Search
Crypto hackers take new spin on fake job scam, dropping ‘nasty’ malware
30.12.2024
Rather than tricking victims into opening malware-infested PDFs or running malicious video calling software, this attack method prompts victims to fix a microphone and camrea access issue
Crypto hackers take new spin on fake job scam, dropping ‘nasty’ malware
30.12.2024
Rather than tricking victims into opening malware-infested PDFs or running malicious video calling software, this attack method prompts victims to fix a microphone and camrea access issue
Crypto hackers take new spin on fake job scam, dropping ‘nasty’ malware
30.12.2024
Rather than tricking victims into opening malware-infested PDFs or running malicious video calling software, this attack method prompts victims to fix a microphone and camrea access issue
Crypto hackers take new spin on fake job scam, dropping ‘nasty’ malware
30.12.2024
Rather than tricking victims into opening malware-infested PDFs or running malicious video calling software, this attack method prompts victims to fix a microphone and camrea access issue
Crypto hackers take new spin on fake job scam, dropping ‘nasty’ malware
30.12.2024
Rather than tricking victims into opening malware-infested PDFs or running malicious video calling software, this attack method prompts victims to fix a microphone and camrea access issue
Crypto hackers take new spin on fake job scam, dropping ‘nasty’ malware
30.12.2024
Rather than tricking victims into opening malware-infested PDFs or running malicious video calling software, this attack method prompts victims to fix a microphone and camrea access issue
Crypto hackers take new spin on fake job scam, dropping ‘nasty’ malware
30.12.2024
Rather than tricking victims into opening malware-infested PDFs or running malicious video calling software, this attack method prompts victims to fix a microphone and camrea access issue
Crypto hackers take new spin on fake job scam, dropping ‘nasty’ malware
30.12.2024
Rather than tricking victims into opening malware-infested PDFs or running malicious video calling software, this attack method prompts victims to fix a microphone and camrea access issue
Here’s what happened in crypto today
29.12.2024
Need to know what happened in crypto today? Here is the latest news on daily trends and events impacting Bitcoin price, blockchain, DeFi, NFTs, Web3 and crypto regulation
Here’s what happened in crypto today
29.12.2024
Need to know what happened in crypto today? Here is the latest news on daily trends and events impacting Bitcoin price, blockchain, DeFi, NFTs, Web3 and crypto regulation
Scammers are using Telegram verification bots to inject crypto-stealing malware
11.12.2024
Scam Sniffer told Cointelegraph it was the first time it’s seen a scam use a “specific combination of fake X accounts, fake Telegram channels and malicious Telegram bots.”
Scammers are using Telegram verification bots to inject crypto-stealing malware
11.12.2024
Scam Sniffer told Cointelegraph it was the first time it’s seen a scam use a “specific combination of fake X accounts, fake Telegram channels and malicious Telegram bots.”
Scammers are using Telegram verification bots to inject crypto-stealing malware
11.12.2024
Scam Sniffer told Cointelegraph it was the first time it’s seen a scam use a “specific combination of fake X accounts, fake Telegram channels and malicious Telegram bots.”
Crypto-stealing scam targets Web3 workers with fake meeting apps
9.12.2024
Cado Security Labs says scammers use AI to make fake but real-looking company sites to dupe crypto workers into downloading info-stealing meeting apps
Radiant Capital says North Korea posed as ex-contractor to carry out $50M hack
9.12.2024
A North Korean threat actor was behind the $50 million attack on Radiant Capital in October and spoofed being an ex-contractor, the DeFi platform said
Bing Wallpaper od Microsoftu mění tapety na ploše, jenže se chová jako malware
25.11.2024
**Microsoft do Storu nedávno přidal aplikaci Bing Wallpaper
**Rafael Rivera zjistil, že se chová prakticky jako malware
**Vnucuje vám Bing a Edge a překračuje hranice slušného chování
North Korean malware evades Apple notarization, targets macOS users
12.11.2024
The newly discovered malware is interesting for being the first of its kind detected, but it seems to have been a trial balloon
North Korean malware evades Apple notarization, targets macOS users
12.11.2024
The newly discovered malware is interesting for being the first of its kind detected, but it seems to have been a trial balloon
North Korean hacker BlueNoroff targets crypto firms with new malware
8.11.2024
According to cybersecurity firm Recorded Future, North Korean hacker groups have stolen approximately $3 billion in funds since 2017
International Sting Unravels Malware Stealing Crypto and Financial Data
29.10.2024
The U.S. Department of Justice (DOJ) has joined an international crackdown on infostealer malware, seizing servers, domains, and crypto accounts linked to the theft of millions of credentials. International Operation Disrupts Redline and META Infostealers The U.S. Department of Justice (DOJ)...