Largest Cryptocurrency Hack in History, $10k For Stolen Network Access, Your Identity and the Metaverse

Over $600 million stolen in the largest DeFi cryptocurrency hack in history, attackers are getting around $10k for stolen network access credentials, and why your identity is trapped inside a social network and what this means for the next potential evolution of the Internet…the metaverse!

** Links mentioned on the show **

Apple to refuse government demands of expanding scanning beyond child abuse

Ransomware gang uses PrintNightmare to breach Windows servers

Over $600 million reportedly stolen in cryptocurrency hack

Hackers netting average of nearly $10,000 for stolen network access

Why is your identity trapped inside a social network?

** Watch this episode on YouTube **

** Thank you to our sponsors! **


Privacy is a tool that masks your bank account information by generating virtual card numbers. So if your virtual card number gets compromised, your real card number wont! New Privacy customers will get $5 to spend on your first purchase! Visit to sign up and take back control of your online payments.

Silent Pocket

Visit to check out Silent Pocket’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit:

** Subscribe and follow the show **

Sign-up for our email newsletter to receive our free Facebook Privacy & Security Guide, new and updates about the show, contest announcements, and special offers from our sponsors:

Subscribe on your favorite podcast app:

Contact us:





The post Largest Cryptocurrency Hack in History, $10k For Stolen Network Access, Your Identity and the Metaverse appeared first on The Shared Security Show.

*** This is a Security Bloggers Network syndicated blog from The Shared Security Show authored by Tom Eston. Read the original post at: