The Evolution of Hashing Algorithms: From MD5 to Modern Day

The Evolution of Hashing Algorithms: From MD5 to Modern Day

Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...
An unfortunate TikToker shows off his negative balance

TikTok ‘Infinite Money Glitch’ — Idiots Chased by JPMorgan

Dimon’s dollars (not yours): No, Chase Bank isn’t going to let you cash bad checks. It’s fraud—no matter what X and TikTok tell you ...
Security Boulevard
DOJ cryptocurrency scams

DOJ Created NexFundAI Crypto Firm in Crypto Scamming Sting

The DOJ created NexFundAI, a false cryptocurrency company and token, in a sting that nabbed 19 people and companies accused of scamming investors by falsely creating the illusion of activity around their ...
Security Boulevard

Perfectl Malware

Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...

Emulating the Surging Hadooken Malware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...
Shocking SQL Injection in TSA App & Bitcoin ATM Scams Targeting Seniors

Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors

This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of ...
FBI Warns of North Korea Attacks Against the Crypto Industry

FBI Warns of North Korea Attacks Against the Crypto Industry

 The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways.   Here is an example that the FBI is showcasing: ...

Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining

A new variant of the Gafgy botnet has recently been discovered by cybersecurity researchers. As per media reports, the botnet appears to be machines with weak SSH passwords for mining crypto. In ...