Crypto insiders lauded Gary Gensler’s nomination to chair the Securities and Exchange Commission (SEC) last February. They thought the Massachusetts Institute of Technology professor who had taught blockchain classes would bring an enlightened approach to crypto compared with the scattershot, perplexed style of his predecessor, Jay Clayton. But a year in, the professor gets an…
Cyber security is as crucial as it ever was – with ever-increasing dangers to organizations, having a reliable security solution is critical. We’ve all heard of companies paying hefty penalties or even going out of business as a result of a simple system breach. There are simply too many hazards out there for you to […]
Blockchain security is a method of risk management for blockchain networks. It utilizes assurance services, cybersecurity frameworks and best practices to protect against fraud and attacks. How Blockchain Security Works One of the primary reasons blockchain technology is useful is that it has inherent security benefits. It operates on the principles of decentralization, cryptography and...
Latest analysis into the wiper malware that targeted dozens of Ukrainian agencies earlier this month has revealed "strategic similarities" to NotPetya malware that was unleashed against the country's infrastructure and elsewhere in 2017.
The malware, dubbed WhisperGate, was discovered by Microsoft last week, which said it observed the destructive cyber campaign targeting government, non-profit,
An active espionage campaign has been attributed to the threat actor known as Molerats that abuses legitimate cloud services like Google Drive and Dropbox to host malware payloads and for command-and-control and the exfiltration of data from targets across the Middle East.
The cyber offensive is believed to have been underway since at least July 2021, according to cloud-based information
On January 21, the Bank of Russia received a call from an anonymous person who reported that their premises were rigged with explosives. Among other reasons, the criminal cited the possible ban on cryptocurrencies.
Security makes the top 10 list of technologies changing how organizations operate, an indicator of how information security is increasingly viewed as a strategic business initiative.
DUBLIN–(BUSINESS WIRE)–The “Growth Opportunities in Cloud-, IoT-, and AI-Based Security Innovations” report has been added to ResearchAndMarkets.com’s offering. This edition of the Cyber Security Technology Opportunity Engine (TOE) provides a snapshot on emerging cyber security solutions powered by cloud-, Internet of Things (IoT)-, and artificial intelligence (AI)-based innovations that help companies protect from threats, data […]
No users suffered losses from the latest Crypto.com hack attack where $34 million were drained as we reported recently in our cryptocurrency news. Crypto.com came in with an official statemetn regarding the latest attack on the platform and revealed that the incident affected nearly 500 people but they were refunded in total. Crypto.com disclosed that […]