Bart Preneel(@bpreneel1) 's Twitter Profileg
Bart Preneel

@bpreneel1

Crypto and privacy professor
@[email protected]

ID:1098997265354625024

calendar_today22-02-2019 17:25:41

8,9K Tweets

2,4K Followers

313 Following

Daniel J. Bernstein(@hashbreaker) 's Twitter Profile Photo

Reminder for the sales team: If eprint.iacr.org/2024/555 turns out to be wrong, relentlessly hype the failure. If it turns out to be right, relentlessly hype the exponent in the approximation factor. Always remember: any attack claim short of a full break is a win-win scenario.

account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

FBI warns of massive wave of road toll SMS phishing attacks - Sergiu Gatlan
bleepingcomputer.com/news/security/…

bleepingcomputer.com/news/security/…

account_circle
CCC Updates(@chaosupdates) 's Twitter Profile Photo

Diametral gegensätzliche Positionen: EU-Staaten drehen sich bei im Kreis. Deutschland fordert Änderungen. Einigung nicht in Sicht netzpolitik.org/2024/internes-…

account_circle
EFF(@EFF) 's Twitter Profile Photo

Big Brother won today. Instead of reining in FISA surveillance, the House unmoored it even further from national security and turned its back on Americans who expect and deserve the constitutional protection of a warrant before the government spies on their online activities and…

account_circle
Andy Greenberg (@agreenberg at the other places)(@a_greenberg) 's Twitter Profile Photo

We at WIRED held off on reporting on the second ransomware gang, RansomHub, extorting Change Healthcare until it provided evidence. Now RansomHub has sent us samples of patient records and a contract that appear to have been taken from Change Healthcare. wired.com/story/change-h…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🛑 URGENT - Critical zero-day security (CVE-2024-3400) discovered in Palo Alto Networks firewalls.

Hackers are already exploiting it in the wild, enabling them 'to execute arbitrary code with root privileges.'

Details👇 thehackernews.com/2024/04/zero-d…

account_circle
The Record From Recorded Future News(@TheRecord_Media) 's Twitter Profile Photo

A Russian state-backed hacking group may have accessed emails from federal agencies as part of a larger breach of Microsoft corporate email accounts. therecord.media/cisa-microsoft…

account_circle
Lorenzo Franceschi-Bicchierai(@lorenzofb) 's Twitter Profile Photo

NEW: CISA has confirmed that Russian government hackers stole emails from several U.S. federal agencies as a result of an ongoing cyberattack at Microsoft.

CISA said the latest theft presents 'a grave and unacceptable risk' to U.S. federal agencies.

techcrunch.com/2024/04/11/us-…

account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

Intel and Lenovo servers impacted by 6-year-old BMC flaw - Bill Toulas
bleepingcomputer.com/news/security/…

bleepingcomputer.com/news/security/…

account_circle
Alec Muffett(@AlecMuffett) 's Twitter Profile Photo

2020: NSA’s Cybersecurity Perspective on Post-Quantum [Lattice] Cryptography Algorithms
alecmuffett.com/article/109616

account_circle
Runa Sandvik(@runasand) 's Twitter Profile Photo

Since Apple is now notifying even more victims of spyware, let me resurface this article about Apple's Lockdown Mode, an opt-in iOS/iPadOS/macOS feature to defend against such attacks. glitchcat.xyz/p/four-things-…

account_circle
Bart Preneel(@bpreneel1) 's Twitter Profile Photo

Big data means big breaches
via Have I Been Pwned
New breach: Nearly 6M Salvadoran citizen records w/ 947k unique email addresses leaked. Data included name, gov ID, phone, physical address and profile photo. 32% were already in @aveibeenpwned.
protos.com/hacker-doxxes-…

account_circle
Bart Preneel(@bpreneel1) 's Twitter Profile Photo

European Commission publishes recommendation on a Coordinated Implementation Roadmap for the transition to Post-Quantum Cryptography. A step in the right direction, but much more needs to be done - cryptography is always a point of tension with the MSs digital-strategy.ec.europa.eu/en/library/rec…

account_circle
Nym(@nymproject) 's Twitter Profile Photo

🔑 Using a ? Keep in mind who might know:

✅ ISPs can detect VPN usage
✅ Websites may recognize a VPN IP
✅ Employers might notice if you're on a work network

🔐 You can still be tracked. Choose the right type of VPN to avoid it:
nymvpn.com/en/blog/can-yo…

account_circle
Bart Preneel(@bpreneel1) 's Twitter Profile Photo

It was a pleasure to contribute to the Nym community call today.
The great team at Nym Nym is developing advanced privacy solutions that will make a difference. nymtech.net
Recording at youtube.com/watch?v=8IunIC…

account_circle
Bart Preneel(@bpreneel1) 's Twitter Profile Photo

Hotel door hack by Lennert Wouters Lennert from Cosic.be featured in Flemish press-after Wired report unsaflok.com
Hoe Lennert het elektronische slot van 3 miljoen hoteldeuren kraakte: “Ze moeten allemaal vervangen worden of update krijgen” nieuwsblad.be/cnt/dmf2024041…

account_circle
Ministry of Privacy(@ministryprivacy) 's Twitter Profile Photo

Dutch IT Channel - Europese privacytoezichthouders blijven bezorgd over client-side scanning dutchitchannel.nl/news/428873/eu…

account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

New Spectre v2 attack impacts Linux systems on Intel CPUs - Bill Toulas
bleepingcomputer.com/news/security/…

bleepingcomputer.com/news/security/…

account_circle