In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including how the BlackMatter ransomware group has rebranded itself yet again, how the DOJ confiscated stolen Bitcoin worth more than $4 billion and takeaways from a U.S. Senate hearing on open-source...
Nellie Liang, under secretary for domestic finance at the U.S. Department of the Treasury, was the only witness at a virtual hearing on the President's Working Group report on stablecoins - virtual currencies pegged to fiat currency. Lawmakers weighed in on the benefits and dangers of stablecoins.
This edition of the Incognia Mobile App Friction Report contains data and analysis of the onboarding process for nineteen leading crypto exchanges and wallets.
Download this report to read how 19 top crypto mobile apps compare for onboarding friction:
Learn which apps provide the lowest friction for...
This edition of the ISMG Security Report analyzes what prosecutors say is the biggest cryptocurrency seizure in U.S. history as well as the biggest financial seizure. It also details how a school district CISO resigned over the district's handling of a severe data breach and busts Zero Trust myths.
The arrest of a married New Yorker couple, charged with laundering bitcoins worth $3.6 billion that were stolen from a currency exchange in 2016, highlights the risk facing anyone who wants to launder large amounts of cryptocurrency and stay free long enough to enjoy their alleged rap career.
The FBI has seized $3.6 billion in cryptocurrency that it says traces to the 2016 theft of 119,754 bitcoins from the Bitfinex virtual currency exchange. A married New York couple who styled themselves as technology entrepreneurs has been charged with laundering the stolen friends.
Meter, a blockchain infrastructure company that provides multi-chain bridging and allows users to trade multiple cryptocurrencies across Ethereum and other public chains, has been exploited for around $4.4 million, the company acknowledged via Twitter. The hack also affected the Moonriver network.
India’s Union Budget 2022 resolves some of the uncertainty around the legitimacy of crypto assets. While crypto assets will not be considered as currency, Finance Minister Nirmala Sitharaman announced that the Reserve Bank of India will be launching a blockchain-based digital rupee this year.
A variety of underground markets exist to help malware-wielding criminals monetize their attacks, including via log marketplaces such as Genesis, Russian Market and 2easy, which offer for sale batches of data that can be used to emulate a victim, whether it's a consumer, an enterprise IT administrator or anyone in...
The Wormhole network, a token bridge that allows users to trade multiple cryptocurrencies without a centralized exchange, has been exploited for 120,000 wETH tokens ($321 million). The company says it has issued a fix for the flaw and is working to "get the network back up as soon as possible."
Democratic lawmakers outlined several provisions of the proposed America COMPETES Act, a measure to counter anti-competitive actions taken by China. Crypto advocates were quick to criticize one measure they say could have caused privacy and due process concerns. The language has now been amended.
Ransomware—that insidious menace threatening every entity no matter its size or industry—took several dark turns in 2021, all intended to magnify its impact. Attacks on major supply chain players reverberated throughout the economy, the continued rise in ransomware-as-a-service (RaaS) gave more criminals the...
The decentralized money market platform Qubit Finance, which runs on the Binance Smart Chain, has been hacked for more than $80 million, it confirmed via tweet on Friday. Blockchain security experts say it's the largest DeFi hack of 2022.
Lawmakers on the House Committee on Financial Services this week announced nine provisions of its America COMPETES Act of 2022 - one of which has been criticized by cryptocurrency proponents for potential privacy and due process concerns.
In the fight against fraud, there may be no better weapon than sharing knowledge. Unfortunately fraudsters also know this all too well and hence can take advantage of gaps in knowledge to bypass security controls, ultimately taking over an account, or gaining access to a credit line or card account.
Download this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.