What Is Cryptojacking? How It Works and How to Protect Against It

What Is Cryptojacking? How It Works and How to Protect Against It

Cryptojacking is the unauthorized use of another computer to “mine” cryptocurrency—using them to run complex and taxing algorithms. The post What Is Cryptojacking? How It Works and How to Protect Against It ...
The new DOJ Law Enforcement Crypto Reports (TL;DR)

The new DOJ Law Enforcement Crypto Reports (TL;DR)

| | Bitcoin, crypto currency, DOJ, FBI, NFTs, USSS
TL;DR? Good news!  I read them for you!  On 15SEP2022, the Department of Justice released their report "The Role of Law Enforcement in Detecting, Investigating, and Prosecuting Criminal Activity Related to Digital Assets" ...

New Linux Cryptomining Malware

It’s pretty nasty: The malware was dubbed “Shikitega” for its extensive use of the popular Shikata Ga Nai polymorphic encoder, which allows the malware to “mutate” its code to avoid detection. Shikitega ...

Responsible Disclosure for Cryptocurrency Security

Stewart Baker discusses why the industry-norm responsible disclosure for software vulnerabilities fails for cryptocurrency software. Why can’t the cryptocurrency industry solve the problem the way the software and hardware industries do, by ...

FBI issues warning after crypto-crooks steal $1.3 billion in just three months

Amid a wave of hacks that have cost investors billions of dollars worth of cryptocurrency, the FBI is calling on decentralised finance (DeFi) platforms to improve their security. In a warning posted ...
🥇

Cyber Security DE:CODED – Cloud security

“As long as anything is online, it’s open for strangers to try to break protection” Show notes for series 2, episode 4 The ‘cloud’ is integrating with our lives at ever more ...

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 15, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us ...
How the typical pig butchering scam correspondence starts.

5 tips for spotting and avoiding Pig butchering scams

A new type of scam, called “pig butchering” is gaining momentum. Pig butchering is a unique scam which uses a romance scam script, but with an investment spin on it, where victims ...
metaverse cloud NATO Challenges of Securing a Cloud-Native World

Securing the Metaverse – Lessons Learned From Cloud Adoption

| | Cloud, Cloud Adoption, Metaverse
The hype around the metaverse continues with more questions than answers regarding how cybersecurity, privacy, trust and identity will play a part in enabling metaverse security. Will decentralized identity play a role? ...
Security Boulevard
FAIL: Nomad DeFi Bridge ‘Loses’ $190M of Worthless Tokens

FAIL: Nomad DeFi Bridge ‘Loses’ $190M of Worthless Tokens

Cryptocurrency startup Nomad claimed its “optimistic bridging” protocol would “would keep users’ funds safe.” We take a closer look ...
Security Boulevard