Blockchain

The Evolution of Hashing Algorithms: From MD5 to Modern Day
Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...

Schneider Electric Confirms Ransom Hack — Hellcat Demands French Bread as ‘Joke’
That’s a lot of pain: $125,000 ransom seems small—but why do the scrotes want it paid in baguettes? ...

TikTok ‘Infinite Money Glitch’ — Idiots Chased by JPMorgan
Dimon’s dollars (not yours): No, Chase Bank isn’t going to let you cash bad checks. It’s fraud—no matter what X and TikTok tell you ...

IBM Addresses AI, Quantum Security Risks with New Platform
IBM is rolling out Guardian Data Security Center, a framework designed to give enterprises the tools they need to address the emerging cyberthreats that come the ongoing development of generative AI and ...

World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security
The World Economic Forum is advocating a shift in security thinking from secure by design to resilience by design in the face of the rapid development and expanding connectivity of emerging technologies ...

DOJ Created NexFundAI Crypto Firm in Crypto Scamming Sting
The DOJ created NexFundAI, a false cryptocurrency company and token, in a sting that nabbed 19 people and companies accused of scamming investors by falsely creating the illusion of activity around their ...
Perfectl Malware
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...

DOJ Wants to Claw Back $2.67 Million Stolen by Lazarus Group
The DOJ wants to seize $2.67 million from the $69 million in crypto the North Korean-backed Lazarus Group stole in from the options exchange Deribit in 2022 and online gambling platform Stake.com ...
Emulating the Surging Hadooken Malware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...

Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors
This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of ...