Researchers at cyber security firm Check Point have revealed that a new macOS malicious software, Banshee, managed to evade anti virus detection for more than two months by borrowing encryption schemes from Apple security tools. Forbes warned that the malicious software contained a "real and present danger" and the New York Post quoted Check Point as saying that more than 100 million Apple users could "become victims". However, endpoint security startup Dou...
Researchers at cyber security firm Check Point recently revealed that a new macOS malicious software, Banshee, managed to evade anti virus detection for more than two months by borrowing the encryption scheme of Apple's security tools. Forbes warned that the malicious software contained "real and present dangers", and the New York Post quoted Check Point as saying that more than 100 million Apple users could "become victims".
Class A shared cyber security concept stocks rose, Guohua Network Security, Nanling Technology, Jicheng Electronics, Ruiskangda rose by the limit, Datang Telecom, Ren Zixing, Caixun shares rose.
GlassNode said in a post on X that as of December 5, bitcoin miners have accumulated $71.49 billion for protecting cyber security and processing transactions. The block reward income is $67.31 billion, and the transaction fee income is $4.18 billion.
On November 29, the Singapore Police Force and the cyber security bureau issued a joint statement saying that criminals have recently observed a variety of means to steal cryptocurrencies from victims' cryptocurrency wallets. Their usual methods include posing as legal entities on social media, offering gifts or promotions as bait, and asking victims to "verify" their wallets by sharing personal information such as login credentials. In addition...
The US cyber security and infrastructure security agency (CISA) said that although some areas were affected by extreme weather and infrastructure disruptions, there were no major incidents affecting the security of election infrastructure. According to Cait Conley, senior adviser to CISA, the current disruption is expected to be short-lived and does not pose a threat to overall election security.
The head of the US cyber security agency said they had not seen any evidence of activity that could have affected the outcome of the election.
Israeli cyber security firm Ironblocks has announced plans for a phased rollout of its new Web3 security layer, Venn Network, which plans to match security operators and their technical expertise with crypto applications that require additional attention to their transaction flows. Participating DeFi applications may pay crypto rewards to auditors and cyber security firms who review pending transactions, according to founder and CEO of Ironblocks Or Dadosh. DeFi protocols, including Ether.Fi and...
Jen Easterly, director of the US cyber security and infrastructure security agency, said: The threat landscape is becoming more sophisticated, with targeted attacks such as ransomware and DDoS attacks becoming more common. We are particularly concerned about the real physical threats facing election officials and their families. We work closely with intelligence agencies and the FBI to provide the public with regular updates on observed threats.
The Hong Kong police launched a "code word" arrest operation, and the officers of the cyber security and technology crime bureau assisted in the search for evidence related to network and cryptocurrency transactions. They smashed a local fraud syndicate involved in cryptocurrency and arrested 27 people, with a total amount of 360 million Hong Kong dollars. New Territories South Regional Crime Headquarters Superintendent Yiu Yongqin said that the fraud syndicate mainly used online love to lure vi...
On October 12, researchers at cyber security company Checkmarx have raised the alarm about a dangerous malicious software uploaded to Python Package Index (PyPI), which steals private keys. According to the company, the malicious software was automatically uploaded by suspicious users through several different packages, designed to imitate the decoding applications of popular wallets such as MetaMask, Atomic, TronLink, Ronin, and other mainstream products in the industry.
Cyber security experts have warned that the notorious North Korean hacking group "Lazarus Group" may be targeting US bitcoin ETFs as a new target. Michael Pearl, vice president of GTM strategy at Cyvers, said hackers may turn their attention to US bitcoin ETFs because of the potentially huge returns. According to Dune data, US ETFs currently hold $52.10 billion worth of bitcoin, making them an attractive target for hackers. Pearl warned that not only ETF providers could be targets for attacks...
On September 10th, the China cyber security association announced today on the completion of the list of compliance rectification apps for personal information collection and use, focusing on the collection and use of personal information beyond the scope of collection of personal information, excessive invocation of sensitive permissions, permission settings and account cancellation inconvenience and other issues Compliance rectification optimization has been completed. 62 App operators have pu...
On August 31st, Microsoft cyber security researchers discovered a zero-day vulnerability in a Chromium engine that powers browsers such as Chrome. This vulnerability was exploited by a North Korean hacking group called Citrine Sleet to specifically target cryptocurrency users. Citrine Sleet uses rootkit malicious software called FudModule to create fake cryptocurrency trading platform websites that trick users into downloading malicious software or weaponized crypto wallets, thus obtaining remot...
Microsoft cyber security researchers have discovered a zero-day vulnerability in a Chromium engine that powers browsers such as Chrome. The vulnerability was exploited by a North Korean hacking group called Citrine Sleet to specifically target cryptocurrency users. Citrine Sleet uses rootkit malicious software called FudModule to trick users into downloading malicious software or weaponized add-ons by creating fake cryptocurrency trading platform websites.