A recently uncovered cryptomining scheme used malicious Docker images to hijack organizations’ computing resources to mine cryptocurrency, according to cybersecurity firm Aqua Security. These images were uploaded...
Yearn Finance, the decentralized finance (DeFi) protocol, has launched a bug bounty program with Immunefi. Live since July 1, the program will pay out between $20,000 and $200,000 for critical...
Criminal gangs often use multiple ransomware strains and jump ship from one RaaS (Ransomware-as-a-Service) to another, seeking better deals. A report published today by blockchain investigations...
In this article, we discuss how two-factor authentication has been evolved to address the shortcoming of single authentication systems. We also discuss how we can utilize...
Recent Comments