Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Cryptocurrency

Cryptocurrency laundromat Blender shredded by US Treasury in sanctions first

6 May 2022

The US Treasury has sanctioned cryptocurrency mixer Blender for its role in helping North Korea’s Lazarus Group launder stolen digital …

Tags Blender, Cryptocurrency, Open Source, Open Source Software, Treasury

Lazarus Group Targeting Organizations in the Cryptocurrency and Blockchain

21 April 2022

The FBI, CISA, and the U.S. Department of Treasury have issued a joint statement about the cryptocurrency theft and the tactics used by the …

Tags Blockchains, Cryptocurrency, Cyber Attack, Organizations, Targeting

US Government: North Korean Threat Actors Are Targeting Cryptocurrency Organizations

20 April 2022

The US government has warned that North Korean state-sponsored cyber actors are targeting organizations in the blockchain and …

Tags Cryptocurrency, IT, North, Organizations, Targeting

LAZARUS APT Using TraderTraitor Malware to Target Blockchain Orgs, Users

20 April 2022

Lazarus APT group is backed by the North Korean government and is currently targeting organizations and unsuspecting users in the …

Tags APT, Cryptocurrency, Targets, Users, Using

Beanstalk cryptocurrency heist: scammer votes himself all the money

19 April 2022

Back when the Bitcoin protocol was invented, the idea was to build a simple global payment system that wasn’t (and couldn’t be) …

Tags Beanstalk, Blockchains, Cryptocurrency, IT, Security Pro

MetaMask Asks Apple Users to Disable iCloud Backup for Wallet After User Lost $650,000

19 April 2022

MetaMask has warned Apple users to disable automatic iCloud backup of their wallet data. The warning results from the losses sustained by …

Tags After, Cloud Computing, Cloud Storage, Cryptocurrency, Cyber Crime

How Cryptocurrency Gave Birth to the Ransomware Epidemic

15 April 2022

It’s a decades old problem, but it has become prevalent in the last few years, when dozens of cybercriminal gangs have started developing …

Tags Birth, Cryptocurrency, Cyber Threats, Hacking, How

US Links Largest Cryptocurrency Heist to North Korean Hackers

14 April 2022

The US apparently suspects North Korean hackers were involved in last month’s $622 million cryptocurrency heist at Ronin Network. On …

Tags Cryptocurrency, Heist, IT, News

US cryptocurrency coder gets 5 years for North Korea sanctions busting

13 April 2022

The cryptocurrency world is full of weird stories. You’ve probably heard of the Welshman who who claimed he inadvertently threw away a …

Tags Cryptocurrency, FBI, IT, News, North Korea

Using Data Scraping to Learn What You Need to Know

7 April 2022

How can you know what you don’t know? It sounds like a rhetorical question, but it is in fact a vital component of business …

Tags A.I, Big Data, Contributors, Cryptocurrency, IT

Serious Security: Darkweb drugs market Hydra taken offline by German police

6 April 2022

German police have located and closed down the servers of Hydra, allegedly one of the world’s biggest underground online stores. …

Tags Cryptocurrency, Darkweb, German, Hydra, IT

Experts Uncover Campaign Stealing Cryptocurrency from Android and iPhone Users

25 March 2022

Researchers have blown the lid off a sophisticated malicious scheme primarily targeting Chinese users via copycat apps on Android and iOS …

Tags Campaigns, Cryptocurrency, Experts, iPhone, Stealing

UK police arrest 7 hacking suspects – have they bust the LAPSUS$ gang?

25 March 2022

You’ve almost certainly heard of the LAPSUS$ hacking crew. That’s lapsus, which is as good a Latin word as any for “data breach”, …

Tags Cryptocurrency, Cybercrime, IT, News, UK

Hackers Target Cryptocurrency Companies in HubSpot Data Breach

23 March 2022

HubSpot, a Cambridge, Mass.-based provider of CRM, sales and marketing software, confirmed that hackers targeted customers in the …

Tags Companies, Cryptocurrency, Cyber Threats, Hacking, HubSpot
Post navigation
Older posts
Page1 Page2 … Page84 Next →
Cookie-Free

NVD

  • CVE-2022-29661 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-29686 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-29662 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022
  • CVE-2022-29687 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-29663 – CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via …26 May 2022
  • CVE-2022-29688 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022
  • ISaPWN – research on the security of ISaGRAF Runtime23 May 2022
  • Evaluation of cyber activities and the threat landscape in Ukraine17 May 2022
  • HTML attachments in phishing e-mails16 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »