Cyber Security News | Blockchain.News

CYBER SECURITY

North Korea Allegedly Utilizes $2.8 Billion in Stolen Crypto for Military Funding
Cyber Security

North Korea Allegedly Utilizes $2.8 Billion in Stolen Crypto for Military Funding

North Korea's reliance on stolen cryptocurrency, reportedly amounting to $2.8 billion, is seen as a key factor in financing its military programs, according to CoinMarketCap.

Post-Quantum Crypto: Dubai's G42 and the Rise of Lattice-Based DeFi Security
Cyber Security

Post-Quantum Crypto: Dubai's G42 and the Rise of Lattice-Based DeFi Security

Dubai's G42 is developing lattice-based cryptography for DeFi to counter quantum computing threats, aiming to future-proof digital assets with quantum-resistant security.

AI Developer Tools Pose New Security Challenges as Attack Surfaces Expand
Cyber Security

AI Developer Tools Pose New Security Challenges as Attack Surfaces Expand

Explore how AI-enabled developer tools are creating new security risks. Learn about the potential for exploits and how to mitigate them.

Understanding the AI Kill Chain: Securing AI Applications Against Emerging Threats
Cyber Security

Understanding the AI Kill Chain: Securing AI Applications Against Emerging Threats

The AI Kill Chain framework outlines how attackers compromise AI systems and offers strategies to break the chain, enhancing security for AI-powered applications.

AI Exploitation: How Hackers Target Problem-Solving Instincts
Cyber Security

AI Exploitation: How Hackers Target Problem-Solving Instincts

Hackers exploit AI's problem-solving instincts, introducing new attack surfaces in multimodal reasoning models. Learn how these vulnerabilities are targeted and potential defenses.

Identifying and Preventing New Phishing Tactics
Cyber Security

Identifying and Preventing New Phishing Tactics

Explore six sophisticated phishing schemes, such as AI prompt injection and fake job offers, and learn how to protect yourself from these evolving cyber threats.

GitHub Enhances Secret Scanning with Expanded Pattern Support and Validators
Cyber Security

GitHub Enhances Secret Scanning with Expanded Pattern Support and Validators

GitHub has upgraded its secret scanning capabilities by adding new patterns and validators, enhancing the detection of sensitive information across repositories.

GitHub Enhances API with New Push Protection Configuration Endpoints
Cyber Security

GitHub Enhances API with New Push Protection Configuration Endpoints

GitHub introduces new REST API endpoints for managing push protection configurations, enhancing secret scanning at enterprise and organization levels.

NVIDIA Stresses Security: No Backdoors or Kill Switches in GPUs
Cyber Security

NVIDIA Stresses Security: No Backdoors or Kill Switches in GPUs

NVIDIA emphasizes its commitment to secure computing by rejecting the integration of backdoors or kill switches in its GPUs, highlighting the risks these features pose to global digital infrastructure.

Microsoft's UX Strategy Targets Cybercrime with Intuitive Design
Cyber Security

Microsoft's UX Strategy Targets Cybercrime with Intuitive Design

Microsoft is leveraging smarter UX design to combat the rise in online scams and cybercrime, integrating security into product development for safer user experiences.

Tether (USDT) Sponsors Key Cybersecurity Hackathon in Thailand
Cyber Security

Tether (USDT) Sponsors Key Cybersecurity Hackathon in Thailand

Tether (USDT) becomes a gold sponsor for the Cyber Warrior Hackathon 2025 in Thailand, promoting digital security and innovation in collaboration with local institutions.

HKMC Warns Public of Fraudulent Website Imitating Official Site
Cyber Security

HKMC Warns Public of Fraudulent Website Imitating Official Site

The Hong Kong Mortgage Corporation Limited alerts the public about a fraudulent website mimicking its official web presence, urging vigilance against scams.

Enhancing Data Center Security: The Role and Risks of Baseboard Management Controllers
Cyber Security

Enhancing Data Center Security: The Role and Risks of Baseboard Management Controllers

Baseboard Management Controllers (BMCs) are essential for remote management in data centers but pose significant security risks. NVIDIA's research reveals vulnerabilities and offers solutions.

HKMA and HKUST Collaborate to Enhance Cybersecurity in Hong Kong's Financial Sector
Cyber Security

HKMA and HKUST Collaborate to Enhance Cybersecurity in Hong Kong's Financial Sector

The Hong Kong Monetary Authority and HKUST Business School have signed an MoU to advance cybersecurity research, aiming to bolster Hong Kong's financial sector against emerging threats.

Microsoft and Partners Strike Blow Against Lumma Stealer Malware
Cyber Security

Microsoft and Partners Strike Blow Against Lumma Stealer Malware

Microsoft leads a global coalition to disrupt Lumma Stealer, a prominent malware tool used for cybercrime. Legal action and domain seizures mark a significant step in cybersecurity efforts.