News About Half of Crypto Stolen by Hackers Due to IT Infrastructure Vulnerabilities According to analysts, in 2022, more than 46% of cryptocurrencies were stolen in hacker attacks on blockchain projects due to infrastructure vulnerabilities and problems with computer systems, rather than due… 2 weeks ago (upd. 16.11.2023) #Hacking #News #Web3
News New Type of Phishing Attacks on Crypto Users Revealed A cybersecurity monitoring company has discovered that hackers are actively using fake apps like Skype or Telegram for phishing scams. SlowMist analysts have found that Chinese hackers have invented a… 2 weeks ago (upd. 14.11.2023) #Hacking #News #Scam
News Australian Companies to Report Cyberattacks to Authorities Australia’s new national cybersecurity strategy requires local companies to report incidents involving hackers using ransomware to regulators, regardless of whether their demands have been met. Australian businesses will have to… 2 weeks ago (upd. 13.11.2023) #Hacking #News #Regulation
News Lazarus Group Uses New Malware to Hack Crypto Exchange A group of North Korean hackers have spread a new type of malware via a loader program, intending to compromise a cryptocurrency exchange. Analysts at cybersecurity company Elastic Security Labs… 4 weeks ago (upd. 02.11.2023) #Hacking #News
Business What Can On-Chain Analysis Discover? Match Systems and Its Investigation Cases Many members of the crypto community mistakenly believe that any user can extract and analyze data from the blockchain. There’s some truth to this, as public blockchain networks are highly… 4 weeks ago (upd. 02.11.2023) #Analysis #Editor's_choice #Hacking
Business How Are Hacks on Web3 Projects Investigated? Match Systems and Its Experience What is essential for executives of Web3 companies to know in order to prevent hacker attacks in 2023? What are the top attack vectors targeting blockchain projects today? What tools… 4 weeks ago (upd. 31.10.2023) #Editor's_choice #Hacking #Interview
News 3 Key Hacking Methods for Gaining Access to Crypto Wallets Identified Hackers use three methods to steal digital assets that give them access to users’ crypto wallets. These techniques include using search engines, stealing data from the clipboard, and deception through… 4 weeks ago (upd. 30.10.2023) #Hacking #News
Columns What to Do If Your Cryptocurrency Was Stolen? Security issues in the cryptocurrency industry are particularly acute. Hackers and scammers take advantage of a relatively new, high-tech, and poorly regulated field. Entire teams of attackers exploit bugs in… 4 weeks ago (upd. 30.10.2023) #Analysis #Editor's_choice #Hacking
News Rug Pull Accounted for Over 65% of Crypto Attacks in Q3 2023 A rug pull has become the most popular scam scheme in Q3 2023, accounting for more than 65% of all attacks on crypto users during this period. According to data… 1 month ago (upd. 26.10.2023) #Hacking #News #Scam
News Lightning Network Suffers New Type of Hacker Attack The developer of the Layer 2 protocol for the Bitcoin Lightning Network has reported that the network faces a new type of replacement cycling attack, which could require changes to… 1 month ago (upd. 23.10.2023) #Bitcoin #Hacking #News