Decentralized Protocols Are Soft Targets for North Korean Hackers

North Korean hacking groups have been targeting crypto for years. The 2022 $625 million Ronin bridge…

North Korean Hackers Are Using Python-Based Malware to Infiltrate Top Crypto Firms

A North Korean hacking group is targeting crypto workers with a Python-based malware disguised as part…

How hackers use fake X links to steal crypto, and how to spot them

How fake X links work Hackers often hijack trusted accounts or create fake ones to post…

Pectra lets hackers drain wallets with just an offchain signature

Ethereum’s latest network upgrade, Pectra, introduced powerful new features aimed at improving scalability and smart account…

Message App That Waltz Was Seen Using Is Probing Possible Breach

TeleMessage, the message-archiving app that former National Security Adviser Michael Waltz appeared to be using in…

Hertz Says Hackers Stole License Numbers, Credit Card Data

Hertz is alerting customers to a data breach involving drivers’ license numbers and other personal information…

Hackers Spied on 100 US Bank Regulators’ Emails for Over a Year

Hackers intercepted about 103 bank regulators’ emails for more than a year, gaining access to highly…

RISC Architecture Really Did Change Everything

Yes. We’ve been here before. A second war of the architectures. In Hackers, a group of…