#blockchain-security

[ follow ]
fromThe Hacker News
6 days ago

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check Point Research said in a technical report published last week.
Information security
Information security
fromBitcoin Magazine
1 week ago

Coinbase Forms Quantum Computing Advisory Board

Coinbase created an Independent Advisory Board to assess quantum computing risks to blockchain security and guide industry-wide post-quantum preparedness.
#bitcoin
fromFortune
1 week ago
Cryptocurrency

Coinbase launches expert board to assess quantum computing threat | Fortune

Quantum computing poses a medium-term threat to current cryptography protecting Bitcoin; Coinbase formed an independent advisory board to prepare.
fromHackernoon
4 years ago
Cryptocurrency

Bitcoin Mining's Centralization Threat: Six Pools Now Control 95% of Mined Blocks | HackerNoon

Bitcoin mining has significantly centralized, with major pools controlling over 95% of blocks, posing risks to network stability.
fromFortune
1 week ago
Cryptocurrency

Coinbase launches expert board to assess quantum computing threat | Fortune

fromHackernoon
4 years ago
Cryptocurrency

Bitcoin Mining's Centralization Threat: Six Pools Now Control 95% of Mined Blocks | HackerNoon

Information security
fromArs Technica
1 month ago

Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025

Supply-chain attacks surged in 2024–2025, allowing attackers to compromise single targets and infect thousands or millions of downstream users, causing widespread theft and outages.
fromTheregister
3 months ago

Attackers dig up $11M in Garden Finance crypto exploit

In a statement issued on Friday, Garden again said that user funds were safe and that the attack exploited one of its solvers. In the context of decentralized finance, a solver is typically an algorithm or trading agent that's relied on to execute transactions in the most efficient manner possible. Garden is a blockchain bridge protocol company, and its solvers earn a small profit for carrying out transactions between blockchains.
Information security
#ethereum
fromHackernoon
6 months ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

fromHackernoon
6 months ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

Cryptocurrency
fromHackernoon
2 years ago

The Limits of Automated Selfish Mining Detection | HackerNoon

The analysis provides a fully automated procedure with formal correctness guarantees for selfish mining attacks in blockchain.
fromcointelegraph.com
7 months ago

The crypto trap that won't let you sell and how to avoid it

Modern honeypot scams involve deceptive tactics such as tampered wallets sold on platforms like TikTok, which are preloaded with private keys used to instantly steal funds.
Cryptocurrency
Scala
fromMedium
8 months ago

Best Ways to Get XLA Today

Scala XLA staking offers passive income opportunities and enhances network security.
[ Load more ]