article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousands of years old, modern cryptography took off in the 1970s with the help of the Diffie-Hellman-Merkle and RSA encryption algorithms.

article thumbnail

Types of Encryption, Methods & Use Cases

eSecurity Planet

Encryption scrambles data to make it unreadable to those without decryption keys. Proper use of encryption preserves secrecy and radically lowers the potential damage of a successful cybersecurity attack. Encryption algorithm types will provide an overview of the mathematical algorithms used to encrypt data (AES, RSA, etc.),

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine’s GUR hacked the Russian Ministry of Defense

Security Affairs

Stolen documents include: confidential documents, including orders and reports circulated among over 2000 structural units of the Russian military service. software used by the Russian Ministry of Defense to encrypt and protect its data. ” reads the press release published by Ukraine’s GUR.

Hacking 141
article thumbnail

RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia

Security Affairs

Sandworm (aka BlackEnergy and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). RansomBoggs encrypts files using AES-256 in CBC mode and appends the.chsch extension to the encrypted files.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

It foreshadowed how encryption would come to be used as a foundation for Internet commerce – by companies and criminals. Today companies face a challenge of identifying and deflecting encrypted traffic leveraged by malicious actors. The ILOVEYOU Worm (2000). This was considered a significant win for the U.S.

Hacking 140
article thumbnail

Chinese actors behind attacks on industrial enterprises and public institutions

Security Affairs

The CVE-2017-11882 flaw is a memory-corruption issue that affects all versions of Microsoft Office released between 2000 and 2017. The emails used weaponized Microsoft Word documents exploiting the CVE-2017-11882 vulnerability. The vulnerability affects the MS Office component EQNEDT32.EXE

article thumbnail

Top 20 Cybersecurity Companies You Need to Know in 2025

eSecurity Planet

IBM: Best for Advanced Encryption 13 $233.91 Fortinet Best for network security perimeter protection Headquarters: Sunnyvale, California Founded: 2000 Annual Revenue: $5.3 IBM Best for advanced encryption Headquarters: Armonk, New York Founded: 1911 Annual Revenue: $61.9 Cisco: Best for Integrated Network Security 16 $242.51