SIEM as a Service
Home Search

cryptocurrency - search results

If you're not happy with the results, please do another search
Top 10 Notorious Ransomware Gangs of 2023

Top 10 Notorious Ransomware Gangs of 2023

By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving at a rapid pace. In...
Hackers Using Crypto Drainers in Sophisticated Phishing Attacks

Hackers Using Crypto Drainers in Sophisticated Phishing Attacks

The cryptocurrency industry has had a concerning rise in sophisticated phishing attacks. By employing a crypto wallet-draining technique, these threats are distinct in that they...
The Rise of DDoS Attacks in Q3, 2023: Are You Prepared?

The Rise of DDoS Attacks in Q3, 2023: Are You Prepared?

The Indusface AppSec Q3, 2023 Report reveals a staggering 67% surge in DDoS attacks compared to the previous quarter, highlighting a concerning trend with...
Dark Web Kingdom Market

German Authorities Taken Down Dark Web Marketplace Kingdom Market

Kingdom Market, a dark web marketplace that sold drugs, malicious software, criminal services, and counterfeit documents, has been taken down by the German Federal...
Hackers Abuse OAuth Applications to Launch Automated Finacial Attacks

Hackers Abuse OAuth Applications to Launch Automated Financial Attacks

OAuth (Open Authorization) is an industry-standard protocol that allows third-party applications to access a user's data without exposing login credentials.  This standard protocol facilitates secure...
Lazarus Group Attacking Crypto

Lazarus Group Attacking Crypto Users Via Telegram to Deploy Malware

In a calculated escalation of cyber warfare, the Lazarus Group, a notorious North Korea hacking unit, has pivoted its focus to cryptocurrency projects, employing...
The Evolving Landscape of Gaming Security

The Evolving Landscape of Gaming Security

Imagine a world where gamers not only dive deep into virtual universes but also tap into groundbreaking technologies that protect their digital pursuits. The...
Apache ActiveMQ Vulnerability

Hackers Infect Linux Machines with Rootkits via Apache ActiveMQ Vulnerability

Apache ActiveMQ is a Java-based open-source protocol that allows distributed applications to exchange messages. It uses the JMS API to provide a dependable messaging platform...
Evaluating the Merits of Trading Ethereum for Long or Short-Term Solutions 

Evaluating the Merits of Trading Ethereum for Long or Short-Term Solutions 

It's not exactly a secret that Ethereum stands as an emblem of transformative technological innovation. As enthusiasts and investors delve into the complexities of...
FBI Dismantled IPStorm and Botnet Infrastructure 

FBI Dismantled Notorious IPStorm Botnet Infrastructure 

The FBI has achieved a remarkable feat in the fight against cybercrime, dismantling the infamous IPStorm botnet network that infected tens of thousands of...
SIEM as a Service

Recent Posts