#blockchain-security

[ follow ]
#quantum-computing
fromnews.bitcoin.com
1 day ago
Cryptocurrency

No Consensus Changes Needed: Starkware CPO Builds Quantum-Safe Bitcoin Transactions From Existing Rules

fromTechRepublic
1 week ago
Information security

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
fromSecurityWeek
1 week ago
Information security

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

No Consensus Changes Needed: Starkware CPO Builds Quantum-Safe Bitcoin Transactions From Existing Rules

Quantum Safe Bitcoin (QSB) enables secure bitcoin transactions against quantum attacks without protocol changes, costing $75 to $150 per transaction.
Information security
fromnews.bitcoin.com
1 week ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Google's whitepaper on quantum threats urges immediate post-quantum preparations, shifting the migration deadline to 2029 and highlighting vulnerabilities in blockchain security.
Information security
fromTechRepublic
1 week ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Information security
fromSecurityWeek
1 week ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Fenbushi Capital Co-Founder Bo Shen Launches Bounty to Recover $42M Crypto Theft From 2022

A significant crypto theft of $42 million occurred due to a compromised seed phrase, with ongoing efforts to trace and recover the stolen assets.
fromCointelegraph
6 months ago

Applied MEV protection via Shutter's threshold encryption

MEV is especially notorious on Ethereum, where it continues to be extracted at a rate equivalent to 11% of block rewards. Data shows that nearly $300,000 was lost in sandwich attacks in September. This reveals that MEV is a recurring hidden fee, not a minor inefficiency, hitting large trades hardest in volatile markets.
Cryptocurrency
fromCointelegraph
5 months ago

How Batched Threshold Encryption could end extractive MEV and make DeFi fair again

On most modern blockchains, transaction data is publicly viewable in the mempool before it is sequenced, executed and confirmed in a block. This transparency creates avenues for sophisticated parties to engage in extractive practices known as Maximal Extractable Value (MEV). MEV exploits the block proposer's ability to reorder, include or omit transactions for financial gain.
Cryptocurrency
Information security
fromCointelegraph
1 month ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
fromThe Hacker News
2 months ago

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check Point Research said in a technical report published last week.
Information security
#bitcoin
fromHackernoon
4 years ago
Cryptocurrency

Bitcoin Mining's Centralization Threat: Six Pools Now Control 95% of Mined Blocks | HackerNoon

fromHackernoon
4 years ago
Cryptocurrency

Bitcoin Mining's Centralization Threat: Six Pools Now Control 95% of Mined Blocks | HackerNoon

Information security
fromArs Technica
3 months ago

Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025

Supply-chain attacks surged in 2024–2025, allowing attackers to compromise single targets and infect thousands or millions of downstream users, causing widespread theft and outages.
fromTheregister
5 months ago

Attackers dig up $11M in Garden Finance crypto exploit

In a statement issued on Friday, Garden again said that user funds were safe and that the attack exploited one of its solvers. In the context of decentralized finance, a solver is typically an algorithm or trading agent that's relied on to execute transactions in the most efficient manner possible. Garden is a blockchain bridge protocol company, and its solvers earn a small profit for carrying out transactions between blockchains.
Information security
#ethereum
fromHackernoon
8 months ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

fromHackernoon
8 months ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

Cryptocurrency
fromHackernoon
2 years ago

The Limits of Automated Selfish Mining Detection | HackerNoon

The analysis provides a fully automated procedure with formal correctness guarantees for selfish mining attacks in blockchain.
fromcointelegraph.com
9 months ago

The crypto trap that won't let you sell and how to avoid it

Modern honeypot scams involve deceptive tactics such as tampered wallets sold on platforms like TikTok, which are preloaded with private keys used to instantly steal funds.
Cryptocurrency
[ Load more ]