Hacker
-
Cryptocurrency
Ledger clarifies how its firmware works after deleted tweet controversy
Developers say third-party apps can’t access Ledger users’ keys without the device owner’s consent. News <!–> –><!–> Join us on…
Read More » -
Cryptocurrency
Bitcoin ATM maker to refund customers impacted by zero-day hack
General Bytes has implemented several measures in the wake of the hack, including offering to reimburse its cloud-hosted customers and…
Read More » -
Cryptocurrency
Anonymous vows to bring Do Kwon’s ‘crimes’ to light
Hacktivist group Anonymous has pledged to “make sure” Terra co-founder Do Kwon is “brought to justice as soon as possible”…
Read More » -
Cryptocurrency
White hat hacker attempts to recover 'millions' in lost Bitcoin, finds only $105
Joe Grand, a computer engineer and hardware hacker known by many for recovering crypto from hard-to-reach places, spent hours breaking…
Read More » -
Cryptocurrency
Engineer hacks Trezor wallet, recovers $2M in 'lost' crypto
A computer engineer and hardware hacker has revealed how he managed to crack a Trezor One hardware wallet containing more…
Read More » -
Cryptocurrency
SushiSwap denies reports of billion dollar bug
The developer behind popular decentralized exchange SushiSwap has rejected a purported vulnerability reported by a white-hat hacker snooping through their…
Read More » -
Cryptocurrency
White hat potentially saves SushiSwap $350M by finding ‘obvious’ exploit
The SushiSwap decentralized exchange has narrowly avoided becoming the latest DeFi hack victim thanks to assistance from a white hat…
Read More » -
Cryptocurrency
Poly Network hacker returns less than 1% of the $600M theft
These transfers have occurred across the three wallets associated with the Poly Network hacker across the Ethereum, Binance Smart Chain…
Read More » -
Cryptocurrency
As token price rises and reputation mends, Sushiswap foils midnight exploit
The Uniswap rival manages to fend off an attack in a matter of hours.
Read More » -
Cryptocurrency
Cybercriminals attack GoDaddy-based cryptocurrency platforms
The attackers used social engineering to defraud the GoDaddy staff.
Read More »