Hacker

52 Articles 0 Followers


Cybersecurity is Approaching a Crisis

21 Aug 2023 1 minute read 0 comments Matthew Rosenquist

Cybersecurity has a growing problem that will force an evolution in the industry — it must deliver more recognizable value! Cybersecurity must re-envision itself to both protect and become an active contributor to the overarching business goals. Emb...

Selfish People Steal, HONEST People Invest In The Future...

11 Aug 2023 1 minute read 0 comments CodyMac50

It's always terrible reading about people who have been scammed, or phished, or "hoodwinked" or their money held ransom by a thief. A while back I got an email telling me that google had a data breach, and my password for several accounts was publish...

Poly Network hacker issues over 2 trillion tokens

5 Jul 2023 3 minute read 0 comments Coinpaper

Poly Network overlooked a serious security vulnerability resulting from a weak multisig arrangement that allowed an attacker to hack the system and mint tokens.   Yesterday, Poly Network, a global cross-chain protocol, shocked its users with news abo...

Cryptanalysis of the DAO exploit & Multi-Stage Attack

27 Jun 2023 27 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH     In this article, we will look at a bug in the DAO code. The hacker exploited a bug in the code of the DAO and stole more or less $50 million worth of ether. I will focus here only on the main technical issue of the exploit: T...

North Korean hackers unleash a devastating assault, brazenly pilfering a staggering $721 million worth of cryptocurrencies from Japan!

21 May 2023 1 minute read 0 comments Crypto4you23

Startling disclosure! This audacious act of digital banditry strikes at the heart of global financial security, sending shockwaves through the digital realm. The brazenness and audacity of these nefarious hackers highlight the growing threat posed by...

Cross-Chain Bridges as the value of the Blockchain becomes attractive for various attacks

17 Nov 2022 3 minute read 0 comments CryptoDeep

CRYPTO DEEP TECH   This article will focus on a vulnerability in inter-network bridge protocols, which is a big security threat to smart contracts between different blockchains. Cross bridges are an attractive target for hackers because they ofte...

Top 5 Crypto Exchanges that have never been hacked — SECURITY SERIES

8 Sep 2022 2 minute read 2 comments TheNiftyRevolution

  Since they became widely accepted two years ago, cryptocurrencies have drawn a variety of investors from all around the world. The crypto industry has drawn hackers’ attention as a result of the acceleration in growth, and the number of hacking in...

The Scam Token $STRANGER On BCHSmartChain Works Like A Virus

30 Oct 2021 2 minute read 17 comments Cryptonator`s

Today I asked users for shitcoin donations in form of SLP tokens running on the BCHSmartChain. I received a token called HONK, a token called FEEL and then one user wanted to donate me a token called STRANGER. This token was no shitcoin anymore as it...

600 Million Differences Between Hackers and Cybercriminals

16 Aug 2021 1 minute read 3 comments Matthew Rosenquist

There are 600 Million Differences Between Hackers and Cybercriminals… An amazing story is emerging from a massive cryptocurrency exploitation that exemplifies the difference between a ‘hacker’ and a ‘cybercriminal’.     Interested in more cybersecur...

Why REvil Ransomware Group Suddenly Disappeared

20 Jul 2021 1 minute read 0 comments Matthew Rosenquist

The notorious REvil ransomware cybercriminal group suddenly disappeared without explanation, spurring lots of speculation in the cybersecurity community. In this week’s video, we go over the results of a recent poll among security professionals that...