🔔
🎄
🎁
🦌
🛷
NEW
What is security vulnerabilities? security vulnerabilities news, security vulnerabilities meaning, security vulnerabilities definition - Blockchain.News
Search results for

security vulnerabilities

Tik Tok Pushes Harder for Blockchain Despite Vulnerabilities in Core System

Tik Tok Pushes Harder for Blockchain Despite Vulnerabilities in Core System

Hundreds of millions of users are using Tik Tok, meaning that any breach of data could lead to serious vulnerabilities for users and the company.

ZenGo uncovers dApp vulnerability

ZenGo uncovers dApp vulnerability

ZenGo has discovered a security vulnerability called the "red pill attack" in decentralized applications or dApps. The vulnerability allowed malicious dApps to steal user assets using opaque transaction approvals. Many leading vendors, including Coinbase Wallet, were vulnerable to such attacks. ZenGo found that developers took a shortcut in setting "Special Variables" to arbitrary values during simulation, leaving the simulation vulnerable to attack. ZenGo said the fix was straightforward and urged developers to populate vulnerable variables with meaningful values.

Solana Foundation Offers $400k Bounty for Critical Code Discovery

Solana Foundation Offers $400k Bounty for Critical Code Discovery

Jacob Creech announces a $400k bounty for discovering code that can halt Solana network, part of Solana Foundation's endeavor to ensure robust network security.

Is China Hacking Australia? Cryptojacking Cyberattacks Hit Hard Down Under

Is China Hacking Australia? Cryptojacking Cyberattacks Hit Hard Down Under

The Australian Cyber Security Center has published a report highlighting vulnerabilities that are being exploited by hackers using cryptojacking malware.

Twitter Hires Former Hacker Peiter 'Mudge' Zatko as Head of Security

Twitter Hires Former Hacker Peiter 'Mudge' Zatko as Head of Security

Following the high-profile security breach witnessed in July this year, Twitter has hired former hacker Peiter 'Mudge' Zatko as its new head of security.

Origin DeFi Protocol Loses $7 Million to Hacker in Security Breach

Origin DeFi Protocol Loses $7 Million to Hacker in Security Breach

Origin Protocol is the latest DeFi platform to lose $7 million due to hacking. The company has said that it is working to restore the stolen funds.

Peertec Joins Hands with Penta Security for Blockchain-Enabled Infrastructural Security

Peertec Joins Hands with Penta Security for Blockchain-Enabled Infrastructural Security

Peertec, a leading blockchain-focused fintech firm, has revealed its strategic collaboration with Penta Security, a highly valued web and data security company. The partnership is expected to boost Peertec’s infrastructure security using blockchain technology. The safety of its GDAC cryptocurrency exchange and services is also expected to be strengthened.

DLA Piper: Security Tokenization in Hong Kong

DLA Piper: Security Tokenization in Hong Kong

Security tokenization is the representation of fractional interests in an asset using blockchain. A security token derives its value from an underlying asset, such as a work of art. This differs from a utility token, which gives a holder the right to use a particular product or service, or a cryptocurrency such as Bitcoin, which has its own value as a currency.

Preventing Future Hacks: Twitter Improves Security Ahead of US Elections

Preventing Future Hacks: Twitter Improves Security Ahead of US Elections

Social media giant, Twitter has revamped its security measures for high profile accounts ahead of the U.S. November Presidential Elections.

Coinbase, Gemini, Binance & Kraken Address Twitter Hack: "Repercussions for Bitcoin Could’ve Been Worse"

Coinbase, Gemini, Binance & Kraken Address Twitter Hack: "Repercussions for Bitcoin Could’ve Been Worse"

Twitter has never in its history experienced as big of a security breach and crypto hack scam as the one that happened earlier this week.

SEC Delays Decision on Overstock-Backed Security Token Exchange

SEC Delays Decision on Overstock-Backed Security Token Exchange

The SEC has extended the timeline for its to disapprove or approve operations by the BSTX, a security token exchanged affiliated with Overstock’s blockchain arm tZERO.

Crypto.com Leverages Amazon's AWS Cloud To Enhance Scalability and Security

Crypto.com Leverages Amazon's AWS Cloud To Enhance Scalability and Security

Crypto.com will now leverage Amazon Web Services, Inc (AWS) cloud provider to provide enhanced scalability and security for its 5 million users,

Kaspersky’s Expert Take on KYC and AML: Stock vs Crypto Exchanges

Kaspersky’s Expert Take on KYC and AML: Stock vs Crypto Exchanges

In Part 2 of our interview, Yeo Siang Tiong, General Manager for Southeast Asia, Kaspersky shared how Kaspersky provides cybersecurity solutions for stock and crypto exchanges to address KYC and AML concerns. He also walked us through the Kaspersky Application Security Assessment and explained its significance in safeguarding assets in crypto exchanges.

Verizon Cybersecurity CPO, Alex Schlager on Why 5G Networks Require a Whole New Approach to Enterprise Online Data Security

Verizon Cybersecurity CPO, Alex Schlager on Why 5G Networks Require a Whole New Approach to Enterprise Online Data Security

Alex Schlager, CPO of Security Services for Verizon Business believes 5G networks require a completely new way of thinking about security.

Trending topics