Search results for:
cryptocurrency
Uncategorized
Wealth Management in the Digital Age: Gold vs. Cryptocurrency Investments
Cryptocurrency vs. Gold: The Modern Investment Conundrum
In a time when financial markets are changing quickly, investors are faced with a difficult choice between the...
cryptocurrency
Lazarus APT Laundered Over $900 Million Worth of Cryptocurrency
Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately was the Cross-chain crime....
Cryptocurrency hack
How Does Cryptocurrency Affect Cybersecurity?
Lately, cryptocurrencies have emerged as a notable cybersecurity threat. Unsuspecting users are being scammed or hacked more than ever.
Most troubles start because people don’t...
Cyber Security News
Chrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard Contents
In order to steal cryptocurrency and clipboard contents, ViperSoftX was detected by the security analysts at Avast, a Windows malware that is using a...
CVE/vulnerability
Hackers Exploit WebLogic Vulnerabilities to Deliver Cryptocurrency-Mining Malware
In order to deliver cryptocurrency mining malware, the threat actors are actively exploiting both old and newly discovered vulnerabilities in Oracle WebLogic Server.
Recent research...
Cyber Security News
New Malware Campaign Disguised as Google Translate Distribute Cryptocurrency Miner
Cryptocurrency mining malware has been found recently in an ongoing campaign in 11 countries disguised as Google Translate and MP3 downloaders.
In order to distribute...
Cyber Security News
Hackers Exploited a Zero-day Flaw in Bitcoin ATM Servers to Steal Cryptocurrency
General Bytes Bitcoin ATM servers have been exploited by hackers in order to steal cryptocurrency from their customers as a result of a zero-day...
Cyber Attack
Lazarus Group Targeting Organizations in the Cryptocurrency and Blockchain
The FBI, CISA, and the U.S. Department of Treasury have issued a joint statement about the cryptocurrency theft and the tactics used by the...