Search

Nalezeno "Attack": 931

Known-plaintext attacks, explained


Discover how a known-plaintext attack works, where an attacker uses both the plaintext and its ciphertext to crack encryption and access sensitive data

Bitcoin Facing Potentially Destructive ‘Vampire Attack’ by Third Parties


Duo Nine, the founder of YCC, alerted others about an ongoing vampire attack on Bitcoin, which Satoshi Nakamoto foretold in the Bitcoin whitepaper. Nine explained that the inclusion of third parties siphoning value from the Bitcoin blockchain to other blockchains might affect its operability in...

Cross-Layer Attack Vectors in Multi-Layer Blockchain Protocols


The evolution of blockchain technology has led to the development of multi-layer blockchain protocols, designed to improve scalability, security, and […] The post Cross-Layer Attack Vectors in Multi-Layer Blockchain Protocols appeared first on

Crypto On/Off Ramp Discloses Breach, Says 1.14% of Users Affected


Transak, a cryptocurrency on/off-ramp service, confirmed on Oct. 21 that experienced a data breach affecting 1.14% of its users. A ransomware group claimed to have obtained sensitive data but Transak confirmed only limited information was accessed. The company said it is taking steps to address...

Decentralized Money Market Protocol Loses $4.3M in Social Engineering Attack


Tapioca DAO, has been the victim of a social engineering attack in which criminals exploited a vulnerability to compromise the ownership of the TAP token vesting contract. The breach led to the sale of 30 million vested tokens. A blockchain security firm detected suspicious activity involving...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace