Tag: cryptocurrency

  • Slashdot: JPMorgan Says Quantum Experiment Generated Truly Random Numbers

    Source URL: https://science.slashdot.org/story/25/03/26/2334255/jpmorgan-says-quantum-experiment-generated-truly-random-numbers?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: JPMorgan Says Quantum Experiment Generated Truly Random Numbers Feedly Summary: AI Summary and Description: Yes Summary: JPMorgan Chase has achieved a significant breakthrough in encryption and security by using Honeywell’s Quantinuum quantum computer to generate mathematically certified truly random numbers, with implications for various applications like cryptocurrency and online…

  • The Register: Oracle Cloud says it’s not true someone broke into its login servers and stole data

    Source URL: https://www.theregister.com/2025/03/23/oracle_cloud_customers_keys_credentials/ Source: The Register Title: Oracle Cloud says it’s not true someone broke into its login servers and stole data Feedly Summary: Despite evidence to the contrary as alleged pilfered info goes on sale Oracle has straight up denied claims by a miscreant that its public cloud offering has been compromised and information…

  • Hacker News: North Korea Launders Billions in Stolen Crypto

    Source URL: https://www.coindesk.com/policy/2025/03/07/here-s-how-north-korea-launders-billions-of-stolen-crypto Source: Hacker News Title: North Korea Launders Billions in Stolen Crypto Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the complex methods used by North Korea to launder cryptocurrency stolen through hacks, particularly focusing on their reliance on over-the-counter brokers and other methods due to compliance checks implemented…

  • Hacker News: Please stop externalizing your costs directly into my face

    Source URL: https://drewdevault.com/2025/03/17/2025-03-17-Stop-externalizing-your-costs-on-me.html Source: Hacker News Title: Please stop externalizing your costs directly into my face Feedly Summary: Comments AI Summary and Description: Yes Summary: The text reflects a sysadmin’s frustration with the disruptive impact of LLM crawlers on operational stability. It discusses ongoing battles against the misuse of computing resources by malicious bots, underscoring…

  • Microsoft Security Blog: StilachiRAT analysis: From system reconnaissance to cryptocurrency theft

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/17/stilachirat-analysis-from-system-reconnaissance-to-cryptocurrency-theft/ Source: Microsoft Security Blog Title: StilachiRAT analysis: From system reconnaissance to cryptocurrency theft Feedly Summary: Microsoft Incident Response uncovered a novel remote access trojan (RAT) named StilachiRAT, which demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. This blog primarily focuses on analysis of the WWStartupCtrl64.dll…

  • Hacker News: Lazarus Group deceives developers with 6 new malicious NPM packages

    Source URL: https://cyberscoop.com/lazarus-group-north-korea-malicious-npm-packages-socket/ Source: Hacker News Title: Lazarus Group deceives developers with 6 new malicious NPM packages Feedly Summary: Comments AI Summary and Description: Yes Summary: The Lazarus Group has infiltrated the npm registry, introducing six malicious packages designed to deceive software developers, steal credentials, and disrupt their workflows. This incident highlights the ongoing threats…

  • Rekt: Not So Safe

    Source URL: https://www.rekt.news/not-so-safe Source: Rekt Title: Not So Safe Feedly Summary: North Korea’s Lazarus Group stole $1.4B from Bybit’s signers by exploiting a simple vulnerability in Safe’s system. A single yaml.load execution bypassed high-end security, turning a supposedly impenetrable system into one of the industry’s biggest disasters. AI Summary and Description: Yes Summary: The text…

  • Unit 42: Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims

    Source URL: https://unit42.paloaltonetworks.com/?p=138627 Source: Unit 42 Title: Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims Feedly Summary: We identified a campaign spreading thousands of sca crypto investment platforms through websites and mobile apps, possibly through a standardized toolkit. The post Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims appeared…

  • Threat Research Archives – Unit 42: RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector

    Source URL: https://unit42.paloaltonetworks.com/macos-malware-targets-crypto-sector/ Source: Threat Research Archives – Unit 42 Title: RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector Feedly Summary: AI Summary and Description: Yes Summary: The text details a significant malware campaign targeting macOS systems, notably linked to North Korean nation-state actors employing advanced…

  • Threat Research Archives – Unit 42: Stealers on the Rise: A Closer Look at a Growing macOS Threat

    Source URL: https://unit42.paloaltonetworks.com/macos-stealers-growing/ Source: Threat Research Archives – Unit 42 Title: Stealers on the Rise: A Closer Look at a Growing macOS Threat Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the rise in macOS infostealer malware, specifically highlighting three notable types: Atomic Stealer, Poseidon Stealer, and Cthulhu Stealer. This increase poses…