Новости о Security Exploit [ Фото новости ] [ Свежие новости ] | |
Polygon Patched Exploit that Could Have Put 9B MATIC at Risk
The Polygon Network team revealed that they had patched a major security vulnerability in a recent network upgrade that put billions of MATIC at risk. The post Polygon Patched Exploit that Could Have Put 9B MATIC at Risk appeared first on BeInCrypto. дальше »
2021-12-30 10:09 | |
|
|
Security researchers detect new variant of Monero mining exploit Tor2Mine
The industry woke up today to the news of Bitmart exchange being exploited to the tune of nearly $200 million in stolen funds through Ethereum and Binance Smart Chain. With exploits becoming commoner The post Security researchers detect new variant of Monero mining exploit Tor2Mine appeared first on AMBCrypto. дальше »
2021-12-5 16:00 | |
|
|
Automated Market Maker Glide Finance Exploited, Post-Mortem Reveals It Was The Teams Own Fault
A little-known DEX, Glide Finance, was exploited for $300,000 late on Sunday, and funds were drained from their pair contracts. The audit protocol said while diagnosing the root cause of the exploit, they found that it wasn't the smart contract auditor Paladin Blockchain Security’s fault, rather their own. дальше »
2021-10-18 16:02 | |
|
|
What Are Dusting Attacks & How To Prevent Them?
There is an ongoing arms race in the tech security industry. The bad guys find another way to exploit the system and the good guys try to patch up the leak. It’s not necessarily a bad thing. It’s how security tech advances, and it drives the cryptography industry. дальше »
2021-9-22 15:15 | |
|
|
Exploding NFT Market Attracts Hordes of Scammers and Hackers – Here’s What You Should Know
As the rapidly growing NFT market continues to attract waves of attention, hackers and scammers see a new frontier in the industry. Historically, imposters have been attempting to exploit the crypto industry using any security loophole or scamming tool they could get their hands on. дальше »
2021-9-5 15:40 | |
|
|
How A Security Vulnerability Affected Ethereum And Led To A Chain Split
The Ethereum network is facing a chain split after an exploit forced over 50% of its nodes to upgrade their client to prevent further attacks. This security vulnerability was detected, reported, and fixed by Go Ethereum, developers of the affected client, Geth. дальше »
2021-8-28 21:23 | |
|
|
BUNNY Down Over 97% from its April Peak, Project Enhances Security Protocol After the 2nd Exploit
PancakeBunny, BSC-based decentralized finance (DeFi) yield farming aggregator and optimizer, has been hacked yet again. Two months ago, PancakeBunny got rekt on Binance Smart Chain, and this time, the same happened on Ethereum sidechain Polygon. дальше »
2021-7-20 16:32 | |
|
|
THORChain hit by another exploit; loses up to $7.6M
With the emergence of cryptocurrencies, also came a corresponding rise in ransomware attacks. Several security loopholes in the cryptocurrency space in general, and smart contract platforms in particuThe post THORChain hit by another exploit; loses up to $7.6M appeared first on AMBCrypto. дальше »
2021-7-16 10:17 | |
|
|
EasyFi Loses $80 Million Worth of Tokens in A ‘Mnemonic Key’ Security Breach
Founder Ankitt Gaur claims this was a “mnemonic key hack,” not a smart contract exploit. EASY has tanked over 22% following reports of the hack. The post EasyFi Loses Million Worth of Tokens in A ‘Mnemonic Key’ Security Breach first appeared on BitcoinExchangeGuide. дальше »
2021-4-22 05:49 | |
|
|
Ledger Patches Nano X Supply Chain Vulnerability
The Ledger security team has patched a hardware exploit that could compromise Ledger Nano X wallets as a part of a supply chain attack. Following a report from Kraken Security Labs, a cybersecurity division of Kraken, that showed that the Ledger hardware wallet was susceptible to a supply chain attack, the device manufacturer has announced […] The post Ledger Patches Nano X Supply Chain Vulnerability appeared first on BeInCrypto. дальше »
2020-7-9 12:12 | |
|
|
DeFi Apps Represent 24/7 Multi-Million Dollar Hacker Honeypots
A recent smart contract exploit resulted in the loss of 1,193 ETH. The incident has prompted questioning of the security of the rapidly evolving DeFi sector. Over the weekend, the exploitation of a smart contract vulnerability forced developers at Ethereum-based app Fulcrum to partially disable its smart contract. дальше »
2020-2-23 19:10 | |
|
|
Since bZx Exploit, Enthusiasts Flock to DeFi Insurance
The recent bZx exploit has the DeFi community searching for answers in the midst of a security crisis. Insurance is an efficient way to protect oneself against risk, and DeFi...The post Since bZx Exploit, Enthusiasts Flock to DeFi Insurance appeared first on Crypto Briefing. дальше »
2020-2-18 18:20 | |
|
|
DeFi Protocol bZX Suffered From a Smart Contract Exploit
The world of decentralized finance has yet to be put through a big security audit. For bXZ, such an audit will come too late, as the DeFi protocol has already been hacked. Earlier today, news broke of an incident affecting bXZ. дальше »
2020-2-16 06:00 | |
|
|
Researchers hacked a Canon DSLR with Bitcoin demanding ransomware
Bitcoin demanding ransomware knows no bounds, and the latest potential victim? DSLR cameras. A group of security researchers have managed to exploit vulnerabilities in a Canon EOS 80D digital camera to hold its owner’s photos to a Bitcoin ransom, The Inquirer reports. дальше »
2019-8-12 16:59 | |
|
|
Researchers break iPhone’s FaceID by putting modified glasses on unconscious people
Security researchers have cracked Apple’s FaceID biometric system yet again. But there’s an unusual caveat to this trick: to successfully unlock an iPhone, the attackers first need to make sure the victim is out cold. дальше »
2019-8-9 12:43 | |
|
|
WhatsApp’s chat manipulation exploit remains unresolved even after a year (Updated)
Vulnerabilities uncovered in WhatsApp — the messaging app used by about 1. 5 billion users across the world — can allow bad actors to exploit the platform to manipulate or spoof chat messages. The flaws would make it possible to “intercept and manipulate messages sent in both private and group conversations, giving attackers the power to create and spread misinformation from what appear to be trusted sources,” the researchers noted. дальше »
2019-8-8 14:01 | |
|
|
0X Exchange shuts down v2.0 contracts due to potential exploit; deployed patched versions
0x, an open protocol that enabled the peer-to-peer exchange of assets on the Ethereum blockchain, shut down their v2 Exchange due to a flaw in its Exchange contract which was identified by a third-party security researcher Sam Sun. дальше »
2019-7-14 16:00 | |
|
|
Zero Day Vulnerabilities on Mozilla Targeted Coinbase Employees
Security researchers at Google and Coinbase discovered a zero day exploit on the Firefox browser that would allow an attacker to remotely execute code on an underlying operating system, as reported by ZDNet, June 18, 2019. дальше »
2019-6-23 13:00 | |
|
|
[Security Alert] Update Firefox Browser Now as Hackers Exploit a Serious Bug Targeting Major Crypto Exchanges Users
Mozilla has issued a security alert warning that hackers are taking advantage of a serious bug in their Firefox browser, which can be used to take over the entire computer. The company has warned that crypto owners face the highest level of an imminent attack, the Next Web reports. Firefox users have been asked to […] дальше »
2019-6-19 21:03 | |
|
|
Yet another cryptocurrency mining botnet caught targeting China
It seems we can’t go more than a week without news of a new cryptocurrency mining malware or botnet being discovered. This time, security researchers have uncovered another Monero mining botnet that’s targeting China. дальше »
2019-6-13 16:02 | |
|
|
Cryptocurrency hackers sneak malware into Oracle servers to mine Monero
Security researchers have identified yet another cryptocurrency mining malware. This time it’s installing itself on enterprise application servers, and using a clever trick to remain hidden. If that wasn’t enough, the malware has already claimed its first major victim: Oracle servers. дальше »
2019-6-11 13:22 | |
|
|
Infographic: An Overview of Compromised Bitcoin Exchange Events
The purpose of this infographic is to visualize the size of large cryptocurrency hacks that have occurred in the past as if they all happened today. The hacks included in this infographic extend beyond exchanges, as there were other large entities that experienced cryptocurrency hacks, such as marketplaces like Silk Road 2. дальше »
2019-5-25 21:56 | |
|
|
BitDefender researchers discover terrifying security vulnerability in Intel CPUs
Researchers from Romanian security firm BitDefender have uncovered a troubling security vulnerability in Intel processors that could allow an attacker to access privileged kernel-mode information typically considered “off limits” for most applications. дальше »
2019-5-14 19:59 | |
|
|
Criminals Raise the Stakes in Crypto Mining Malware Using Confluence Exploit Per Trend Micro Find
Cybercriminals are getting bolder and smarter all the time and it is hard to keep up with them, as they keep finding new exploits in several pieces of software. Now, it was recently discovered by the security intelligence company Trend Micro that the Confluence software, created by Atlassian, was used to spread crypto mining malware. […] дальше »
2019-5-8 02:30 | |
|
|
Cornell Tech Research: Dangerous Arbitrage Bots Are Exploiting Decentralized Exchanges
There is a new trend in the market. People are using arbitrage bots to exploit innefficiencies in decentralized exchanges (DEX) in order to get more profit. This was originally reported by Homeland Security News Wire, which used research from Cornell Tech in order to affirm that some “predatory users” were profiting from these exchanges this […] дальше »
2019-5-8 23:00 | |
|
|
New Cryptojacking Campaign Infects Asia Using More Profitable Tactics
Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting. дальше »
2019-4-27 22:07 | |
|
|
Steam vulnerability exposed users to account hijacking and malware
A vulnerability in Valve‘s Steam platform made it possible for malicious actors to take over user accounts, pilfer their items, and even infect their systems with additional malware. The security kink resided in Steam‘s server browser functionality – which lets players look up severs for a number of games (including hit titles like CS:GO, Half-Life 2, and Team Fortress 2) – according to a HackerOne vulnerability disclosure made public on March 15. дальше »
2019-3-21 19:42 | |
|
|
Will This Vulnerability Finally Compel Bitmain to Open Source Its Firmware?
As if Bitmain’s year hasn’t been rough enough, having posted big losses and laying off entire departments, its flagship product now has a firmware vulnerability. A few weeks ago, Bitcoin Core contributor James Hilliard discovered an exploit in Bitmain’s S15 firmware. дальше »
2019-2-21 23:44 | |
|
|
Investigation Reveals Criminals Exploit Fortnite V-Bucks To Launder Money Without Players Knowledge
Fortnite has become a major success since its original launch, but cybercriminals have found a way to exploit it for their own gain with underhanded actions. In a report from The Block, it appears that these cybercriminals infiltrated the fairly weak security system allowed them to sell V-Bucks, the in-game currency of Fortnite, which were […] дальше »
2019-1-17 07:23 | |
|
|
Neutrino: A Privacy-Preserving Light Wallet Protocol
Lightning is all the rage these days and, while it's an exciting development, users currently have to have a full node running in order to transact in it. In this article, I'm going to introduce Neutrino, a new protocol for light clients to get the data that they need while preserving privacy and without trusting a central server. дальше »
2019-1-4 21:11 | |
|
|
Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3
In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack. дальше »
2019-1-1 19:15 | |
|
|
This is the future of authentication, according to security experts
Passwords may not have been much of an annoyance back in the 1960s, when they were first believed to have been introduced to the world of computing. But as we’ve increasingly adopted a wide range of personal gadgets and online services, they’ve become a pain to manage, and a point of vulnerability that hackers can exploit when conditions are in their favor. дальше »
2018-12-19 12:00 | |
|
|
Facebook bug allowed websites to grab unsuspecting users’ personal data
Security firm Imperva found a bug in May that allowed websites to read Facebook users and their friends’ private information. The troubling vulnerability let a site access users’ likes and interests through a manipulated Facebook Graph query. дальше »
2018-11-14 09:24 | |
|
|
Hackers exploit Bitcoin inflation bug to print 235M fake Pigeoncoins
The collateral damage from Bitcoin’s epic inflation bug continues to spread. The developers of small-cap cryptocurrency Pigeoncoin have confirmed hackers successfully exploited the vulnerability to print 235 million Pigeoncoins, worth around $15,000. дальше »
2018-10-3 14:40 | |
|
|
Bitcoin Core Bug Resolved in 0.16.3 Client: Threatened Security of Lightning Network
A GitHub report opened on September 17, 2018, revealed a recent bug in the Bitcoin Core versions 0. 14. 0 to 0. 16. 2. The exploit threatened to crash Bitcoin Core if the most recent version wasn’t updated. дальше »
2018-9-20 23:00 | |
|
|
Hackers Find Goldmine by Cryptojacking Indian Government Websites
As the Indian government further complicates their stance on whether or not citizens should be allowed to trade and own cryptocurrencies, hackers have found a way to exploit government websites in order to make a fortune in cryptocurrency through a popular hack called cryptojacking. дальше »
2018-9-18 00:00 | |
|
|
Hackers Are Still Cryptojacking Smartphones to Mine For Cryptocurrencies
Security experts recently discovered that hackers are now mining for cryptocurrencies using smartphones. On August 22, 2018, The Daily Mail reported the growing problem and highlighted the need to protect users’ smartphones. дальше »
2018-8-23 00:00 | |
|
|
Coinberry Traders Keep Control of Keys With BRD Crypto Wallet Integration
Cryptocurrency trading service Coinberry has partnered with BRD, a secure bitcoin wallet service, in a deal that promises to bring BRD's Canadian users onto Coinberry's no-fee trading platform. дальше »
2018-8-21 18:52 | |
|
|
Monero Wallet Bug Sees Altex Exchange Suffer Major Loss
Monero was found to be carrying a bug which allowed theft from digital currency exchanges, according to the researcher who found the security hazard. In order of severity, the bug was ranked nine out of a possible 10. дальше »
2018-8-3 02:00 | |
|
|
Audits and Quality Assurance: Patching the Holes in Smart Contract Security
On July 10, 2018, news broke that cryptocurrency wallet and decentralized exchange Bancor was hit with a hack. A wallet the Bancor team used to update the protocol’s smart contracts was infiltrated, and the $23. дальше »
2018-8-3 19:24 | |
|
|
Op Ed: Addressing the Threat of Cryptomining Malware
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »
2018-7-18 23:18 | |
|
|
12 |























