2019-2-13 18:16 |
A new attack vector is reportedly being introduced to Ethereum’s blockchain through the Constantinople hard fork
Similar to Notcoin - Blum - Airdrops In 2024
2019-2-13 18:16 |
A new attack vector is reportedly being introduced to Ethereum’s blockchain through the Constantinople hard fork
Similar to Notcoin - Blum - Airdrops In 2024
Multichain decentralized finance (DeFi) platform Kyber said it removed the attack vector used in an exploit that saw $265,000 stolen on Sept. 1.
2022-9-7 14:09 | |
On February 4, 2019, blockchain tech company Blockstream announced the development of a “proof of reserves” tool to standardize the authenticity of exchanges’ crypto reserves.
2019-2-7 01:01 | |
A new threat to crypto users has been exposed as CookieMiner, a malware designed to steal web cookies and user passwords for cryptocurrency exchanges. A Novel Attack Vector Malware has been in the news a lot lately.
2019-2-3 02:00 | |
Whenever I claim that bitcoin is the only decentralized cryptocurrency, I get one of two arguments:My X coin is also decentralized. Bitcoin isn’t decentralized because of Core and/or miners.
2019-1-21 21:52 | |
The cryptocurrency analysts, Bryce Weiner and Andrew Desantis, decided to explain why Segregated Witness (SegWit) – an implementation to make Bitcoin transactions’ size smaller – has a vulnerability.
2019-1-6 22:17 | |
Hackers have recently shown that a new attack vector to hacking the Trezor wallet is now possible. A team of hackers has managed to find a new way to hack the Trezor wallet, as reported this Thursday, December 27, 2018, in a tweet from a crypto enthusiast.
2018-12-30 16:00 | |
A bug centering around a new Ethereum token, GasToken, which was enabling abuse on cryptocurrency exchanges, appears to have been resolved. The details are provided in a report originally published on November 13, 2018, that discussed how the bug was exploited by attackers, and what digital platforms could do if they wished to protect their hot wallet funds.
2018-11-22 00:34 | |
Crypto-jacking schemes are getting more intricate by the day. It appears hackers are now disguising cryptocurrency mining malware and passing it off as legitimate Windows installation packages.
2018-11-8 18:20 | |
Fortnite, the wildly popular video game over which schools have expressed disdain, is currently being used as an attack vector for malware disguised as cheating software. According to an October 2 post from Christopher Boyd, the lead malware intelligence analyst at Malwarebytes Labs, thousands of users have been inadvertently downloading malicious software.
2018-10-5 05:00 | |
A group of researchers has unveiled their discovery of an attack vector that poses serious threats to the integrity of data stored within machines that use Intel’s SGX. The attack vector is called Foreshadow.
2018-8-24 06:00 | |
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers.
2018-7-18 23:18 | |