Digital Currency

Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects
A look into Bitcoin's scripting system and how several projects use Bitcoin's features in their own software ...

Advanced Malware Targets Cryptocurrency Wallets
More attacks targeting cryptocurrency users. Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated capabilities to remain stealthy and persistent so it can harvest crypto wallet credentials via ...
North Korean Hackers Steal $1.5B in Cryptocurrency
It looks like a very sophisticated attack against the Dubai-based exchange Bybit: Bybit officials disclosed the theft of more than 400,000 ethereum and staked ethereum coins just hours after it occurred. The ...

Fake Solana packages target crypto devs, abuse Slack & ImgBB for data theft
Recently discovered malicious packages on the npmjs.com registry named "solanacore," "solana-login," and "walletcore-gen" target Solana crypto developers with Windows trojans and malware capable of keylogging and sensitive data exfiltration. Furthermore, these packages ...

The Evolution of Hashing Algorithms: From MD5 to Modern Day
Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...

Schneider Electric Confirms Ransom Hack — Hellcat Demands French Bread as ‘Joke’
That’s a lot of pain: $125,000 ransom seems small—but why do the scrotes want it paid in baguettes? ...

TikTok ‘Infinite Money Glitch’ — Idiots Chased by JPMorgan
Dimon’s dollars (not yours): No, Chase Bank isn’t going to let you cash bad checks. It’s fraud—no matter what X and TikTok tell you ...

DOJ Created NexFundAI Crypto Firm in Crypto Scamming Sting
The DOJ created NexFundAI, a false cryptocurrency company and token, in a sting that nabbed 19 people and companies accused of scamming investors by falsely creating the illusion of activity around their ...
Perfectl Malware
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...
Emulating the Surging Hadooken Malware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...