Search
Crypto hackers hit DeFi for $92M in April as attacks double from March
30.4.2025
Cryptocurrency hackers stole more than $90 million in April, dealing another blow to the industry’s mainstream reputation despite ongoing efforts to improve cybersecurity.Hackers made off with $92 million of digital assets across 15 incidents in April, according to an April 30 research report...
Crypto hackers hit DeFi for $92M in April as attacks double from March
30.4.2025
Cryptocurrency hackers stole more than $90 million in April, dealing another blow to the industry’s mainstream reputation despite ongoing efforts to improve cybersecurity.Hackers made off with $92 million of digital assets across 15 incidents in April, according to an April 30 research report...
North Korean Hackers Targeting Crypto Developers With U.S. Shell Firms
25.4.2025
Illicitly downloaded programs can steal data, provide remote access to infected systems, and serve as entry points for additional spyware or ransomware
North Korean hackers set up 3 shell companies to scam crypto devs
25.4.2025
A subgroup of the North Korea-linked hacker organization Lazarus set up three shell companies, two in the US, to deliver malware to unsuspecting users.The three sham crypto consulting firms — BlockNovas, Angeloper Agency and SoftGlide — are being used by the North Korean hacker group...
North Korean hackers set up 3 shell companies to scam crypto devs
25.4.2025
A subgroup of the North Korea-linked hacker organization Lazarus set up three shell companies, two in the United States, to deliver malware to unsuspecting users.The three sham crypto consulting firms — BlockNovas, Angeloper Agency and SoftGlide — are being used by the North Korean...
StarCraft 2 Hackers Are Forcing Players To Watch Mass Shooting Videos
22.4.2025
StarCraft 2 hackers are reportedly exposing unsuspecting players to horrific footage of a real-life shooting as well as videos featuring bright flashing lights, seemingly designed to trigger seizures. While Blizzard is investigating, it seems this has been happening for nearly a year or more.Read...
KiloEx's ‘Sophisticated’ Hack Shows DeFi Risks — But This Time, Recovery Was Swift
18.4.2025
The firm will be awarding a 10% bounty to white hat hackers involved in the resolution of the exploit
What is Bitcoinlib, and how did hackers target it?
18.4.2025
Bitcoinlib, explained Bitcoinlib is an open-source Python library designed to make Bitcoin development easier. Think of it as a toolbox for programmers who want to create Bitcoin wallets, manage transactions, or build apps that interact with the Bitcoin...
North Korean hackers target crypto devs with fake recruitment tests
17.4.2025
North Korean hackers linked to the $1.4 billion Bybit exploit are reportedly targeting crypto developers using fake recruitment tests infected with malware. Cybersecurity outlet The Hacker News reported that crypto developers have received coding assignments from malicious actors posing...
Hackers Exploit Fake Microsoft Office Add-ins to Spread Crypto Miner and Wallet-Stealing Trojan
9.4.2025
In a recent security alert, Kaspersky researchers have uncovered a unique malware distribution scheme exploiting Sourceforge, a popular software hosting platform. Attackers have created a project named “officepackage” that appears to offer Microsoft Office add-ins but instead leads...
Hackers hide crypto address-swapping malware in Microsoft Office add-in bundles
9.4.2025
Malicious actors are attempting to steal crypto with malware embedded in fake Microsoft Office extensions uploaded to the software hosting site SourceForge, according to cybersecurity firm Kaspersky.One of the malicious listings, called “officepackage,” has real Microsoft Office add-ins...
Hackers are selling counterfeit phones with crypto-stealing malware
3.4.2025
Cybersecurity firm Kaspersky says it has uncovered thousands of counterfeit Android smartphones sold online with preinstalled malware designed to steal crypto and other sensitive data. The Android devices are sold at reduced prices, cybersecurity firm Kaspersky Labs said in an April...
Typosquatting in crypto, explained: How hackers exploit small mistakes
31.3.2025
What is typosquatting in crypto? Typosquatting in crypto involves registering domain names that mimic popular platforms with slight misspellings to deceive users into revealing sensitive information.In the rapidly evolving digital landscape, cryptocurrencies...
Typosquatting in crypto, explained: How hackers exploit small mistakes
31.3.2025
What is typosquatting in crypto? Typosquatting in crypto involves registering domain names that mimic popular platforms with slight misspellings to deceive users into revealing sensitive information.In the rapidly evolving digital landscape, cryptocurrencies...
Darkweb actors claim to have over 100K of Gemini, Binance user info
28.3.2025
Darkweb threat actors claim to have hundreds of thousands of user records — including names, passwords and location data — of Gemini and Binance users, putting the apparent lists up for sale on the internet. The Dark Web Informer, a Darkweb cyber news site, said in a March 27 blog...
Crypto security will always be a game of ‘cat and mouse’ — Wallet exec
23.3.2025
Cryptocurrency wallet providers are getting more sophisticated, but so are bad actors — which means the battle between security and threats is at a deadlock, says a hardware wallet firm executive.“It will always be a cat and mouse game,” Ledger chief experience officer Ian Rogers...
Crypto security will always be a game of ‘cat and mouse’ — Wallet exec
23.3.2025
Cryptocurrency wallet providers are getting more sophisticated, but so are bad actors — which means the battle between security and threats is at a deadlock, says a hardware wallet firm executive.“It will always be a cat and mouse game,” Ledger chief experience officer Ian Rogers...
Solanafrica Scam: Hackers Breach Ghanaian President’s X Account
19.3.2025
Ghanaian President John Mahama announced on March 18 that he has regained full control of his X (formerly Twitter) account from hackers who used it to promote a fraudulent cryptocurrency scheme. Two-Factor Authentication Not Enough The president’s post announcing the restoration of the account came...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
Crypto mixers and crosschain bridges help criminals obscure stolen funds, making it harder for investigators to trace illicit transactions
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...