Imagine you have a client application, written in C# e.g., which needs secure (encrypted) interaction with server API. This is where CryptoApi can help. I'll start from saying that I'm not good at ...
Microsoft kicked off the new decade with a bang. Last Tuesday was the first Microsoft Patch Tuesday of 2020, and one of the patches pushed out by Microsoft addresses a dangerous flaw in Crypt32.dll ...
Cryptoapi is built on top of the fantastic CCXT library. If you plan to do any serious trading, I would recommend paying for access to CCXT Pro because cryptoapi is an unstable test project. Note: Due ...
Proof of concept exploit code has been released by Akamai researchers for a critical Windows CryptoAPI vulnerability discovered by the NSA and U.K.'s NCSC allowing MD5-collision certificate spoofing.
WTF?! Akamai has unveiled a new security threat to Windows-based servers and data center machines based on a dangerous bug Microsoft fixed months ago. However, it seems almost no one bothered to ...
Akamai this morning released research detailing their analysis of a critical spoofing vulnerability, CVE-2022-34689, affecting Windows CryptoAPI. The vulnerability allows for malicious actors to feign ...
Researchers have developed a proof-of-concept (PoC) exploit for a public x.509 certificate-spoofing vulnerability in the Windows CryptoAPI that the NSA and the National Cyber Security Center (NCSC) ...
Since 2013, PixelPlex — an experienced blockchain company— has been providing full-stack blockchain development services. It’s been assisting both giant businesses and startups in unleashing their ...
Today, Microsoft released patch for CVE-2020-0601, a vulnerability in windows “crypt32.dll” component that could allow attackers to perform spoofing attacks. This was discovered and reported by ...
MS09-056 addresses two vulnerabilities that affect how the Windows CryptoAPI parses X.509 digital certificates. Applications on the Windows platform as well as Windows components such as the WinHTTP ...
The new Windows CryptoAPI CVE-2020-0601 vulnerability disclosed by the NSA can be abused by malware developers to sign their executables so that they appear to be from legitimate companies. This ...
I don't believe you can do so directly, but it's not hard to wrap the API calls with a COM object.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results