Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects

Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects

A look into Bitcoin's scripting system and how several projects use Bitcoin's features in their own software ...
Advanced Malware Targets Cryptocurrency Wallets

Advanced Malware Targets Cryptocurrency Wallets

 More attacks targeting cryptocurrency users.  Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated capabilities to remain stealthy and persistent so it can harvest crypto wallet credentials via ...

North Korean Hackers Steal $1.5B in Cryptocurrency

It looks like a very sophisticated attack against the Dubai-based exchange Bybit: Bybit officials disclosed the theft of more than 400,000 ethereum and staked ethereum coins just hours after it occurred. The ...
Fake Solana packages target crypto devs, abuse Slack & ImgBB for data theft

Fake Solana packages target crypto devs, abuse Slack & ImgBB for data theft

Recently discovered malicious packages on the npmjs.com registry named "solanacore," "solana-login," and "walletcore-gen" target Solana crypto developers with Windows trojans and malware capable of keylogging and sensitive data exfiltration. Furthermore, these packages ...
The Evolution of Hashing Algorithms: From MD5 to Modern Day

The Evolution of Hashing Algorithms: From MD5 to Modern Day

Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...
An unfortunate TikToker shows off his negative balance

TikTok ‘Infinite Money Glitch’ — Idiots Chased by JPMorgan

Dimon’s dollars (not yours): No, Chase Bank isn’t going to let you cash bad checks. It’s fraud—no matter what X and TikTok tell you ...
Security Boulevard
DOJ cryptocurrency scams

DOJ Created NexFundAI Crypto Firm in Crypto Scamming Sting

The DOJ created NexFundAI, a false cryptocurrency company and token, in a sting that nabbed 19 people and companies accused of scamming investors by falsely creating the illusion of activity around their ...
Security Boulevard

Perfectl Malware

Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...

Emulating the Surging Hadooken Malware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...