Search
Telegram bot Banana Gun to absorb $3M loss from hack
25.9.2024
Banana Gun has confirmed a $3 million loss caused by a vulnerability in its trading bot, which impacted experienced crypto traders
Email auto-reply vulnerability allows hackers to mine cryptocurrency
25.9.2024
Hackers exploit email auto-replies to spread crypto-mining malware, hijacking unsuspecting users' systems to mine cryptocurrency without their knowledge
Email auto-reply vulnerability allows hackers to mine cryptocurrency
25.9.2024
Hackers exploit email auto-replies to spread crypto-mining malware, hijacking unsuspecting users’ systems to mine cryptocurrency without their knowledge
Solana Foundation defends decentralization amid patch coordination claims
3.9.2024
Solana Foundation’s Dan Albert highlighted the network’s distributed block-producing nodes, arguing that coordinating a patch does not mean centralization
Solana Foundation defends decentralization amid patch coordination claims
3.9.2024
Solana Foundation’s Dan Albert highlighted the network’s distributed block-producing nodes, arguing that coordinating a patch does not mean centralization
Google Chrome Vulnerability Exploited by North Korean Hackers, Microsoft Warns
1.9.2024
Microsoft recently detected a North Korean cyber group, Citrine Sleet, exploiting a security vulnerability in Chromium-based browsers, including Google Chrome. This flaw allowed attackers to execute malicious code on compromised devices. Citrine Sleet used advanced tactics, such as fake...
Zero-day vulnerability in Chrome exploited by North Korean hackers
30.8.2024
A hacker group is using its signature trojan malware to infect users of web browsers with Chromium engines.
Zero-day vulnerability in Chrome exploited by North Korean hackers
30.8.2024
A hacker group is using its signature trojan malware to infect users of web browsers with Chromium engines.
Styx Stealer malware exploits Windows vulnerability to ‘clip’ crypto
16.8.2024
Styx Stealer steals data and can reroute crypto transactions coming from an infected computer to the bad actor’s wallet
Styx Stealer malware exploits Windows vulnerability to ‘clip’ crypto
16.8.2024
Styx Stealer steals data and can reroute crypto transactions coming from an infected computer to the bad actor’s wallet
Mental Health in Tech Podcast Interview
12.8.2024
Mental health is always tough to talk about, especially in an industry that, to me, often rewards ego over vulnerability. I still find it tough even after having written about my own chronic depression and exploring UX case studies about …
Mental Health in Tech Podcast Interview originally...
Solana prevents potential outage, patches critical vulnerability
9.8.2024
Solana validator Laine said that an attacker could have attempted to reverse engineer the vulnerability, which could have halted the network
‘Dark Skippy’ method can steal Bitcoin hardware wallet keys
9.8.2024
Malicious firmware can embed secret data into a public Bitcoin transaction, which the attacker can then use to extract a person’s seed words
‘Dark Skippy’ method can steal Bitcoin hardware wallet keys
9.8.2024
Malicious firmware can embed secret data into a public Bitcoin transaction, which the attacker can then use to extract a person’s seed words
Crypto firms’ vulnerability to CrowdStrike blackout: Analyst insights
20.7.2024
Although no major crypto exchange was affected by the CrowdStrike downtime, analysts provided possible impacts in a case where they are
Oracle exploit drains $7.6 million from Rho Markets liquidity protocol
19.7.2024
Rho Markets has already paused its platform in response to the security breach
Li.Fi releases incident report following $11M hack
18.7.2024
The team also announced it was working on a voluntary compensation plan to reimburse 100% of funds to users affected by the exploit
Crypto execs on DeFi domain hacks: Don’t interact with crypto for now
12.7.2024
CoinGecko founder Bobby Ong explained that after Google sold its domain business to Squarespace, two-factor authentication was removed due to the forced migration of domains
Crypto execs on DeFi domain hacks: Don’t interact with crypto for now
12.7.2024
CoinGecko founder Bobby Ong explained that after Google sold its domain business to Squarespace, two-factor authentication was removed due to the forced migration of domains
Bitcoin Core devs set up new policy aimed at handling ‘critical bugs’
4.7.2024
Bitcoin Core developer Antoine Poinsot said there is a dangerous perception that Bitcoin Core is free of bugs, noting it is “dangerous and, unfortunately, not accurate.”