Cybercriminals all over the world have leveraged this technology’s increased anonymity to buy and sell illegal goods, services, stolen data, underground infrastructure and force victims to pay ransom. While blockchain analysis enables researchers and
cryptocurrency (24)
Two Cryptocurrency Exchanges were recently taken down by authorities. The PM2BTC and Cryptex sites were seized.
Video: https://youtube.com/shorts/wvRelrVSOcE
This is important for two reasons:
1. It disrupts illegal money laundering, in this case, hund
The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways.
Here is an example that the FBI is showcasing:
1. A person from your dream company,
When cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad.
TL:DR Researchers found a vulnerability in a cryptocurrency exchange. They notified the company, but then exploited the bug to
New Cryptojacking Malware Breakdown - The GhostEngine cryptocurrency mining malware disables endpoint security protections, deletes logs, modifies the kernel, and digs-in to establish persistence.
It all begins with getting the victim machine to launc
One of the most impressive hacks ever! Such tremendous sophistication is the hallmark of Nation State level attackers. Truly epic, but should you be worried?
Some say no, as the attack is not currently widespread.
I say we should all be concerned wi
There are many approaches to conduct a strategic cybersecurity risks assessment. This is one of my favorite ways, using a Threat Agent Risk Assessment (TARA) methodology.
This paper was authored by Tim Casey, David Houlding, and I while we were at I
The cyber attacks on LastPass continue to be more invasive and damaging to its customers. Numerous security failures and poor leadership decisions have undermined this cybersecurity company’s reputation and sent its customers scrambling to protect t
US Treasury sanctions a cryptocurrency mixing site for supporting North Korean hackers who have been stealing hundreds of millions of dollars. Blender.io is a virtual currency mixing site that obfuscates the origins of cryptocurrency coin transactio
Ransomware attacks and payments are increasing, with most revenue going to Russian attackers. It is time to revisit outlawing Ransomware payments.
Some stats to hammer the situation home:
Sophos ransomware report indicates:
- Ransom attacks are more fre
Norton recently announced its Anti-Virus product will have a new feature that enables mining of Ethereum cryptocurrency for their customers, if they choose to participate. Is this a nice benefit for users or a reckless move to that increases overall
2022 will be a very tumultuous year for cybersecurity professionals. The underlying fundamentals that drive major shifts of the cybersecurity industry — technologies, threats, and economic factors, will introduce new risks and combine to significantl
A new tool is gaining popularity on the dark web which provides insights to users if their cryptocurrency activity might be flagged by authorities as potentially illicit. Such a tool can provide cybercriminals the intelligence necessary to stay under
There are 600 Million Differences Between Hackers and Cybercriminals…
An amazing story is emerging from a massive cryptocurrency exploitation that exemplifies the difference between a ‘hacker’ and a ‘cybercriminal’.
Interested in more cybersecurity i
Ransomware risks are skyrocketing with increasing costs, more attacks, and greater impacts that are expanding to affect everyone!
It is a growing threat to organizations and national critical infrastructures connected to the Internet. Ransomware puts
Cryptocurrency fraud is aggressively on the rise and topped over $4 billion last year, according to the security tracking company Chainalysis.
This is especially shocking to those who thought they had found an incredible investment in the cryptocurren
The government’s Central Bank of the Bahamas has released the world’s first Central Bank Digital Currency (CBDC) - the “SAND DOLLAR”.
This is attracting the interest of cybercriminals as well as security professionals. As national currencies transfor
I am happy to see such cooperation across cryptocurrency exchanges to interdict these heinous crimes.
Unfortunately, in addition to the beneficial uses, crypto is also leveraged as a means to support criminal acts which undermines legitimacy and the
Bad news for cryptocurrency criminals!
Cryptocurrency watchers were stunned when they recently saw a billion dollars of Bitcoin being moved from a very old account that has been inactive for years.
The mystery was solved as the U.S. Dept of Justice uns
Governments can still pursue cybercriminals and fraudsters who use cryptocurrency. China authorities have seized over 4 billion dollars worth of Bitcoin, Ethereum, and several other cryptocurrencies as part of a crackdown on the PlusToken scheme tha
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Best of the World Talks on The CISO's Journey: From Expert to Leader
- Description:
We are hosting an exclusive "Best of the World" Talks session on "The CISO’s Journey: From Expert to Leader" featuring David B. Cross (SVP & CISO at Oracle), Bikash Barai (Co-founder of CISO Platform & FireCompass) & David Randleman (Field CISO at FireCompass).
The journey from cybersecurity expert to strategic leader is a transformative one for CISOs. This session delves into the stages of a CISO’s evolution, the balance…
- Created by: Biswajit Banerjee
- Tags: ciso