Search
KuCoin CEO claims hacking suspects identified
3.10.2020
They’ve already gotten the police involved
FinCen Warns on Ransomware Attacks, Notes Increased Targeting of Government Entities
1.10.2020
Ransomware attackers use malicious software to block access to data and demand ransom in return, oftentimes deploying the threat to make proprietary data public
This Entrepreneur Was SIM Swapped So Often, He Started a Company to Fight It
25.9.2020
Efani’s solution to SIM swapping? Make it so difficult to make changes to a cell phone account that an attack is virtually impossible
Coinbase wallet users targeted by new Android malware
24.9.2020
This alien doesn't care about taking over the Earth, but it may steal your Bitcoins and dollars
Crypto.com reverses ‘illegitimate trades’ amid prolonged downtime for the exchange
22.9.2020
Some customers appear to have exploited the exchange’s database issues for person gain
Ethreum partners with ChainSafe and OpenRelay to prevent more 51% attacks
20.9.2020
The quest to protect Ethereum Classic continues
Many cloud servers are still at high risk of being hijacked for crypto mining
14.9.2020
Is cryptojacking still an underrated threat?
Most Attacks on Cybersecurity Firm’s Decoy Servers Aimed at Mining Crypto: Report
14.9.2020
An analysis of 16,371 cyberattacks on Aqua Security "honeypot" cloud servers found the majority of hackers involved mining crypto
Binance will ‘do what they can’ to help recover funds stolen in yesterday’s $5M Eterbase hack
10.9.2020
Whether CZ is coming to the rescue or not remains to be seen
$5M stolen from a European crypto exchange after hot wallets compromised
9.9.2020
Hot wallet attacks have been making a lot of headlines lately
Major Chilean bank shuts down all branches following ransomware attack
8.9.2020
There is a nationwide alert for future ransomware campaigns against Chilean companies
Research: New Malware Employs Tor and Bittorrent To Steal Bitcoin and Ether
4.9.2020
A new trojan called Krypto Cibule uses infested computers’ power to mine cryptocurrency, steal crypto wallet files, and redirect incoming digital assets to a hacker address. The malware rides on the Tor network and the Bittorrent protocol to perform attacks, according to an extensive report...
Voatz Calls for Restrictions on Independent Cybersecurity Research in Supreme Court Brief
4.9.2020
Blockchain voting platform Voatz wrote that bug bounty programs are beneficial – provided researchers only operate under the supervision of the companies they’re looking into
Revealed: How North Korean hackers launder stolen crypto
4.9.2020
The techniques are sophisticated but crypto laundering cases are still relatively small
ETC Labs believes regulation is the key to preventing future 51% attacks
3.9.2020
Enacting such legislation effectively could be a major challenge, however
Researchers are calling this new malware a triple threat for crypto users
2.9.2020
The surrounding threat level is low, but there are fears it could increase
The mischievous Ryuk: Combatting the ‘Death Note’-inspired ransomware
2.9.2020
As the Ryuk ransomware continues to wreak havoc, tracking ransomware payments has become critical in stopping criminals from cashing out
Alleged second teen mastermind behind Twitter’s 'Bitcoin giveaway' hack
2.9.2020
Graham Ivan Clark may not be the only juvenile responsible for the massive Twitter breach on July 15
Ethereum Classic suffers another 51% attack
30.8.2020
It’s the third attack this month
Troubled Crypto AG successor reportedly dismisses 70 employees
28.8.2020
Unfortunate "crypto" brand name causes the company to shut down