Hackers returned some of the $600 million they stole from Poly Network, a cryptocurrency firm

An unidentified hacker stole $600 million worth of virtual currencies from Poly Network the cryptocurrency company announced Tuesday. Then in an unusual twist, less than 24 hours later, the hacker began to return some of the stolen money after a public plea from the company. As of publication time, the hacker had returned more than $4,772,000 worth of assets, according to the company. Chainalysis, a cryptocurrency-tracking firm, confirmed Wednesday that funds were on the move. The incident is the largest public attack against the decentralized financed industry to date. The identity of the thieves remains unclear. Poly Network offers a service that promises interoperability between different chains of cryptocurrency, which each have their own digital ledger and act independently of one another. A preliminary investigation by cybersecurity firm SlowMist found that the hacker exploited a vulnerability in a feature that allows for the implementation of exchanges across chains. This allowed […]

The post Hackers returned some of the $600 million they stole from Poly Network, a cryptocurrency firm appeared first on CyberScoop.

Continue reading Hackers returned some of the $600 million they stole from Poly Network, a cryptocurrency firm

DDoS attacks increased 33% in H1 2021

There has been a 33% increase in the number of DDoS attacks in H1 2021, according to a report published by Link11. Between January and June, there were record numbers of attacks compared to the same period last year. The report also found that between … Continue reading DDoS attacks increased 33% in H1 2021

Cybercriminals customizing malware for attacks on virtual infrastructure

Cyber incidents continue to rise, ransomware accounts for nearly two-thirds of all malware attacks, and more cybercriminals are customizing malware for attacks on virtual infrastructure, Positive Technologies finds. According to the research, the numbe… Continue reading Cybercriminals customizing malware for attacks on virtual infrastructure

IT, healthcare and manufacturing top targets for cyberattacks

Avanan announced the release of a report which analyzes today’s threat landscape, phishing vectors, and industry-based attacks, exposing healthcare and manufacturing as two of the top targets for cyberattacks in the first half of the year. “With hospit… Continue reading IT, healthcare and manufacturing top targets for cyberattacks

Bitcoin cyber attacks surge following rising demand and increasing price of bitcoin

Phishing impersonations and business email compromise (BEC) attacks designed to steal victims’ bitcoin surged by 192% between October 2020 and May 2021, closely following the rising demand and increasing price of bitcoin over the last eight months, acc… Continue reading Bitcoin cyber attacks surge following rising demand and increasing price of bitcoin

Organizations increasingly reluctant to pay ransomware demands

Organizations hit by ransomware should not pay the ransom according to 79 percent of respondents to an online poll. To better understand concerns about recent ransomware attacks, Menlo Security conducted a global poll on responses and reactions to rans… Continue reading Organizations increasingly reluctant to pay ransomware demands

Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on mobile devices, as they look to execute nearly all daily activities via devi… Continue reading Consumers neglecting mobile security despite growing number of threats

Can on-prem security experts make the move to the cloud?

As cloud computing grows in popularity across all use cases, cloud workloads have never been more attractive to malicious actors. A recent McAfee report points to a 630 percent increase in attacks aimed at cloud services since January 2020. There are s… Continue reading Can on-prem security experts make the move to the cloud?

SeKVM: Securing virtual machines in the cloud

Whenever you buy something on Amazon, your customer data is automatically updated and stored on thousands of virtual machines in the cloud. For businesses like Amazon, ensuring the safety and security of the data of its millions of customers is essenti… Continue reading SeKVM: Securing virtual machines in the cloud

Apple Patches Zero-Day XCSSET Exploit

By the time Apple patched a zero-day vulnerability in macOS 11.4 that bypasses the Transparency Consent and Control (TCC) framework, it was being exploited by attackers using XCSSET malware. Jamf researchers dissecting the malware and its exploitation… Continue reading Apple Patches Zero-Day XCSSET Exploit