Threat actors often exploit the cloud services for cryptomining, as doing so allows them to abuse the huge…
Browsing: Exploiting
Cybercriminals are targeting vulnerable Docker servers by deploying two containers: a standard XMRig miner and the 9Hits viewer…
Dec 13, 2023NewsroomCryptocurrency / Threat Analysis Microsoft has warned that adversaries are using OAuth applications as an automation…
A hacker has been charged by a New York prosecutor for exploiting a decentralized exchange (DEX) on the…
In a significant development highlighting the vulnerability of digital assets, a recent case has come to light involving…
This week, the DeFi crypto space is buzzing with the potential of three powerful platforms: Orbeon Protocol (ORBN),…
The Cybersecurity and Infrastructure Security Agency (CISA) said Iranian hackers breached a federal agency that failed to patch…
Cyble Research & Intelligence Labs (CRIL) recently uncovered a phishing campaign used by threat actors to deliver cryptocurrency…
Would-be IT startups based out of a government-backed technopark in Kazakhstan’s capital, Astana, have been mining cryptocurrencies and…
On January 7, 2022, Ethereum co-founder Vitalik Buterin warned about the security of cross-blockchain bridges. He presciently argued…