Search
Google Chrome Vulnerability Exploited by North Korean Hackers, Microsoft Warns
1.9.2024
Microsoft recently detected a North Korean cyber group, Citrine Sleet, exploiting a security vulnerability in Chromium-based browsers, including Google Chrome. This flaw allowed attackers to execute malicious code on compromised devices. Citrine Sleet used advanced tactics, such as fake...
Zero-day vulnerability in Chrome exploited by North Korean hackers
30.8.2024
A hacker group is using its signature trojan malware to infect users of web browsers with Chromium engines.
Zero-day vulnerability in Chrome exploited by North Korean hackers
30.8.2024
A hacker group is using its signature trojan malware to infect users of web browsers with Chromium engines.
Styx Stealer malware exploits Windows vulnerability to ‘clip’ crypto
16.8.2024
Styx Stealer steals data and can reroute crypto transactions coming from an infected computer to the bad actor’s wallet
Styx Stealer malware exploits Windows vulnerability to ‘clip’ crypto
16.8.2024
Styx Stealer steals data and can reroute crypto transactions coming from an infected computer to the bad actor’s wallet
Mental Health in Tech Podcast Interview
12.8.2024
Mental health is always tough to talk about, especially in an industry that, to me, often rewards ego over vulnerability. I still find it tough even after having written about my own chronic depression and exploring UX case studies about …
Mental Health in Tech Podcast Interview originally...
Solana prevents potential outage, patches critical vulnerability
9.8.2024
Solana validator Laine said that an attacker could have attempted to reverse engineer the vulnerability, which could have halted the network
‘Dark Skippy’ method can steal Bitcoin hardware wallet keys
9.8.2024
Malicious firmware can embed secret data into a public Bitcoin transaction, which the attacker can then use to extract a person’s seed words
‘Dark Skippy’ method can steal Bitcoin hardware wallet keys
9.8.2024
Malicious firmware can embed secret data into a public Bitcoin transaction, which the attacker can then use to extract a person’s seed words
Crypto firms’ vulnerability to CrowdStrike blackout: Analyst insights
20.7.2024
Although no major crypto exchange was affected by the CrowdStrike downtime, analysts provided possible impacts in a case where they are
Oracle exploit drains $7.6 million from Rho Markets liquidity protocol
19.7.2024
Rho Markets has already paused its platform in response to the security breach
Li.Fi releases incident report following $11M hack
18.7.2024
The team also announced it was working on a voluntary compensation plan to reimburse 100% of funds to users affected by the exploit
Crypto execs on DeFi domain hacks: Don’t interact with crypto for now
12.7.2024
CoinGecko founder Bobby Ong explained that after Google sold its domain business to Squarespace, two-factor authentication was removed due to the forced migration of domains
Crypto execs on DeFi domain hacks: Don’t interact with crypto for now
12.7.2024
CoinGecko founder Bobby Ong explained that after Google sold its domain business to Squarespace, two-factor authentication was removed due to the forced migration of domains
Bitcoin Core devs set up new policy aimed at handling ‘critical bugs’
4.7.2024
Bitcoin Core developer Antoine Poinsot said there is a dangerous perception that Bitcoin Core is free of bugs, noting it is “dangerous and, unfortunately, not accurate.”
Ethereum Foundation mailing list leaked due to SendPulse vulnerability
26.6.2024
A mailing list breach has occurred at the Ethereum Foundation due to vulnerabilities in its email automation solution, SendPlus. This feature is essential and implemented by the organization. A hacker exploited this advantage and sent fraudulent emails from updates@ethereum.org, specifically...
Holograph Begins Process to Remove 1 Billion Illegally Minted Tokens, Burns 53 Million HLG
20.6.2024
The recently hacked tokenization platform, Holograph, has unveiled a token-burning process to eliminate one billion illegally minted HLG tokens. The Holograph team stated that this process, which has resulted in the burning of more than 53 million tokens so far, is expected to reduce the total...
OKX investigates multi-million account thefts after SIM swap attacks
12.6.2024
According to SlowMist, despite the two similar phishing incidents, OKX’s two-factor authentication mechanism was not the main vulnerability point
Bitcoin Core’s Latest Optech Newsletter Urges Upgrade to Version 25.0, Discusses New Vulnerability Disclosure Policy
10.6.2024
Bitcoin Core’s Optech Newsletter #306 is recommending users to, “to upgrade to Bitcoin Core 25.0 or higher within the next two weeks, with the latest version being 27.0.” A new policy was discussed by several Bitcoin Core project members concerning disclosures of vulnerabilities....
BNB Chain faces $80K Bitcoin exploit. White hat hacker or ongoing exploit?
28.5.2024
Certain on-chain signs point to a potential white hat, or ethical hacker, looking for blockchain vulnerabilities