Blockchain security

Blockchain graphic

Often it the online processes around blockchain and cyrpto-currencies that are exploited by the threat actors, not the blockchain itself – which remains secure. Following a year of research, a report by Trail of Bits, commissioned by the US Government Defense Advanced Research Projects Agency (DARPA) shows that the blockchain …

Credential stealer

racoon

The Raccoon Stealer malware is back with an updated version, with added functionality and capabilities. This malware is offered as malware-as-a-service (mimicking a legitimate business model), enabling less well equipped threat actors to implement sophisticated cyber security attacks. Expect the use of this malware to increase as threat actors, looking for …