Home Search
cryptocurrency - search results
If you're not happy with the results, please do another search
How Is Social Media Used for Identity Theft?
Identity theft is only becoming more prevalent throughout the world as people share more and more information online and cybercriminals become stealthier and more...
3 Actions Enterprises Must Take After Suffering a Data Breach
Data security is paramount in modern organizations. Data breaches put your company in a vulnerable position. Not only do they attract heavy fines from...
Evilnum APT Hackers Group Attack Windows Using Weaponized Word Documents
Researchers from ThreatLabz uncovered Evilnum, an APT threat actor, is once again up to its old tricks targeting European financial and investment institutions, with some...
Tainted Password-Cracking Software Used to Deliver Sality Malware
Researchers from Dragos discovered a smaller in-scale technique targeting industrial engineers and operators during their usual vulnerability assessment.
Experts say threat actors used multiple accounts...
Uniswap Sophisticated Attack – Over $8 million worth of Ethereum Stolen
As a result of a sophisticated phishing attack, UniSwap, one of the most popular decentralized cryptocurrency exchanges, lost a large amount of Ethereum worth...
Threat Actors Claimed that They Have Stolen Data of a Billion Chinese Residents
A hacker claimed to have stolen one billion Chinese residents’ records from the Shanghai National Police database, which is considered the largest cybersecurity breach...
VPN basics: connection, installation, configuration, and shutdown
Nowadays, more and more requests in the search engines are related to the possibility of accessing the Internet safely. The reasons for that could...
MaliBot – An Android Malware Attack Banking Victims & Steal Credentials, Cookies, and Bypass...
Researchers from F5 Labs have recently detected a newly discovered breed of Android malware, called MaliBot. This malware has been targeting people in Spain...
The Crypto Industry and its Security Challenges
Digital assets made such an enormous breakthrough to the point where crypto has now become mainstream. With this type of popularity comes a lot...
Over 200 Malicious Android Apps On The Play Store Used To Steal Sensitive Data
Researchers at Trend Micro found recently that more than 200 Android applications are on the Google Play Store spreading spyware known as "Facestealer," which...