SIEM as a Service
Home Search

cryptocurrency - search results

If you're not happy with the results, please do another search
Preventing Phishing Attacks

Preventing Phishing Attacks on Cryptocurrency Exchanges

Cryptocurrency exchanges are intensifying security measures in 2025 to focus on preventing phishing attacks, as these scams reach alarming levels and have caused millions...

DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots – Researchers...

North Korean state-sponsored hackers have executed what security experts are calling the largest cryptocurrency theft operation to date, successfully stealing an estimated $625 million...

Threat Actors Taking Advantage of Unsecured Kubernetes Clusters for Cryptocurrency Mining

In a troubling development for cybersecurity professionals, threat actors are increasingly targeting unsecured Kubernetes clusters to deploy cryptocurrency mining operations, leveraging the computational resources...
privacy coins have carved out a significant niche in the broader digital asset landscape. With rising concerns around surveillance, data tracking, and regulatory scrutiny, users are increasingly seeking out cryptocurrencies that offer anonymity and untraceability. This guide explores everything you need to know about privacy coins in 2024 — their purpose, how they work, the top contenders, regulatory developments, and their role in the future of decentralized finance (DeFi).

Privacy Coins: The Complete Guide to Anonymous Cryptocurrency in 2024

As the cryptocurrency ecosystem continues to evolve, privacy coins have carved out a significant niche in the broader digital asset landscape. With rising concerns...

Malicious Python Packages Attacking Popular Cryptocurrency Library To Steal Sensitive Data

Cybersecurity experts have identified a new threat targeting cryptocurrency developers and users. Two malicious Python packages have been discovered on the Python Package Index (PyPI)...

New Zhong Malware Exploit AnyDesk Tool To Attack Fintech & Cryptocurrency

A sophisticated malware campaign leveraging social engineering tactics has targeted financial technology and cryptocurrency platforms between December 20–24, 2024. Dubbed Zhong Stealer, this previously undocumented...
Tor Project X Account Hacked

Tor Project X Account Hacked to Promote Cryptocurrency Scheme

The Tor Project, a renowned organization dedicated to online privacy and anonymity, has fallen victim to a cyberattack. On January 30, 2025, the group’s...
Hackers Stolen $85 Million Worth of Cryptocurrency

Hackers Stolen $85 Million Worth of Cryptocurrency from Phemex

Phemex, a cryptocurrency exchange based in Singapore, suffered a significant cyberattack that resulted in the theft of $85 million worth of digital assets.  The platform's...

6 Trends Shaping Cryptocurrency and Blockchain in 2025

Cryptocurrency and blockchain technology have gone from niche ideas to forces transforming the real world. In 2025, these technologies are stepping into a new...
PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

A significant PHP server vulnerability identified as CVE-2024-4577 was exploited to inject PacketCrypt Classic Cryptocurrency Miner. This PHP CGI Argument Injection vulnerability allows an attacker...
SIEM as a Service

Recent Posts