logo
  • About
  • Contact
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Data Security in traditional Data Centre vs Cloud Environments
  • Signal adds quantum-resistant encryption to its E2EE messaging protocol
  • MGM Resorts Computers Back Up After 10 Days as Analysts Eye Effects of Casino Cyberattacks
  • SMBs face growing cybersecurity threats, but basic measures can lower risks
  • A look at the future of supply chain and national security: Updates from CISA and NIST

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-41616 (student_management_system) 21 September 2023
  • CVE-2023-41614 (zoo_management_system) 21 September 2023
  • CVE-2023-42482 (exynos_2200_firmware) 21 September 2023
  • CVE-2023-34576 (opartfaq) 21 September 2023
  • CVE-2023-42810 (systeminformation) 21 September 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI

Posted on 11 August 2020

From zdnet.com

China hackers APT

The Chinese government has deployed an update to its national censorship tool, known as the Great Firewall (GFW), to block encrypted HTTPS connections that are being set up using modern, interception-proof protocols and technologies.

Read more…

Posted in News

Post navigation

Previous post: Facebook open-sources one of Instagram’s security tools
Next post: TeamViewer Flaw Could Let Hackers Steal System Password Remotely
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.