Two students from the prestigious Massachusetts Institute of Technology (MIT) have been charged for exploiting a bug in the Ethereum blockchain, which allowed them to steal $25 million in cryptocurrency. The students, who have been identified as 23-year-old Nathan and 25-year-old Grace, allegedly discovered a vulnerability in the Ethereum smart contract code that allowed them… Continue reading Two MIT students charged for exploiting Ethereum blockchain bug, stole $25 million in crypto
Category: exploiting
Open garage doors anywhere in the world by exploiting this “smart” device
Today’s world has become increasingly connected and technology has now made it possible to open garage doors from anywhere in the world. A “smart” device can be used to exploit this new technology and open garage doors with ease. These devices come equipped with a range of features that allow users to easily control and… Continue reading Open garage doors anywhere in the world by exploiting this “smart” device
Open garage doors anywhere in the world by exploiting this “smart” device
As technology advances, so does our level of convenience. Now with smart garage doors, home owners can easily open and close their garage doors with the touch of a button- no matter where they are in the world. Smart garage doors makes it possible to open and close your garage with the touch of a… Continue reading Open garage doors anywhere in the world by exploiting this “smart” device
Ransomware crooks are exploiting IBM file-exchange bug with a 9.8 severity
The technology world is abuzz with news of how crooks are exploiting a bug in IBM’s file exchange software with a 9.8 severity to launch ransomware attacks. This vulnerability exists in the IBM Host On-Demand (HOD) system, which is a file-sharing platform used by businesses to securely exchange files. According to IBM, the bug is… Continue reading Ransomware crooks are exploiting IBM file-exchange bug with a 9.8 severity
Ransomware crooks are exploiting IBM file exchange bug with a 9.8 severity
Recent reports from security company Forcepoint have confirmed that ransomware criminals are exploiting a bug in IBM File Exchange, a popular file sharing software, with a severity rating of 9.8. The flaw enables attackers to gain access to shared files stored on the system and once infiltrated, they can encrypt the files and demand a… Continue reading Ransomware crooks are exploiting IBM file exchange bug with a 9.8 severity
Hackers drain bitcoin ATMs of $1.5 million by exploiting 0-day bug
The increase in the use of cryptocurrency has not gone unnoticed by hackers. One incident in particular – when hackers exploited an unknown vulnerability (also known as a 0-day bug) to drain Bitcoin ATMs of $1.5 million – has captured headlines in the cryptocurrency community. According to reports, the hackers hacked into 14 Bitcoin ATMs… Continue reading Hackers drain bitcoin ATMs of $1.5 million by exploiting 0-day bug
This malware tool is still successfully exploiting Internet Explorer vulnerabilities
The world is steadily moving away from legacy software applications and operating systems, such as Internet Explorer, yet the web browser and its vulnerabilities remain a favored target for malicious actors deploying tactics and tools to exploit known security issues and gaining access to user’s data. Unpatched or otherwise neglected Internet Explorer software is leaving… Continue reading This malware tool is still successfully exploiting Internet Explorer vulnerabilities