Poly Network offers bug bounty to hacker who stole $600 million worth of cryptocurrency

Poly Network is offering the hacker that stole $600 million worth of virtual currencies from the company a half-million dollars as a bug bounty, the company said Friday. Poly Network said that as of early Friday morning the hacker had returned roughly $340 million worth of assets they stole from the company. The remaining cryptocurrency assets have been transferred to a wallet jointly controlled by Poly Network and the hacker.  The company is also still trying to retrieve $33 million worth of Tether cryptocurrency frozen by Tether. A hacker, who the company is now calling “Mr. White Hat,” stole $600 million worth of virtual currencies from Poly Network on Tuesday. Less than 24 hours later, he began to return it. The hacker claimed in blockchain messages shared by cryptocurrency compliance firm Elliptic that he stole the money “for fun” and to keep it safe from others who might exploit a […]

The post Poly Network offers bug bounty to hacker who stole $600 million worth of cryptocurrency appeared first on CyberScoop.

Continue reading Poly Network offers bug bounty to hacker who stole $600 million worth of cryptocurrency

Strike First: The Benefits of Working With an Ethical Hacker

With cybersecurity attacks on the rise, companies must explore new ways to stay one step ahead of threat actors. IDG Research Services found that 78% of IT leaders are not confident in their companies’ security postures, which lead 91% of organizations to increase cybersecurity funding for 2021. As part of this increased focus, many companies are turning […]

The post Strike First: The Benefits of Working With an Ethical Hacker appeared first on Security Intelligence.

Continue reading Strike First: The Benefits of Working With an Ethical Hacker

U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021

U.S. agencies must implement vulnerability-disclosure policies by March 2021, according to a new CISA mandate. Continue reading U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021

Night Vision: Navigating the Darknet for Improved Threat Intelligence

Reading Time: 4 minutes Securely accessing the darknet can help organizations overhear criminal conversations, find actionable data, look for evidence of compromise, build better defenses and uncover critical user risks.

The post Night Vision: Navigating the Darknet for Improved Threat Intelligence appeared first on Security Intelligence.

Continue reading Night Vision: Navigating the Darknet for Improved Threat Intelligence