Tag: blockchain
-
Weaponized PyPI Package Targets Developers to Steal Source Code
Security researchers at RL have discovered a malicious Python package called >>solana-token
-
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that purports to be an application related to the Solana blockchain, but contains malicious functionality to steal source code and developer secrets.The package, named solana-token, is no longer available for download from PyPI, but not before it was downloaded 761 times.…
-
Deepfake attacks are inevitable. CISOs can’t prepare soon enough.
Tags: advisory, ai, attack, authentication, awareness, blockchain, business, ciso, compliance, control, cybersecurity, data, deep-fake, defense, detection, espionage, finance, fraud, governance, grc, identity, incident response, jobs, law, mfa, north-korea, password, privacy, resilience, risk, scam, software, strategy, tactics, technology, threat, tool, training, updateReal-world fabrications: Even security vendors have been victimized. Last year, the governance risk and compliance (GRC) lead at cybersecurity company Exabeam was hiring for an analyst, and human resources (HR) qualified a candidate that looked very good on paper with a few minor concerns, says Kevin Kirkwood, CISO.”There were gaps in how the education represented…
-
Nomad Bridge Hacker Apprehended in Connection with $190 Million Heist
Alexander Gurevich, a 47-year-old dual Russian-Israeli citizen, was arrested last Thursday at Ben-Gurion Airport while attempting to flee to Russia under a new identity. Gurevich is the primary suspect in the 2022 Nomad Bridge hack that resulted in approximately $190 million in stolen cryptocurrency, marking one of the largest blockchain security breaches that year. Israeli…
-
Altman’s eyeball-scanning biometric blockchain orbs officially come to America
El Reg checks out shop in SF First seen on theregister.com Jump to article: www.theregister.com/2025/05/04/sam_altman_startup_world/
-
The 14 most valuable cybersecurity certifications
Tags: access, ai, application-security, attack, automation, best-practice, blockchain, blueteam, china, cisa, cisco, ciso, cloud, compliance, computer, computing, conference, control, country, credentials, cryptography, cyber, cybersecurity, data, defense, encryption, endpoint, exploit, finance, governance, government, guide, hacker, hacking, incident response, intelligence, Internet, jobs, kali, law, linux, malware, metric, microsoft, monitoring, network, penetration-testing, privacy, reverse-engineering, risk, risk-analysis, risk-management, skills, threat, training, vulnerability, windowsIndustry recognition Who’s to say one certification is more respected than another? Such criteria can be very subjective, so we turned to the most direct and unbiased source to cut through the ambiguity: job listings. In addition to education, skills, and qualifications, employers often specify certs they seek in their ideal candidate. These mentions carry…
-
Cryptocurrency Found Lacking at RSAC Cryptographers’ Panel
Hot Topics Also Include Quantum Computing, Blockchains, Artificial Intelligence. Cryptocurrencies have dramatically failed to live up to their promise, to the extent that the world would be better without them, said cryptographer Adi Shamir at this year’s RSAC Conference, during an expert panel that touched on artificial intelligence, quantum computing, blockchains and more. First seen…
-
dRPC Launches NodeHaus to Streamline Blockchain and Web3 Infrastructure
Blockchain infrastructure provider dRPC has announced the launch of a NodeHaus platform that enables chain foundations unprecedented control… First seen on hackread.com Jump to article: hackread.com/drpc-launches-nodehaus-blockchain-web3-infrastructure/
-
Blockchain Offers Security Benefits But Don’t Neglect Your Passwords
Blockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant applications for online authentication. As businesses in varying sectors increasingly embrace blockchain-based security tools, could the technology one day replace passwords?How blockchain works Blockchain is a secure way to maintain, encrypt, and exchange digital records of transactions. First seen…
-
Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats
Partisia, Squareroot8, and NuSpace join forces in a global partnership to advance quantum-safe communications. The post Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/blockchain-quantum-and-iot-firms-unite-to-secure-satellite-communications-against-quantum-threats/
-
Top 16 OffSec, pen-testing, and ethical hacking certifications
Tags: access, android, antivirus, application-security, attack, authentication, blockchain, bug-bounty, business, cisco, cloud, computing, credentials, crypto, cryptography, cyber, cybersecurity, data, defense, detection, encryption, exploit, guide, hacker, hacking, incident response, injection, iot, jobs, kali, linux, malware, microsoft, mitigation, mobile, network, penetration-testing, RedTeam, remote-code-execution, reverse-engineering, risk, risk-assessment, sap, skills, sql, technology, threat, tool, training, update, vulnerability, windowsExperiential learning Offensive security can’t be fully mastered through lectures alone. Candidates need hands-on training in lab environments to develop practical skills. Ideally, certification exams should include a practical assessment, such as developing an exploit to compromise a system.Because individuals learn OffSec techniques, such as penetration testing, in different ways, the most effective certifications offer…
-
7 Wege, Daten (besser) zu verschlüsseln
Tags: ai, blockchain, business, crypto, dns, encryption, github, healthcare, infrastructure, nist, office, privacy, software, updateVerschlüsseln Sie Ihre Daten zeitgemäß?Das Konzept der Kryptografie existiert schon ein paar Hundert Jahre, wird aber von findigen Wissenschaftlern und Mathematikern immer weiter vorangetrieben. Im Rahmen dieser Entwicklungsarbeit hat sich gezeigt, dass Algorithmen noch viel mehr können, als nur Daten zu schützen: Sie sind auch in der Lage, komplexe Regeln durchzusetzen und die Zusammenarbeit zu…
-
Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts
Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems.”Some of these packages have lived on npmjs.com for over 9 years, and provide legitimate functionality to blockchain developers,” Sonatype researcher Ax Sharma said. “However, […] the latest First seen…
-
DPRK IT Worker Scam: Mitigation Steps for Hiring Teams
Nisos DPRK IT Worker Scam: Mitigation Steps for Hiring Teams Nisos is tracking a network of likely North Korean (DPRK)-affiliated IT workers posing as Singaporean, Turkish, Finish and US nationals with the goal of obtaining employment in remote IT, engineering, and full-stack blockchain positions… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/dprk-it-worker-scam-mitigation-steps-for-hiring-teams/
-
Neue VanHelsing-Ransomware breitet sich rasant aus
Tags: authentication, backup, blockchain, dark-web, encryption, extortion, governance, government, linux, ransomware, service, usa, windowsDas neue Ransomware-Programm VanHelsing zielt auf Windows-, Linux-, BSD-, ARM- und ESXi-Systeme.Das neue RaaS-Projekt namens VanHelsing wurde erstmals am16. März von Forschern von CYFIRMA entdeckt, als Angreifer es für Verschlüsselung und doppelte Erpressung nutzten. Da es für Ziele der Gemeinschaft Unabhängiger Staaten (GUS) verboten ist, gehen die Security-Spezialisten davon aus, dass die Hintermänner aus Russland…
-
New VanHelsing ransomware claims three victims within a month
Tags: access, authentication, backup, blockchain, control, encryption, government, network, ransom, ransomware, service, windowsSophisticated affiliate program: VanHelsing is a refined ransomware written in C++ and, based on the compilation timestamp observed by Check Point, had claimed its first victim on the same day it got spotted by CYFIRMA.”The ransomware accepts multiple command-line arguments that control the encryption process, such as whether to encrypt network and local drives or…
-
North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks
A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North Korean IT workers to exploit GitHub for creating fake personas, enabling them to secure remote jobs in Japan and the United States. These individuals, posing as professionals from countries like Vietnam, Japan, and Singapore, primarily target roles in engineering and blockchain…
-
Blockchain gaming platform WEMIX hacked to steal $6.1 million
Blockchain gaming platform WEMIX suffered a cyberattack last month, allowing threat actors to steal 8,654,860 WEMIX tokens, valued at approximately $6,100,000 at the time. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/blockchain-gaming-platform-wemix-hacked-to-steal-61-million/
-
6 Millionen $ von einer Blockchain-Plattform gestohlen
Tags: blockchainWemix Foundation Admits to Significant Token Loss Due to Hack First seen on binance.com Jump to article: www.binance.com/en/square/post/03-17-2025-wemix-foundation-admits-to-significant-token-loss-due-to-hack-21653724242370
-
Why Small and Medium Businesses Are Adopting Blockchain Solutions
Blockchain technology is revolutionizing industries by enabling secure transactions, decentralization, and transparency. At the same time, Blockchain software… First seen on hackread.com Jump to article: hackread.com/why-small-medium-businesses-adopt-blockchain-solutions/
-
Blockchain-Sicherheit in Echtzeit: Wegbereiter für eine sichere Web3-Zukunft
Tags: blockchainDiese Partnerschaft zielt darauf ab, die größte Barriere für die Blockchain-Adoption zu beseitigen die Sicherheit. Durch eine umfassende Echtzeit-Sicherheitslösung sollen Institutionen das Vertrauen gewinnen, Blockchain-Technologien sicher und in großem Maßstab einzusetzen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/blockchain-sicherheit-in-echtzeit-wegbereiter-fuer-eine-sichere-web3-zukunft/a40067/
-
Wie Echtzeit-Cybersicherheit die Blockchain vorantreiben wird
Sicherheitsbedenken behindern die Verbreitung der Blockchain-Technologie, doch Check Point weist darauf hin, wie Echtzeit-Sicherheitslösungen das volle Potential des Web3 freisetzen können. Aus diesem Grund kam eine Partnerschaft mit Cardano zustande. Denn aus Sicht der Sicherheitsforscher von Check Point ist es gerade der Mangel an Echtzeit-Sicherheitslösungen, welcher bislang viele Manager und IT-Entscheider zweifeln lässt. Die Welt…
-
Save 70% on a Course Showing You How to Invest in Crypto
In this online training course, learn about NFTs, blockchain, decentralized apps, and more. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/complete-nft-blockchain-masterclass-bundle/
-
North Korean Fake IT Workers Pose as Blockchain Developers on GitHub
North Korean fake IT workers are creating personas on GitHub to land blockchain developer jobs at US and Japanese firms. The post North Korean Fake IT Workers Pose as Blockchain Developers on GitHub appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/north-korean-fake-it-workers-pose-as-blockchain-developers-on-github/
-
North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit
Experts from multiple blockchain security companies said Monday that the hackers were able to move all of the stolen ETH coins to new addresses, the first step taken before the funds can be laundered further. First seen on therecord.media Jump to article: therecord.media/north-koreans-initial-laundering-bybit-hack
-
Authorities Seize $31 Million Linked to Crypto Exchange Hack
U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance decentralized finance (DeFi) exploits. The coordinated effort between the U.S. Attorney’s Office for the Southern District of New York (SDNY) and Homeland Security Investigations (HSI) San Diego, aided by blockchain intelligence firm TRM Labs, represents one of the largest recoveries in…
-
How an Attacker Drained $50M from a DeFi Protocol Through Role Escalation
y: Dikla Barda, Roaman Zaikin & Oded Vanunu On February 24, Check Point Blockchain Threat Intel System observed a sophisticated attack on a DeFi protocol, Infini. Infini is a digital banking platform in the crypto space that offers its users savings yields and other financial services. The platform aims to make crypto assets more accessible…
-
Malicious npm Package Targets Developers for Supply Chain Attack
The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive cryptocurrency wallet keys from developers and users in the TON blockchain ecosystem. TON, originally developed by Telegram, is a growing platform for decentralized applications (dApps), smart contracts, and cryptocurrency transactions. The malicious package impersonated the legitimate @ton/ton package and remained undetected…

