Search results
North Korean hackers use Tornado Cash to launder stolen cryptocurrency | Invezz
Invezz· 7 hours agoA confidential United Nations report recently revealed that the North Korean hacking group, The...
Defense contractors face a long road on cybersecurity, NSA official says
Axios· 3 days agoMost defense contractors believe they're too small and inconsequential for nation-state hackers to...
North Korean hackers leveraged Tornado Cash to launder $147.5 million in stolen crypto funds
The Forex Market· 5 days agoUN sanctions committee showed North Korean hackers laundered $147.5 million in March through Tornado...
Warding off health care hackers
Politico· 6 days agoA number of advocacy groups, including the National Down Syndrome Society, share Rodgers’ view. RI HOSPITAL INVESTIGATED...Monday. The investigation into privately run Bradley ...
Commerce Department moves to beef up its own routing security
Axios· 6 days agoThe Commerce Department has started implementing new internet routing security measures to fend off ...
Feds issue another cybersecurity alert
The Center Square· 6 days agoIn a joint federal cybersecurity advisory, the Federal Bureau of Investigations, U.S. Department of State, and National Security Agency warned that the...
North Korea used Tornado Cash to siphon HTX’s $147.5M loot: UN
The Cointelegraph· 5 days agoThe Lazarus Group used Tornado Cash privacy protocol to move funds from a 2023 HTX hack. Developer Alexey Pertsev was sentenced for laundering $1.2 billion on the platform.
Cyber threat outlook for the sports industry
Reuters· 5 days agoThe professional sports industry represents the unique intersection of numerous motivating factors for cyber criminals. In recent years, criminal hackers seeking financial ...
Inside Audrey Tang’s Plan to Align Technology with Democracy
Time via Yahoo News· 20 hours agoIn 2022, Tang was named Taiwan’s first minister for digital affairs, and in 2023 she was made...
Maximizing cybersecurity ROI: A strategic approach
TechRadar· 5 days agoThe availability of advanced automated attack tools, accessible dark web marketplaces, the prevalence of Ransomware-as-a-Service (RaaS), and often...