Результатов: 324

Исследователь: баг в ProgPoW делает выгодным майнинг Ethereum на ASIC-устройствах

Независимый японский исследователь и разработчик под ником kikx выявил уязвимость в решении ProgPoW, призванном сделать неэффективным майнинг Ethereum на ASIC-оборудовании. Finally, I decided to disclose ProgPoW vulnerability exploits ASIC resistance for the future of Ethereum. дальше »

2020-3-7 20:09


Flash Loans - Mapping the esoteric landscape of DeFi

Andy talks with self-described ‘flash loans maximalist’ Stani Kulechov, founder and CEO of the Aave Protocol. We explore the exotic and esoteric landscape of Decentralized Finance. Against the backdrop of the recent DeFi exploits, we discuss the new flash loan innovation that allows traders to take out a loan without collateral by paying back the loan in the same smart contract transaction. дальше »

2020-2-27 12:30


Фото:

Ethereum Foundation donates $18K to UNICEF’s new cryptocurrency fund

Further to its previous blockchain exploits, the United Nations Children’s Fund, more commonly known as UNICEF, is now taking donations in cryptocurrency. According to an announcement earlier today, UNICEF is setting up a “cryptocurrency fund” so that it can “receive, hold, and disburse donations of cryptocurrencies,” specifically Bitcoin and Ethereum. дальше »

2019-10-9 12:55


Фото:

Adware campaign exploits Chrome and Safari bugs to serve over 1B malicious ads

Threat actors have exploited “obscure” bugs in WebKit and Chrome browsers to serve over 1 billion malicious ads in less than two months, a new research has found. The attackers targeted iOS and macOS users with zero-day vulnerabilities in Chrome and Safari browsers that bypassed built-in security protections to show potential victims intrusive pop-up ads, and redirect users to malicious sites. дальше »

2019-10-2 09:16


Mobile malware campaign targeting Uyghur Muslims impacted Tibetans too

The mobile malware campaign targeting the Uyghur Muslim minority in China was also directed at senior members of Tibetan groups, according to new research. The details — disclosed by University of Toronto’s Citizen Lab and TechCrunch — reveal that the targets were sent specifically tailored malicious web links over WhatsApp, which, when opened, exploited browser vulnerabilities on iOS and Android devices to install spyware, and surreptitiously stole private and sensitive information. дальше »

2019-9-25 11:36


Фото:

Meet Panda, an illicit cryptocurrency mining crew terrorizing organizations worldwide

Cybersecurity researchers have profiled a hacking crew named “Panda” believed to have amassed roughly $90,000 worth of cryptocurrency via remote access tools (RATs) and illicit mining malware. The Cisco Talos Intelligence Group noted that while Panda isn’t exactly sophisticated, it has persisted as one of the internet’s most active attackers in recent years. дальше »

2019-9-18 15:12


Фото:

Nasty Glupteba malware uses Bitcoin blockchain to keep itself alive

Cybersecurity researchers have discovered a new strain of the nefarious Glupteba malware that uses the Bitcoin blockchain to ensure it remains dangerous. TrendMicro’s latest blog details the previously undocumented variant which is capable of invading systems to mine Monero cryptocurrency and steal sensitive browser data like passwords and cookies. дальше »

2019-9-4 17:09


Фото:

iPhone spyware campaign reportedly targeted Uyghur Muslims for 2 years

The data-stealing iPhone exploits detailed by Google last week may been used for state-sponsored campaigns targeting the Uyghur Muslim minority in China‘s autonomous region of Xinjiang. “The websites were part of a campaign to target the religious group by infecting an iPhone with malicious code simply by visiting a booby-trapped web page,” TechCrunch revealed, citing sources familiar with the matter. дальше »

2019-9-2 08:45


Criminals Raise the Stakes in Crypto Mining Malware Using Confluence Exploit Per Trend Micro Find

Cybercriminals are getting bolder and smarter all the time and it is hard to keep up with them, as they keep finding new exploits in several pieces of software. Now, it was recently discovered by the security intelligence company Trend Micro that the Confluence software, created by Atlassian, was used to spread crypto mining malware. […] дальше »

2019-5-8 02:30