Cryptocurrency and blockchain project databases with weak credentials and AI-generated are being hacked through deployment patterns picked up by botnets, according to new research from Check Point. A ...
North Korea-linked threat actors are escalating their cyber operations using decentralized and evasive malware tools, according to new findings from Cisco Talos and Google Threat Intelligence Group.
The blockchain-based perpetual futures swap protocol Levana announced Wednesday that it suffered an exploit that resulted in the loss of about $1.1 million worth of cryptocurrency tokens from its ...
In today's digital world, cybersecurity threats are ever-growing, making ethical hacking and penetration testing crucial components of modern security practices. Ethical hacking involves legally ...
Blockchain security firm Dedaub released a post-mortem report on the Cetus decentralized exchange hack, identifying the root cause of the attack as an exploit of the liquidity parameters used by the ...