Generative Data Intelligence

Tag: malicious actors

Market Analysis Report (28 Jan 2022)

$8 Billion Flushing Bank to Offer Bitcoin Services | Fidelity Files to Launch ETF Tied to Metaverse | Draft Bill Could Let U.S. Treasury Block International Crypto Transactions

Widespread FluBot and TeaBot Malware Campaigns Targeting Android Devices

Researchers from the Bitdefender Mobile Threats team said they have intercepted more than 100,000 malicious SMS messages attempting to distribute Flubot malware since the beginning of December. "Findings indicate attackers are modifying their subject lines and using older yet proven scams to entice users to click," the Romanian cybersecurity firm detailed in a report published Wednesday. "

Chainalysis report reveals an uptick in money laundering via crypto.

Since crypto has become more mainstream, there has been one issue of ill or another in the sector. This shows that some traders’ concerns about entering the market are valid. Despite a widespread clampdown on these malicious actors, they always find a new way to reinvent themselves. This is highlighted in the latest Chainalysis report, […]

ETH Foundation Removes All References to ETH1 And ETH2

The ETH foundation removes all references to ETH1 and ETH2 to save all future users from navigating a confusing model as we can see more in today’s latest Ethereum news. The ETH foundation removes all references to eth1 and ETH2 in favor of calling the blockchain an execution layer and upgraded the proof of stake […]

Tales from the Dark Web, Part 2: Ransomware Stacked With Distribution Services Creates the Perfect Storm

Security professionals need to understand the actors behind ransomware threats, how they operate and how they continuously find new victims to target

Hackers Creating Fraudulent Crypto Tokens as Part of ‘Rug Pull’ Scams

Misconfigurations in smart contracts are being exploited by scammers to create malicious cryptocurrency tokens with the goal of stealing funds from unsuspecting users. The instances of token fraud in the wild include hiding 99% fee functions and concealing backdoor routines, researchers from Check Point said in a report shared with The Hacker News. Smart contracts are programs stored on the

Emotet Now Using Unconventional IP Address Formats to Evade Detection

Social engineering campaigns involving the deployment of the Emotet malware botnet have been observed using "unconventional" IP address formats for the first time in a bid to sidestep detection by security solutions. This involves the use of hexadecimal and octal representations of the IP address that, when processed by the underlying operating systems, get automatically converted "to the dotted

Here’s what Binance Smart Chain execs think about hacks & failed transactions

The quick growth and evolution of Binance Smart Chain caught the attention of investors world over. At the same time, however, critics have slammed the blockchain and its team, claiming that issues like numerous failed transactions and hacks made life difficult for users. During an episode of the Unchained podcast, journalist Laura Shin raised these […]

Top 5 Most Popular Metaverse Crypto Coins Built on Polygon (January 2022)

Polygon is one of the most popular platforms for Metaverse crypto coins. It offers low fees and high-speed transactions perfect for crypto projects that require a lot of on-chain interaction. This article looks at the top five most popular Metaverse crypto coins built on Polygon in January 2022, ordered by 30-day users, lowest to highest. […]

The post Top 5 Most Popular Metaverse Crypto Coins Built on Polygon (January 2022) appeared first on NullTX.

DeFi’s Ambitions Can Resist The Federal Government’s Latest Crackdown

The charge of businesses and innovators looking to make the next big step in the DeFi story continues despite the naysaying of big banking...

What is Ethereum? The ULTIMATE Research-Backed ETH Guide

Ethereum is the leading blockchain app platform that was proposed in 2013 by Vitalik Buterin and went live on July 30, 2015. There are...

Top 10 Internet Security Tips for 2020

Reading Time: 5 minutesWith millions of people using the Internet daily for several different activities ranging from paying bills to buying and...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?