Search

Nalezeno "hacking": 365

Vitalik Buterin Confirms His X Account Was Hacked by SIM Swap


Ethereum founder Vitalik Buterin took to social media to share details about the hacking of his profile on X, formerly Twitter. The influential crypto figure confirmed suspicions that the account was targeted in a SIM swap attack allowing perpetrators to promote a crypto scam enticing victims with...

Hackers Exploit Windows Tool to Deploy Crypto-Mining Malware


Hackers have targeted a popular Windows-based software packaging tool to infect computers with crypto mining malware, IT security firm Cisco Talos Intelligence Group has revealed. The mining attack on computers happens through a Windows tool known as Advanced Installer, and the attackers have used...

South Korea Seeks to Freeze North’s Crypto Assets Under New Law


The government in Seoul intends to submit new legislation tailored to facilitate the tracking and freezing of crypto used to fund the weapons programs of North Korea. A bill has been drafted after extended consultations between ministries with the aim to make South Korean sanctions more effective...

FTX Data Breach Update: Sensitive Information Was Leaked – Here's the Latest


Sensitive details about FTX customers were compromised during the security breach at FTX’s bankruptcy claims agent Kroll earlier this month, despite Kroll initially claiming only “non-sensitive” was leaked. The confirmation that the leaked details included information many people would categorize...

Cybersecurity Breach at Kroll Affects FTX and BlockFi Claimants' Data


A cybersecurity breach at FTX’s bankruptcy claims agent Kroll has compromised user data from both FTX and the bankrupt crypto lender BlockFi. The compromised data consisted only of “non-sensitive” customer information, FTX said on X on Thursday, stressing that account passwords were not stored...

North Korea Hackers Continue to Target Crypto Platforms: UN Report


Hackers working for North Korea have continued to attack companies in the crypto space this year, according to independent sanctions monitors. Their findings, which reveal that Pyongyang proceeds with the development of its nuclear and weapons programs, will be included in a U.N. report which is...

Curve Finance Vulnerability Exposes $100M+ Worth of Crypto; CRV Token Plummets


A vulnerability in the popular decentralized finance (DeFi) protocol Curve Finance has caused funds to be drained from a number of the protocol’s liquidity pools, while roughly $100 million remains at risk. In a tweet from Sunday, the Curve team said that “a number” of its pools that uses version...

DeFi Platform EraLend on zkSync Loses $3.4 Million in Blockchain Exploit


Decentralized finance (DeFi) protocol EraLend has lost $3.4 million worth of crypto in a so-called re-entrancy attack. The attack, which happened on Tuesday, exploited a vulnerability that allowed the hacker to make multiple calls to a function within one single transaction, enabling the person...

Web3 Industry Losses Topped $656 Million in H1 of 2023 — Study


Hackers stole about $471 million in the first six months of 2023 and the theft of $197 million from Euler Finance in March was the single biggest hacking incident in the period, the latest Beosin Web3 report has shown. Contract vulnerability was the most common (60) type of attack during the period...

TRM Labs Report: Bitcoin's Dominance in Crypto Crimes Down to 19%


Bitcoin (BTC) is falling out of favour among crypto criminals, and accounted for just 19% of crypto crimes in 2022, a new report has found. In the report, blockchain intelligence firm TRM Labs said that cybercriminals are increasingly diversifying which blockchains they rely on to conduct their...

Sturdy Finance DeFi Protocol Faces Exploit, Loses More Than $750,000


Decentralized finance (DeFi) protocol Sturdy Finance has been exploited, but the team has promised that no further action will be taken against the hackers if the money is returned. Writing on Twitter on Tuesday, Sturdy Finance founder Sam Forman said his team has told the exploiter that they...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace