Search

Nalezeno "attack vector": 13

Bitcoin: A New Regulatory Attack Vector


The Bitcoin miner survey launched by the U.S. Energy Information Administration is not an innocuous information-gathering exercise. And, it could end up hurting much more than just the crypto ecosystem

Kubernetes Clusters Used to Mine Monero by Attackers


Attackers are abusing an attack vector present in one of the most popular execution engines (Argo Workflows) to repurpose Kubernetes systems to mine cryptocurrencies. The attack exploits a vulnerability in the system of permissions of Argo Workflows machines connected to the internet, deploying...

ETH 2.0 Phase 0 Reviewed by Auditers, with Attack Vector Warnings


Ethereum 2.0 (ETH 2.0) (aka Serenity) has left its auditors satisfied, though critical issues have been pointed out. Working with the Ethereum 2.0 team, security consultant Least Authority reviewed Ethereum's network update to Proof of Stake (PoS) from Proof of Work (PoW), specifically its upcoming...

Why Double Spends on BCH Are Not the Same as Replace-By-Fee Fraud


When it comes to creating a peer-to-peer electronic cash system, accepting zero confirmation transactions becomes critically important. When a model’s main aim is to “just hodl” or push an isolated store of value narrative, important concerns like double spending can take a back...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace