Thursday, March 28, 2024

South Korean Crypto Exchange Coinrail Hacked and Attackers Steal $40M in Tokens

0
Coinrail Hacked, attackers have stolen more than $40 million in ICO tokens and altcoins from the company servers.The South Korean crypto exchange Coinrail ranks...

A Scary Evolution & Alliance of TrickBot, Emotet and Ryuk Ransomware Attack

0
Ryuk first appeared in August 2018, and while not incredibly active across the globe, at least three organizations were hit with Ryuk infections over...

Malicious Chrome and Edge Browser Extension Deliver Powerful Backdoor & RAT to Spy Victims...

0
A malicious Chrome and Edge Browser Extension delivers powerful backdoor to stealing information from the browsers and monitor the victim's activities.A downloader that delivers the...

Hackers Tried to use ‘Spider-Man: No Way Home’ movie to Deliver Monero Cryptominer

0
The cyber security experts at ReasonLabs have recently detected that hackers are using the 'Spider-Man: No Way Home' movie to deliver Monero crytominer through...

PyCryptoMiner – A New Linux Crypto-miner Botnet Spreading over the SSH Protocol to Mining...

0
Highly Sophisticated Python Script Based Linux Crypto-miner botnet called PyCryptoMiner abusing SSH port and targeting Linux users to mining Monero CryptoCurrency.Its written in python language...

New Hacking Tools launching Crypto-Malware by Exploit a Windows SMB Server Vulnerability

0
Cybercriminals now leveraging new hacking tools and remote access software to drop cryptocurrency malware by exploiting a Windows SMB Server Vulnerability .There are 2 main hacking...

How Does Cryptocurrency Affect Cybersecurity?

0
Lately, cryptocurrencies have emerged as a notable cybersecurity threat. Unsuspecting users are being scammed or hacked more than ever.Most troubles start because people don’t...
YouHodler

Crypto Loans Platform YouHodler Exposes Unencrypted Customer data that Includes Credit cards and Bank...

0
Noam Rotem and Ran Locar with their research team found a database leak in YouHodler. YouHodler, A Crypto lending site offered an easy way...

100 Million IoT Smart Devices are Vulnerable to Z-Wave Wireless Communications Protocol Downgrade...

0
Z-Wave, a Wireless Communication Protocol that widely used in IoT Smart Devices vulnerability allow attackers to perform Downgrade Attack and compromise nearly 100 Million...

Hackers Steal $540 Million From Axie Infinity Using a Fake Job Offer on LinkedIn

0
During the month of March 2022, one of Axie Infinity's former employees became the victim of a fake job offer on LinkedIn and applied...

Managed WAF protection

Website

Recent Articles