#lumma-stealer

[ follow ]
#aave
Information security
fromnews.bitcoin.com
21 hours ago

Five Major DeFi Protocols Ask Arbitrum DAO to Free 30,765 ETH Locked After rsETH Bridge Bug

Aave Labs and KelpDAO proposed to release 30,765.67 ETH frozen by Arbitrum's Security Council due to a KelpDAO bridge exploit affecting rsETH backing.
Information security
fromnews.bitcoin.com
21 hours ago

Five Major DeFi Protocols Ask Arbitrum DAO to Free 30,765 ETH Locked After rsETH Bridge Bug

Aave Labs and KelpDAO proposed to release 30,765.67 ETH frozen by Arbitrum's Security Council due to a KelpDAO bridge exploit affecting rsETH backing.
Cryptocurrency
fromnews.bitcoin.com
20 hours ago

Litecoin Confirms Zero-Day Bug Caused 13-Block Reorg, Network Patched and Stable

Litecoin confirmed a zero-day bug caused a denial-of-service attack, leading to a 13-block reorganization that reversed invalid transactions.
DevOps
fromnews.bitcoin.com
23 hours ago

AWS Integrates Chainlink's 3 Services as April Rollout Targets Tokenized Finance Stack

Chainlink Labs launched three oracle services on AWS Marketplace to enhance blockchain tokenization and address the oracle problem.
fromnews.bitcoin.com
1 day ago

France Charges 88 Over Crypto Kidnappings as Attacks Average One Every 2.5 Days in 2026

The national anti-organized crime prosecutor's investigation revealed that structured criminal networks are actively recruiting participants and systematically targeting the families of known cryptocurrency holders.
France news
#cybersecurity
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

Supply chain vulnerabilities and AI tools exacerbate ongoing cyber threats, including state-backed crypto heists and active remote code execution exploits.
fromFortune
3 weeks ago
NYC startup

Latest crypto hack sees thieves make off with $280 million from Solana DeFi platform Drift | Fortune

Information security
fromFortune
2 days ago

Mythos access by Discord group reveals real danger of AI-powered hacking | Fortune

Unauthorized access to AI models exposes vulnerabilities in cybersecurity, highlighting the rapid pace of AI-driven exploitation of flaws.
Information security
fromThe Hacker News
4 days ago

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

Harvester has deployed a new Linux version of its GoGra backdoor targeting entities in South Asia using Microsoft Graph API for covert operations.
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

Supply chain vulnerabilities and AI tools exacerbate ongoing cyber threats, including state-backed crypto heists and active remote code execution exploits.
NYC startup
fromFortune
3 weeks ago

Latest crypto hack sees thieves make off with $280 million from Solana DeFi platform Drift | Fortune

Drift suffered a $280 million hack attributed to North Korea, utilizing a novel attack method involving durable nonces.
Information security
fromFortune
2 days ago

Mythos access by Discord group reveals real danger of AI-powered hacking | Fortune

Unauthorized access to AI models exposes vulnerabilities in cybersecurity, highlighting the rapid pace of AI-driven exploitation of flaws.
Information security
fromThe Hacker News
4 days ago

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

Harvester has deployed a new Linux version of its GoGra backdoor targeting entities in South Asia using Microsoft Graph API for covert operations.
Privacy professionals
fromArs Technica
1 day ago

Why are top university websites serving porn? It comes down to shoddy housekeeping.

Universities often neglect DNS record maintenance, leading to hijacked subdomains that can appear in search results.
#defi
EU data protection
fromnews.bitcoin.com
2 days ago

'We Are DeFi, so MiCA Does Not Apply to Us.' Sorry, but EBA and ESMA Have a Different Point of View

Decentralized finance projects must ensure legal compliance with MiCAR regulations despite misconceptions about exemptions for fully decentralized projects.
DevOps
fromnews.bitcoin.com
5 days ago

Curve Founder Urges DeFi Safety Standards After KelpDAO Incident

Michael Egorov calls for industry-wide security standards in DeFi to address vulnerabilities exposed by recent exploits.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Jumper Integrates TRON Network, Enabling Cross-Chain Transfers via a Single Transaction

Jumper integrates with TRON, enabling seamless asset bridging and stablecoin swaps across 63 blockchains.
Information security
fromnews.bitcoin.com
5 days ago

Charles Hoskinson Points to Cardano and Midnight as Fix for Cross-Chain Flaws Behind KelpDAO Hack

A cross-chain exploit drained 116,500 restaked ETH from KelpDAO, causing over $13 billion in DeFi TVL outflows within 48 hours.
Information security
fromnews.bitcoin.com
5 days ago

Chainalysis Flags Critical Blind Spot in DeFi Security as $292M Exploit Bypasses Burn Verification

A $292M DeFi exploit reveals critical vulnerabilities in cross-chain systems, highlighting flawed trust assumptions and the need for better security measures.
Information security
fromnews.bitcoin.com
5 days ago

Ripple's Schwartz Flags DeFi Bridge Trade-Offs After KelpDAO Incident

Bridge security trade-offs in DeFi infrastructure may compromise protections during real-world deployment, raising concerns about operational shortcuts and risk management.
Marketing tech
fromnews.bitcoin.com
3 days ago

Coingecko Launches AI Market Intelligence Tools and Unified Partner Platform for Crypto Projects

Coingecko launched three AI tools to provide retail investors with market context beyond price data on April 22, 2026.
Django
fromnews.bitcoin.com
3 days ago

Cardano's Leios Upgrade and Bitcoin DeFi Tool Pogun Headline Input Output's 2026 Funding Slate

Input Output submitted 9 Cardano treasury proposals totaling $38.9M, nearly 50% less than its 2026 ask, focusing on decentralization and scalability.
Venture
fromSFGATE
4 days ago

Bitwise CEOs admitted to stealing millions. Their scheme is still unraveling.

CEOs of Bitwise Industries admitted to stealing over $100 million, with an associate facing 20 years for conspiracy to commit wire fraud.
Golden State Warriors
fromDefector
6 days ago

The Block, As Remembered By The Guy Who Called It And The Guy Who Let It Be | Defector

LeBron James' iconic block in Game 7 of the 2016 NBA Finals is remembered as a defining moment in NBA history.
#bitcoin
Cryptocurrency
fromnews.bitcoin.com
6 hours ago

The Whole World Is a Casino' Bitcoin Rallies Again, and so Does Belief Week in Review

Bitcoin approached $80K, indicating a revival in crypto risk appetite amid significant market movements and stablecoin developments.
Cryptocurrency
from24/7 Wall St.
4 days ago

Strategy Jumps 9%, Marathon Digital Rises 6% on Fresh Bitcoin Breakout

Bitcoin's price increase drives significant gains in Strategy and Marathon Digital shares, reflecting their leveraged exposure to BTC.
Cryptocurrency
fromnews.bitcoin.com
6 hours ago

The Whole World Is a Casino' Bitcoin Rallies Again, and so Does Belief Week in Review

Bitcoin approached $80K, indicating a revival in crypto risk appetite amid significant market movements and stablecoin developments.
Cryptocurrency
from24/7 Wall St.
4 days ago

Strategy Jumps 9%, Marathon Digital Rises 6% on Fresh Bitcoin Breakout

Bitcoin's price increase drives significant gains in Strategy and Marathon Digital shares, reflecting their leveraged exposure to BTC.
#kelpdao
Information security
fromnews.bitcoin.com
2 days ago

Beyond the Breach: Why rsETH's Depegging Demands a New Standard for Bridge Security

KelpDAO's rsETH depegged after a breach, highlighting the need for improved bridge security in collateral risk management.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

KelpDAO Exploiter Moves 75,701 ETH to Mainnet, Begins Routing $175M to Bitcoin

KelpDAO exploiter moved 75,701 ETH to Ethereum mainnet after Arbitrum froze 30,766 ETH tied to the exploit.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

$14B Vanishes From DeFi Ecosystem After KelpDAO Exploit Rocks Lending Markets

KelpDAO exploit caused $300M loss, triggering widespread withdrawals and a $14.17B drop in DeFi total value locked.
Information security
fromnews.bitcoin.com
2 days ago

Beyond the Breach: Why rsETH's Depegging Demands a New Standard for Bridge Security

KelpDAO's rsETH depegged after a breach, highlighting the need for improved bridge security in collateral risk management.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

KelpDAO Exploiter Moves 75,701 ETH to Mainnet, Begins Routing $175M to Bitcoin

KelpDAO exploiter moved 75,701 ETH to Ethereum mainnet after Arbitrum froze 30,766 ETH tied to the exploit.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

$14B Vanishes From DeFi Ecosystem After KelpDAO Exploit Rocks Lending Markets

KelpDAO exploit caused $300M loss, triggering widespread withdrawals and a $14.17B drop in DeFi total value locked.
Privacy professionals
fromTechCrunch
3 days ago

Another customer of troubled startup Delve suffered a big security incident | TechCrunch

Delve faces multiple allegations and security incidents, leading to loss of customers and damaged reputation.
Cryptocurrency
fromThe Village Voice
2 days ago

Which VPN makes sense for crypto traders in 2026? - The Village Voice

Crypto traders must choose VPNs based on technical fundamentals like protocol choices, logging policies, and security features to protect their activities.
#artificial-intelligence
Artificial intelligence
fromnews.bitcoin.com
1 week ago

The Translation Layer: Why AI Is Necessary to Scale Decentralized Finance

AI agents in decentralized finance automate tasks, enhancing user interaction with smart contracts and reducing reliance on centralized intermediaries.
Information security
fromFortune
3 days ago

The Mythos meeting focused on the wrong AI risk to banks. Here's the one nobody is talking about | Fortune

Artificial intelligence is transforming fraud into a machine-driven, scalable threat, posing risks beyond traditional cyber attacks.
Artificial intelligence
fromnews.bitcoin.com
1 week ago

The Translation Layer: Why AI Is Necessary to Scale Decentralized Finance

AI agents in decentralized finance automate tasks, enhancing user interaction with smart contracts and reducing reliance on centralized intermediaries.
Information security
fromFortune
3 days ago

The Mythos meeting focused on the wrong AI risk to banks. Here's the one nobody is talking about | Fortune

Artificial intelligence is transforming fraud into a machine-driven, scalable threat, posing risks beyond traditional cyber attacks.
Cryptocurrency
fromnews.bitcoin.com
1 day ago

Singapore Police and Crypto Exchanges Launch Joint Operation Against Scam-Linked Accounts

Singapore police intensified enforcement against scam-related crypto activity with major exchanges to curb fraud risks.
Cryptocurrency
fromnews.bitcoin.com
2 days ago

Tokenized Assets Near $30 Billion as Institutions Expand On-Chain Capital Markets Activity

Tokenized real-world assets are rapidly becoming essential for institutional portfolios, surpassing retail adoption rates and reshaping capital markets.
#bitmine
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Bitmine Buys Over 100,000 ETH in Largest Weekly Purchase Since December

Bitmine purchased over 100,000 ETH, increasing its holdings to 4.12% of total supply, as part of its strategy to dominate Ethereum treasury holdings.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Tom Lee's Bitmine Adds 101,627 ETH Worth $233 Million in Its Largest 2026 Accumulation

Bitmine acquired 101,627 ETH worth $233 million, increasing total holdings to approximately 4.97 million ETH, nearing 5% of Ethereum's supply.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Bitmine Buys Over 100,000 ETH in Largest Weekly Purchase Since December

Bitmine purchased over 100,000 ETH, increasing its holdings to 4.12% of total supply, as part of its strategy to dominate Ethereum treasury holdings.
Information security
fromThe Hacker News
2 days ago

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

A high-severity SSRF vulnerability in LMDeploy is actively exploited, allowing attackers to access sensitive data and internal networks.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

CLARITY Act Gains New Urgency as More Than 100 Crypto Organizations Urge Senate Action

Over 100 organizations urge Congress to expedite the CLARITY Act for U.S. crypto market structure and competitiveness.
Information security
fromTheregister
2 days ago

Attackers could disable all of a city's public EV chargers

Rented IoT infrastructure prioritizes user convenience over security, exposing them to denial of service attacks and vulnerabilities.
#crypto
Cryptocurrency
fromBitcoin Magazine
3 days ago

100+ Crypto Firms Urge Senate To Advance Clarity Act

Over 100 crypto firms urge U.S. Senate to advance market structure legislation to prevent innovation and capital from leaving the country.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Fresh Manipulation Warnings Hit Other Crypto Projects After RAVE's 95% Collapse

Warnings about structural risks and questionable trading behavior in the crypto market are increasing, exposing retail investors to potential losses.
Cryptocurrency
fromBitcoin Magazine
3 days ago

100+ Crypto Firms Urge Senate To Advance Clarity Act

Over 100 crypto firms urge U.S. Senate to advance market structure legislation to prevent innovation and capital from leaving the country.
Cryptocurrency
fromnews.bitcoin.com
6 days ago

Fresh Manipulation Warnings Hit Other Crypto Projects After RAVE's 95% Collapse

Warnings about structural risks and questionable trading behavior in the crypto market are increasing, exposing retail investors to potential losses.
Information security
fromArs Technica
2 days ago

Now, even ransomware is using post-quantum cryptography

Kyber's use of PQC key-exchange algorithms serves more as a marketing tactic than a practical security measure against imminent quantum threats.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Lazarus Group Suspected of Moving $175M in ETH After Arbitrum Freezes $71M From KelpDAO Exploit

Lazarus Group drained 116,500 rsETH from KelpDAO, with significant funds frozen and laundered through various protocols.
Information security
fromIT Brew
2 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Brian Armstrong Says Base Is the Best Chain for Trading, Payments, and Agents

Base is the leading blockchain for trading, payments, and AI agents, commanding 46% of Ethereum L2 decentralized finance TVL.
#ai
Information security
fromInfoWorld
3 days ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromFast Company
4 days ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
Information security
fromnews.bitcoin.com
3 days ago

From Scripts to Swarms: Why AI Is Breaking Traditional Sybil Defenses

AI agents will centralize identity management, enhancing security against Sybil attacks through advanced automation and dynamic behavior.
Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromComputerworld
3 days ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromInfoWorld
3 days ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromFast Company
4 days ago

Brace yourself for a flood of patches in all of your tech gadgets

Mythos, Anthropic's AI model, identifies software vulnerabilities, prompting urgent updates to prevent exploitation by hackers.
#ethereum
Cryptocurrency
fromnews.bitcoin.com
3 days ago

ETH Whale That Sold $24.9M Three Days Ago Buys Back $17.5M as Ether Stabilizes Above $2,350

A large ethereum whale sold 10,829 ether and then bought back 7,448 ether, indicating renewed confidence in the market.
Cryptocurrency
from24/7 Wall St.
6 days ago

Ethereum Price Prediction: How Much Will 1 ETH Be Worth by 2030?

Ethereum's price by 2030 could range from $8,000 to $40,000 depending on network upgrades and macroeconomic conditions.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

ETH Whale That Sold $24.9M Three Days Ago Buys Back $17.5M as Ether Stabilizes Above $2,350

A large ethereum whale sold 10,829 ether and then bought back 7,448 ether, indicating renewed confidence in the market.
Cryptocurrency
from24/7 Wall St.
6 days ago

Ethereum Price Prediction: How Much Will 1 ETH Be Worth by 2030?

Ethereum's price by 2030 could range from $8,000 to $40,000 depending on network upgrades and macroeconomic conditions.
Information security
fromnews.bitcoin.com
4 days ago

Volo Protocol Loses $3.5 Million in Sui Blockchain Exploit, Blocks WBTC Bridge Attempt

Volo Protocol lost $3.5 million due to a compromised vault admin private key, but will absorb the losses without impacting users.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Incident Report: Llamarisk, Aave Service Providers Detail Kelp rsETH Hack Across Ethereum and Arbitrum Markets

An attacker exploited Kelp's Layerzero V2 bridge, minting 116,500 rsETH, leading to estimated bad debt of $123.7M to $230.1M across seven markets.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

SEC Faces Mounting Pressure to Turn DeFi Guidance Into Formal Rules

Over 30 crypto industry participants urge SEC to formalize guidance on decentralized tools to reduce regulatory uncertainty.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
Information security
fromSecurityWeek
5 days ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Bitcoin Rebounds, But Crypto's Security Crisis Intensifies Week in Review

Bitcoin and major cryptocurrencies rose, indicating risk appetite despite ongoing geopolitical and economic uncertainties.
Cryptocurrency
fromnews.bitcoin.com
3 weeks ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
fromnews.bitcoin.com
4 days ago

FCA Raids 8 Sites in First UK Crackdown on Illegal Peer-to-Peer Crypto Trading

The FCA's enforcement action targeted unregistered peer-to-peer crypto traders, emphasizing that these operations are illegal and pose significant financial crime risks. Steve Smart stated, 'We will use our powers and work with partners to disrupt them.'
Cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
5 days ago

Onchain Analysts Flag Justin Sun-Linked Wallet's 274 Million USDT Exit From Aave Minutes After rsETH Freeze

A wallet linked to Justin Sun withdrew 274 million USDT from Aave shortly after the protocol froze its rsETH markets.
Information security
fromSecurityWeek
3 days ago

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

A zero-day vulnerability in Microsoft Defender, tracked as CVE-2026-33825, allows privilege escalation through a flaw named BlueHammer.
#tether
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Tether Mints 2 Billion USDT on Ethereum in Three Days, Adding Fresh Supply to the Stablecoin Market

Tether minted 2 billion USDT on Ethereum, increasing total supply to nearly $190 billion, reflecting institutional demand for dollar liquidity.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Tether Steps In With $150M Support Plan After Drift Protocol Loses $285M in Exploit

Tether committed $127.5 million to Drift Protocol's recovery plan, linking user repayments to trading revenue rather than upfront capital.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Tether Mints 2 Billion USDT on Ethereum in Three Days, Adding Fresh Supply to the Stablecoin Market

Tether minted 2 billion USDT on Ethereum, increasing total supply to nearly $190 billion, reflecting institutional demand for dollar liquidity.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Tether Steps In With $150M Support Plan After Drift Protocol Loses $285M in Exploit

Tether committed $127.5 million to Drift Protocol's recovery plan, linking user repayments to trading revenue rather than upfront capital.
Information security
fromInfoWorld
3 days ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
fromnews.bitcoin.com
5 days ago

Doordash Plans to Pay Drivers in Stablecoins Using Tempo Blockchain: Report

Doordash plans to integrate stablecoin payouts for its gig workers, known as Dashers, through the Tempo blockchain, which is designed specifically for stablecoin payments and real-world settlement.
Cryptocurrency
Information security
fromTheregister
3 days ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

TRON Integrates LI.FI Protocol, Unlocking Cross-Chain Access to Global Stablecoin Liquidity

LI.FI integrates with TRON blockchain, enhancing liquidity and seamless asset transfers across multichain ecosystems.
Cryptocurrency
fromnews.bitcoin.com
5 days ago

XRP Prepares for Quantum Future as Ripple Maps XRPL Strategy for Security Readiness

Ripple is implementing a multi-phase plan to secure the XRP Ledger against quantum threats by 2028.
Information security
fromThe Hacker News
4 days ago

Mustang Panda's New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

A new variant of LOTUSLITE malware targets India's banking sector, focusing on espionage rather than financial gain.
Information security
fromSecurityWeek
4 days ago

Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Google Antigravity's vulnerabilities have attracted both security researchers and cybercriminals, leading to risks of remote code execution and malware delivery.
Information security
fromTNW | Next-Featured
5 days ago

Lovable security crisis: 48 days of exposed projects, closed bug reports, & the structural failure of vibe coding security

Lovable's security incidents expose vulnerabilities in AI-generated code and highlight a market focus on growth over security.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Less Than 1% of Crypto Projects Disclose Market Maker Deals

91% of crypto protocols generate revenue, but less than 1% disclose market maker deals, highlighting transparency issues and risks for investors.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Chainalysis Details 'Shadow Crypto Economy' Exposure as Grinex Suspends Operations

Grinex's shutdown reveals crypto laundering tactics that evade typical enforcement actions, raising concerns about illicit fund movements.
#social-engineering
Information security
fromThe Hacker News
1 week ago

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

A social engineering campaign exploits Obsidian to distribute PHANTOMPULSE trojan targeting financial and cryptocurrency sectors.
Information security
fromThe Hacker News
1 week ago

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

A social engineering campaign exploits Obsidian to distribute PHANTOMPULSE trojan targeting financial and cryptocurrency sectors.
fromFinbold
1 week ago

Kraken insider extortion reveals remote work security blind spot

"Shortly after access was terminated, we began receiving extortion demands. The criminals threatened to distribute materials from both the February 2025 incident and the recent incident to media outlets and on social media if we did not comply. We will not pay these criminals," Percoco stated.
Information security
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Circle Announces Quantum-Resistant Roadmap to Secure Future Digital Asset Infrastructure

Circle's Arc platform will launch with post-quantum signature support to secure institutional assets against quantum threats.
Information security
fromThe Hacker News
2 weeks ago

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

A campaign targets ComfyUI instances for cryptocurrency mining and botnet enlistment through remote code execution exploits.
Cryptocurrency
fromnews.bitcoin.com
3 weeks ago

Drift Protocol Hack 2026: What Happened, Who Lost Money, and What's Next

A Solana-based perpetual futures exchange lost $286 million in 12 minutes due to a sophisticated attack involving fake collateral and social engineering.
Information security
fromCointelegraph
2 months ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Information security
fromArs Technica
2 months ago

Malicious packages for dYdX cryptocurrency exchange empties user wallets

Compromised dYdX accounts distributed malicious npm and PyPI packages containing credential theft and a RAT that executes remote Python code from a C2 server.
fromArs Technica
2 months ago

Once-hobbled Lumma Stealer is back with lures that are hard to resist

A core part of the resurgence is the use of CastleLoader, a separate piece of malware that's installed initially. It runs solely in memory, making it much harder to detect than malware that resides on a hard drive. Its code is heavily obfuscated, making it hard to spot its malice even when malware scanners can see it. CastleLoader also provides a flexible and full-featured command-and-control communication mechanism that users can customize to meet their specific needs.
Information security
[ Load more ]