experts

  1. Father

    Experts analyzed key trends in the development of cybercrime

    Group-IB conducted a large-scale study of the underground market, identifying key hotbeds of threats to business and the public sector. In the Hi-Tech Crime Trends report, analysts record the merging of cybercrime groups within the framework of partner programs that are put on stream. They are...
  2. Father

    Experts showed the results of brute-forcing passwords encrypted with Bcrypt

    Hive Systems has conducted another study on brute-force password cracking. This time, experts focused on the Bcrypt algorithm. Hive Systems, which specializes in cybersecurity, has been testing password cracking using brute-force attacks for several years. All this time, the object of research...
  3. Teacher

    Experts revealed an attack on the Prisma DeFi protocol, estimating the damage at $11 million

    Liquid staking platform Prisma Finance reported "a possible exploit". Possible damage was estimated at $11.6 million. The team asked users to revoke all wallet permissions to avoid losses. Initially, the specialists of the Cyvers service drew attention to the unauthorized withdrawal of funds...
  4. Brother

    Experts have identified an automated scam scheme worth $32 million

    Since April 2023, unknown individuals have created more than 1,300 fraudulent tokens and stolen over $32 million from approximately 42,000 users as a result of rug pull. Blockfence analysts reported this. According to experts, the operation of creating coins is performed almost completely...
  5. Lord777

    Expert Reports on hacking of a $27 million crypto wallet

    On November 12, an attacker hacked a crypto wallet totaling about $27 million in the USDT stablecoin. This was stated by on-chain detective ZachXBT. The attacked user received USDT after withdrawing from Binance about a week ago. As ZachXBT noted, the wallet also interacted with the exchange's...
  6. Carding 4 Carders

    How law enforcement experts reveal passwords

    Hackers, crooks, IT security workers, investigative agencies and special services - all of them, under certain circumstances, can try to get to information protected by passwords. And if the tools used by hackers and special services, on the whole, practically coincide, then the approach to the...
Top