Digital Currency
Emulating the Surging Hadooken Malware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...

Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors
This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of ...

FBI Warns of North Korea Attacks Against the Crypto Industry
 The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways.  Here is an example that the FBI is showcasing: ...
Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining
A new variant of the Gafgy botnet has recently been discovered by cybersecurity researchers. As per media reports, the botnet appears to be machines with weak SSH passwords for mining crypto. In ...

Squarespace Hacked — DeFi Wallets Drained (Imaginary Money Stolen)
DeFAIL: Cryptocurrency fans lose their worthless tokens via phishing attacks on decenÂtralÂized finance sites ...
Commando Cat Docker Cryptojacking: Alert & Prevention Tips
Recent reports have unveiled a concerning cyber threat orchestrated by a group identified as Commando Cat. This threat actor has been actively engaging in cryptojacking campaigns, leveraging vulnerabilities in Docker instances to ...
Alert: Palo Alto Networks Prey to RedTail Malware Exploits
In a recent development, threat actors behind the RedTail cryptojacking mining malware have expanded their arsenal by exploiting a newly disclosed IT infrastructure security flaw in Palo Alto Networks firewall exploit. This ...
GHOSTENGINE Exploit: Vulnerable Drivers Facing Attack
A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE, a cryptojacking campaign employing a sophisticated method to bypass security measures. In this blog, we’ll look at the GHOSTENGINE ...

Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds
It took two brothers who went to MIT months to plan how they were going to steal, launder and hide millions of dollars in cryptocurrency -- and only 12 seconds to actually ...
Ukrainian REvil Hacker Gets 13-Year Sentence Plus $16M Fine
In a significant victory against cybercrime, the Ukrainian REvil hacker has been sentenced to over 13 years in prison and ordered to pay a hefty fine of $16 million for orchestrating thousands ...