Search

Nalezeno "IT Security": 3495

Ukraine Shuts Down Crypto Exchangers Sending Money to Russian Wallets


The Security Service of Ukraine (SBU) has closed down a number of “underground” crypto exchangers in Kyiv. Officials say the platforms have been making a million dollars in monthly turnover and allegedly sending money to digital wallets operated by Russian payment providers....

Gigabyte Hackers Threaten To Leak Internal AMD, Intel Documents


Taiwanese manufacturer Gigabyte has suffered a major cyberattack, courtesy of the hacker group known as RansomEXX. It appears the attack hasn’t impacted the day-to-day manufacturing side of the business, which focuses on PC hardware, but it has hit internal servers hard.Read more

Thorchain Trolled by Hacker After Two Successful Seven-Figure Exploits


Thorchain, a popular defi protocol, has been compromised twice in the last two weeks, resulting in losses of over $10,000,000. The hacker responsible for the latest exploit left behind a message detailing the measures that should be undertaken to protect users. Hacker Returns to the Scene...

Coins vs Utility Tokens vs Security Tokens - What’s The Difference?


Disclaimer: The Industry Talk section features insights by crypto industry players and is not a part of the editorial content of Cryptonews.com. Tokenization is one of the proponents of the blockchain which will likely stand the test of time. The act of tokenizing something, means giving...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace