Generative Data Intelligence

Tag: Security & Privacy

DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse

This month, MITRE will be adding two sub-techniques to its ATT&CK database that have been widely exploited by North Korean threat actors.The first, not...

Top News

Amid Legal Fallout, Cyber Insurers Redefine State-Sponsored Attacks as Act of War

The consequences from NotPetya, which the US government said was caused by a Russian cyberattack on Ukraine in 2017, continue to be felt as...

Wallet Security: The ‘Non-Custodial’ Fallacy

The commonly cited expression “not your keys, not your crypto” conveys the purist’s philosophy of cryptographic key management. In this wallet security model, only...

On-chain trusted setup ceremony

The trusted setup ceremony is one of the pains – and excitements – of crypto communities. The goal of a ceremony is to generate...

A Tool for Detecting Metamorphic Smart Contracts

A critical Ethereum security assumption is that smart contract code is immutable and therefore cannot be changed once it is deployed on the blockchain....

Smart Contract Security: A Simple Checklist for Web3 Development

Many of the hacks that befall web3 projects would be preventable with more emphasis on smart contract security. Commonly, attackers find and exploit multiple deficiencies...

Introducing the Travel Rule Universal Solution Technology (“TRUST”)

Coinbase is proud to announce the launch of the Travel Rule Universal Solution Technology (TRUST), an industry-driven solution designed to comply with a...

Privacy & Security at Ledger: A Year-in-Review

Things to know: – At Ledger, we are doing what’s necessary to face any future threats and working around the clock to strengthen our security posture and enable our users to keep their data safe.– In 2021, we took concrete actions to upgrade our security standards, ranging from hiring world-class security professionals, improving our data […]

Our Journey to Improve Customer Support At Ledger

Things to know: – At Ledger, we took concrete action to improve our Customer Support standard and better serve our users. Key product issues are now behind us (i.e. MetaMask connection), our Customer Support team nearly quadrupled compared to a year ago and while we were previously replying within days, we are now replying within […]

Google and the International Consortium of Minority Cybersecurity…

This scholarship program is working to change the face of the cybersecurity workforce. Beyond that, it has the potential to...

The VR Job Hub: Axon, ForeVR & Qualcomm

Every weekend VRFocus gathers together vacancies from across the virtual reality (VR), augmented reality (AR) and mixed reality (MR) industry, in locations around the...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?