Search
Hackers Behind $140M Brazil Banking Heist Turn to Crypto to Launder Their Loot
4.7.2025
ZachXBT estimates that between $30 million and $40 million has been swapped to crypto through OTC desks and exchanges
North Korean hackers targeting crypto projects with unusual Mac exploit
3.7.2025
The malware bypasses Apple’s memory protections and deploys an infostealer payload targeting crypto wallets
There’s Never Been A Better Time To Play The Best Digimon Game
23.6.2025
Sometimes, an infectious digital virus can be a good thing, like when your brainrot spreads to all your friends’ video game consoles and they finally play a game you’ve been yelling about for a decade. Last week, after the previews went up for Digimon Story: Time Stranger, I looked on my shelf...
Decentralized Protocols Are Soft Targets for North Korean Hackers
20.6.2025
Oak Security has conducted more than 600 audits across major crypto systems. It consistently sees this vulnerability gap: teams invest heavily in smart contract audits but ignore basic operational security, says Dr. Jan Philipp Fritsche
North Korean Hackers Are Targeting Top Crypto Firms With Malware Hidden in Job Applications
20.6.2025
A DPRK-linked group is using fake job sites and Python malware to infiltrate Windows systems of blockchain professionals — with credential theft and remote access as the endgame
Nobitex's Source Code Released a Day After Hackers Steal Tokens Across Bitcoin, EVM, Ripple Networks
19.6.2025
The pro-Israel group Gonjeshke Darande follows through on its threats, publishing the full exchange code and security files, thereby placing the remaining Nobitex assets at risk
Nobitex source code leaked after $100M hack by pro-Israel group
19.6.2025
Hackers behind the $100 million Nobitex exploit have released the exchange’s full source code, escalating tensions amid the Israel-Iran conflict
Nobitex source code leaked after $100M hack by pro-Israel group
19.6.2025
Hackers behind the $100 million Nobitex exploit have released the exchange’s full source code, escalating tensions amid the Israel-Iran conflict
Nobitex source code leaked after $100M hack by pro-Israel group
19.6.2025
Hackers behind the $100 million Nobitex exploit have released the exchange’s full source code, escalating tensions amid the Israel-Iran conflict
Nobitex source code leaked after $100M hack by pro-Israel group
19.6.2025
Hackers behind the $100 million Nobitex exploit have released the exchange’s full source code, escalating tensions amid the Israel-Iran conflict
Nobitex source code leaked after $100M hack by pro-Israel group
19.6.2025
Hackers behind the $100 million Nobitex exploit have released the exchange’s full source code, escalating tensions amid the Israel-Iran conflict
Digimon Is Quietly Eating Pokémon’s Lunch, And More People Should Know
18.6.2025
Remember how, when Palworld was blowing up, fans were excited that a Pokémon competitor might force The Pokémon Company to get its act together and stop releasing busted games like Scarlet and Violet? Whether that pans out remains to be seen, but given that Digimon, arguably the most notable...
How hackers use fake X links to steal crypto, and how to spot them
10.6.2025
Cybercriminals hijack or impersonate trusted X accounts to post phishing links that lead users to fake sites or malicious smart contracts designed to steal crypto
$2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK
4.6.2025
Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK
$2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK
4.6.2025
Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK
Hackers using fake Ledger Live app to steal seed phrases and drain crypto
23.5.2025
Cybercriminals are using fake Ledger Live apps to drain macOS users’ crypto through malware that steals seed phrases, a cybersecurity firm warns. The malware replaces the legitimate Ledger Live app on victims’ devices and then prompts the user to input their seed phrase through...
Hackers using fake Ledger Live app to steal seed phrases and drain crypto
23.5.2025
Cybercriminals are using fake Ledger Live apps to drain macOS users’ crypto through malware that steals seed phrases, a cybersecurity firm warns. The malware replaces the legitimate Ledger Live app on victims’ devices and then prompts the user to input their seed phrase through...
Australian Police Seize Hacker’s Bitcoin, Mansion and Luxury Car
19.5.2025
The Australian police recently seized 25 bitcoins, a luxury car, and a mansion in Beachmere from a man previously convicted of hacking an American gaming company. AFP Targets Illegal Profits of Hacker The Australian Federal Police (AFP) recently seized 25 bitcoins, a luxury car, and a mansion...
Pectra lets hackers drain wallets with just an offchain signature
11.5.2025
Ethereum’s latest network upgrade, Pectra, introduced powerful new features aimed at improving scalability and smart account functionality — but it also opened a dangerous new attack vector that could allow hackers to drain funds from user wallets using only an offchain signature.Under...
Hackers use New York Post’s X account to send scam DMs, users report
5.5.2025
Malicious actors appear to have infiltrated the New York Post’s X account in an attempt to scam crypto users on the microblogging platform. Some X users from the crypto community have recently reported having received a private message from the New York Post’s X account inviting...