Block chained to Hack ?

Block chained to Hack ?

Blockchain, known as Distributed Ledger Technology (DLT), is used for preserving the history and integrity of digital assets through the use of cryptographic hashing and decentralization techniques. The decentralization of…
Panda 🐼 Stealer

Panda 🐼 Stealer

A new information stealer has been discovered that is being delivered via spam emails and targets cryptocurrency wallets. This threat is named Panda Stealer and was observed mostly targeting users…
Nagios cryptominers

Nagios cryptominers

Nagios XI is a popular enterprise server and network monitoring solutions. The feature “Configuration Wizard: Windows Management Instrumentation (WMI)” is being exploited in Nagios XI. Unit 42 researchers observed an…
Non Fungible Tokens

Non Fungible Tokens

NFTs represent an entry on the blockchain certifying that someone owns a particular digital asset.The concept might seem inherently abstract, it boils down to this: being able to claim sole…

Kryptocibule ! New malware

Researchers have discovered a previously undocumented trojan malware family that spreads through malicious torrents and that uses multiple tricks to squeeze as many cryptocoins as possible from its victims while…