A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant ...
With growing focus on the existential threat quantum computing poses to some of the most crucial and widely used forms of ...
IntroductionIn February 2022, BlackBasta emerged as a successor to Conti ransomware and quickly rose to prominence. BlackBasta was operational for three years until February 2025 when their internal ...
Abstract: In this paper, Cloud databases offer scalability and convenience, cloud database introduce risks regarding data privacy, unauthorized access and data tampering. In response to the present ...
Scientists have unveiled a new approach to ultra-secure communication that could make quantum encryption simpler and more efficient than ever before. By harnessing a 19th-century optics phenomenon ...
The goal of this project is to provide simple, portable and compatible code (data encrypted in Python can be decrypted in PHP, and so on). The encryption algorithm used is AES in CBC and CFB mode.
Abstract: The present paper represents a secure face identification system, which implements the principles of Histogram of Oriented Gradients (HOG) as a feature extraction method and Support Vector ...