Zephyrnet Logo

Tag: bad actor

New EIP712 Messages in Blur Protocol Expose Users to Phishing Attacks

SNEAK PEEK Blend Protocol introduces risky EIP712 messages, raising phishing concerns. Malicious actors exploit Seller message to deceive users and steal assets. LoanOffer message enables fake...

More MOVEit mitigations: new patches published for further protection

by Paul Ducklin Even if you’re not a MOVEit customer, and even if you’d never heard of the MOVEit file...

4 Data Privacy Best Practices – DATAVERSITY

Data privacy is at the heart of every prominent security threat – what are the top best practices for keeping data private? Some of...

Is Solar a Scam – Creative Solar USA

Is solar a scam??“You’re going solar? Buddy, I’ve got news for you – solar is a total scam! That’s right. Just a trickplayed on...

Cyber Attackers Seize Control of Sanctioned Crypto Mixer Tornado Cash

Tornado Cash, a fully decentralized and open-source cryptocurrency mixer operating on Ethereum-based networks, has been subjected to a malicious takeover. This comes as another...

TrustWallet Discloses $170,000 Exploit, Says 500 Wallets Still Vulnerable

The TrustWallet team plans to reimburse affected users that were impacted by a vulnerability discovered in November 2022. Photo...

Trust Wallet Fixed Vulnerability But Warns $88,000 of User Funds Are Still at Risk

It took a few days for the team at Trust Wallet to patch a vulnerability that put users' funds at risk and release the...

Discarded, not destroyed: Old routers reveal corporate secrets

When decommissioning their old hardware, many companies ‘throw the baby out with the bathwater’ Taking a defunct router out of an equipment...

Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks

As part of its ongoing invasion of Ukraine, Russian intelligence has once again enlisted the services of hacker group Nobelium/APT29, this time to spy...

Detect real and live users and deter bad actors using Amazon Rekognition Face Liveness

Financial services, the gig economy, telco, healthcare, social networking, and other customers use face verification during online onboarding, step-up authentication, age-based access restriction, and...

California “Burner Licenses” Continue to Plague

California has no shortage of issues with its legalized cannabis marketplace. For a couple of years now, an open secret in California (and a...

Is Bitcoin’s Lightning Network Adoption in Jeopardy – Liquidity and Risk Issues Loom Large

HodlX Guest Post  Submit Your Post   Over the last five years, the Lightning Network has emerged as the technology solution to the Bitcoin scalability issue. However, its...

Latest Intelligence

spot_img
spot_img