchain for Logistics: Considerations for Successful Implementation
Almost all major manufacturing companies have a global footprint and continuously move materials from one geographical region to another. …
-
Why Time Stamps for Code Signing Certificates Matters
Why timestamping matters If you haven’t timestamped the signature while using code signing certificate for your software the signature will …
●●●