Home Search

cryptocurrencies - search results

If you're not happy with the results, please do another search
Debashish Sonicwall

“Threat Detection has Evolved from Static to Dynamic Behavioral Analysis to Detect-Threatening Behavior”

0
Debasish Mukherjee is the Vice President, Regional Sales (APAC), SonicWall. He has over 18 years of experience throughout in IT industry and has worked...
cryptocurrency-related cyberattacks

Cryptocurrency Worth $25 Mn Stolen in Lendf.Me and Uniswap Hacking

0
Cryptocurrencies have always been a primary target for cybercriminals, leading to cyber heist on cryptocurrency exchanges. Recently, $25 million worth of cryptocurrency was stolen...
U.S. Government Offers $5 Mn Reward for Information on North Korean Threat Groups

U.S. Government Offers $5 Mn Reward for Information on North Korean Threat Groups

0
The U.S. government announced that it is offering $5 million reward for information about North Korea-based threat groups and hacking campaigns. In an advisory...
Sardonic, BitMart

Bisq Crypto Exchange Platform’s Security Flaw Leads to Cyber Heist

0
Decentralized exchange (DEX) platform Bisq recently fell victim to a cyber heist in which the attacker exploited a security flaw to steal more than...
Malware and Vulnerability Trends Report, Mobile malware threats

McAfee Report Predicts 2020 to be Year of Mobile Sneak Attacks

0
McAfee released its Mobile Threat Report 2020, which found that hackers are using hidden mobile apps, third-party login and counterfeit gaming videos to target...
Konni Malware, North Korean threat actors target AstraZeneca

U.S. CISA, DHS, and FBI Discover North Korean Malware

0
The U.S. Department of Homeland Security, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), and the FBI recently exposed a new hacking activity that...
Cryptocurrency

New Rogue Cryptomining Techniques and Cases

0
It’s common knowledge that new cryptocurrency units come into existence through mining, a process of complex computation relying on CPU or GPU power. Unfortunately,...
Liquid Exchange Hack

Shitcoin Wallet: A Crypto-Wallet or a Crypto-Stealer?

0
Recently launched Google Chrome extension – Shitcoin Wallet, is not a crypto wallet but a well disguised crypto stealer informed Harry Denley, Director of...

Equating cryptocurrency to illegal conduct is lack of understanding

0
Coleman Watson is the Managing Partner of Watson LLP, and his background has a unique blend of engineering, business, and finance interposed with the...
Apple Notarization, operational technology

Lazarus Hacking Group Strikes Again with Fileless Malware

0
Researchers discovered a new kind of “Fileless Malware” distributed by the infamous Lazarus APT Hackers Group.  According to a security researcher from K7 Labs,...