crypto

For those who are unfamiliar with typosquatting, this criminal activity is quite worrisome. It usually revolves around an individual – or a group of individuals – who register domain names which closely resemble existing platforms. For example, they would register Coinbasee.com if it were available and use that domain as a wayRead More →

crypto

Attackers are actively scanning for exposed Docker APIs on port 2375 and use them to deploy a malicious payload which drops a Dofloo Trojan variant, a malware known as a popular tool for building large scale botnets. The Dofloo (aka AESDDoS) malware was first detected in 2014 [1, 2, 3, 4] and it is known for allowingRead More →

cryptocurrency

Base layer protocols: Base layer protocols are the peer-to-peer networks which form the basis of the Decentralized application (dApp) web. These base protocols are typically blockchains with an associated cryptocurrency coin secured by a consensus protocol where participants in the network decide collectively on the addition of new blocks toRead More →

crypto

Hackers are trying a novel approach to extort developers of some money. Ransomware, a type of attack where hackers infect computers, encrypt their content, and ask for money in exchange for a decryption key that will restore their data, has been around for years. This new attack is a little differentRead More →