Trends and Predictions of Growing Cryptocurrency Cyberattacks

Trends and Predictions of Growing Cryptocurrency Cyberattacks

Cryptocurrencies will almost certainly continue adoption and further adaptation despite the large 2022 downturn. Growth of the ecosystem and changes underway in 2023 carry important implications for cyberattack risk to both end ...
DeFi Hack Recovers Stolen Funds; Blacklotus Bypasses Windows Secure Boot

DeFi Hack Recovers Stolen Funds; Blacklotus Bypasses Windows Secure Boot

Tactics, Techniques, And Procedures Executed in Collaboration Between Jump Crypto and Oasis Networks to Hack Their Own Protocol The series of tactics, techniques, and procedures involved relies on the fact that a threat actor ...
Malicious Use of Internet Information Services (IIS) Extensions Likely to Grow

Malicious Use of Internet Information Services (IIS) Extensions Likely to Grow

Exploit Tools and Targets: Malicious Use of Internet Information Services (IIS) Extension Microsoft published a report on July 26th alerting defenders to the malicious use of Internet Information Services (IIS) extensions. As ...
Threat Actors Merging Malicious Activity With Cryptocurrency Show How the Attack Landscape is Developing in Decentralized Finance

Threat Actors Merging Malicious Activity With Cryptocurrency Show How the Attack Landscape is Developing in Decentralized Finance

Introduction Widespread implementation of decentralized finance (DeFi) systems since 2020 has created new fertile ground for a variety of threat actors to shift the development of cyberattack tactics, techniques, and procedures (TTPs) ...