Researchers detail Aeternum C2 storing botnet commands on Polygon blockchain, while DSLRoot operates 300 residential proxy ...
Blockchain lender Figure said hackers accessed customer data after an employee was targeted in a social engineering attack.
The Flow blockchain is set to resume operations following a key decision by its validators to revert the network’s transaction ledger to a state before a major security breach late Friday, which ...
Figure confirms customer data breach after social engineering attack. ShinyHunters published 2.5GB; credit monitoring offered ...
Blockchain provides a permanent, verifiable record of transactions, aiding in detecting tampering or unauthorized access. Logs stored on the blockchain are transparent and resistant to alteration. All ...
Discover what a crypto worm is and how this self-replicating form of crypto-malware exploits blockchain vulnerabilities ...
The layer-1 network, Flow, scrapped plans to roll back its blockchain following a $3.9 million exploit, reversing course after pushback from ecosystem partners who warned that rewriting chain history ...
Months after its nightmarish launch, cryptocurrency and blockchain security researchers are still finding vulnerabilities in EOS, according to recent activity on breach disclosure platform HackerOne.
The Houston-based company behind the HEWE token and AmChain blockchain is rebuilding its infrastructure from the ground up ...
A hot potato: By embedding malicious code into the cryptographic backbone of blockchain networks, hackers are effectively turning one of the most tamper-resistant technologies into a resilient ...
Overview: Blockchain improves security and transparency in e-commerce by preventing fraud, protecting customer data, and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results