Tag: hashing

  • Hacker News: Breaking CityHash64, MurmurHash2/3, wyhash, and more

    Source URL: https://orlp.net/blog/breaking-hash-functions/ Source: Hacker News Title: Breaking CityHash64, MurmurHash2/3, wyhash, and more Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides an extensive analysis of the security implications of various hash functions, focusing on their vulnerability to attacks. It discusses the mathematical foundations of hash functions, their roles in computer security,…

  • Hacker News: The performance of hashing for similar function detection

    Source URL: https://edmcman.github.io/blog/2024-01-11–fuzzy-hashing-for-code-comparisons/ Source: Hacker News Title: The performance of hashing for similar function detection Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves deeply into malware reverse engineering and explores advanced hashing techniques like PIC hashing and fuzzy hashing. It highlights the significant challenges faced in identifying equivalent functions across different…

  • Hacker News: Okta – Username Above 52 Characters Security Advisory

    Source URL: https://trust.okta.com/security-advisories/okta-ad-ldap-delegated-authentication-username/ Source: Hacker News Title: Okta – Username Above 52 Characters Security Advisory Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a security vulnerability identified in Okta’s authentication process involving the DelAuth mechanism and the Bcrypt hashing algorithm. The significance lies in its implications for user authentication security and…

  • Cloud Blog: How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/time-to-exploit-trends-2023/ Source: Cloud Blog Title: How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends Feedly Summary: Written by: Casey Charrier, Robert Weiner Mandiant analyzed 138 vulnerabilities that were disclosed in 2023 and that we tracked as exploited in the wild. Consistent with past analyses, the majority (97) of these vulnerabilities were…

  • Hacker News: Meta pays the price for storing passwords in plaintext

    Source URL: https://arstechnica.com/security/2024/09/meta-slapped-with-101-million-fine-for-storing-passwords-in-plaintext/ Source: Hacker News Title: Meta pays the price for storing passwords in plaintext Feedly Summary: Comments AI Summary and Description: Yes Short Summary with Insight: This text highlights a significant compliance and security failure by Meta, focusing on the improper handling of user passwords stored in plaintext. The incident underscores the importance…

  • Hacker News: "YOLO" is not a valid hash construction

    Source URL: https://blog.trailofbits.com/2024/08/21/yolo-is-not-a-valid-hash-construction/ Source: Hacker News Title: "YOLO" is not a valid hash construction Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses common cryptographic missteps made by clients, particularly focusing on the use of poorly constructed hash functions and message authentication codes (MACs) referred to as “YOLO constructions.” It emphasizes the…