A North Korean hacking group, suspected to be Lazarus Group, established three shell companies to distribute malware to cryptocurrency developers through deceptive job interviews. The FBI has shut down one of the companies, but others remain active.
Tag: Cybersecurity
SEC Delays Decision on Polkadot ETF: What You Need to Know
The SEC has postponed its decision on the Grayscale Polkadot Trust ETF until June 11. This delay impacts the potential for a Polkadot (DOT) ETF to be listed on US exchanges and joins a growing list of altcoin ETFs awaiting approval.
The Hidden Risks of Updatable Firmware in Crypto Hardware Wallets
Explore the security risks associated with updatable firmware in crypto hardware wallets, including potential backdoors, vulnerabilities, and the importance of user control for safeguarding crypto assets.
KiloEx Compensates Users After $7.5M Hack: Full Details and Analysis
Decentralized exchange KiloEx to compensate users affected by a $7.5 million exploit, detailing compensation plans for traders and stakers. Learn about the exploit, compensation details, and future security measures.
Symbiotic Revolutionizes Blockchain Security with $29M Funding for Universal Staking Framework
Symbiotic secures $29 million in Series A funding to launch its Universal Staking Framework, a novel economic coordination layer enhancing blockchain security through multi-chain staking. Learn how this innovative solution is poised to transform DeFi and the broader blockchain landscape.
Crocodilus Android Malware: Protecting Your Crypto Wallet in 2025
Comprehensive guide to Crocodilus malware targeting Android crypto wallets: infection methods, prevention techniques, and recovery steps. Stay safe from this sophisticated crypto-stealing threat.
XRP Ledger Foundation Patches Critical Vulnerability: A Deep Dive into the Crypto Stealing Backdoor
The XRP Ledger Foundation swiftly addressed a significant vulnerability in its core JavaScript library, preventing potential theft of cryptocurrency private keys. This article explores the details of the backdoor, its potential impact, and the foundation’s response.