Moola Market Manipulation
Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on the Celo blockchain – suffered…
Apple wants to build a new computing platform with AR
Apple’s plan to create an App Store and an easy way to create mixed-reality apps offers an important insight into its strategy and confirms that the company sees these devices as…
Researcher received a $27,000 bounty for 2FA bypass bug in Facebook and Instagram
A researcher disclosed technical details of a two-factor authentication bypass vulnerability affecting Instagram and Facebook. The researcher Gtm Manoz received a $27,000 bug bounty for having reported a two-factor authentication…
JD Sports Confirms Breach Affected 10 Million Customers
The cyber-attack hit the company between November 2018 and October 2020
Hackers Use TrickGate Software to Deploy Emotet, REvil, Other Malware
Threat actors used TrickGate to conduct between 40 and 650 attacks per week in the last two years
A glut of wiper malware hits Ukrainian targets
ESET researchers have discovered yet another wiper malware used to target Ukrainian organizations. Dubbed SwiftSlicer, it is thought to be wielded by the Sandworm APT. Simultaneously, the Ukranian CERT has…
Devs on Dark Web Forums Paid Up to $20,000 For Illicit Activities
The data comes from 155 dark web forums analyzed between January 2020 and June 2022
3 Fundamentals to Truly Secure Remote Workers
By Christian Aboujaoude, chief technology officer at Keck Medicine, USC In the pre-pandemic days, security solutions could be more basic. Securing the perimeter could be likened to locking the door…
Are You Overthinking Your Cloud Model? You Need a Cloud Strategy
Are you overthinking your cloud model? If so, you’re likely in need of a well-defined cloud strategy. Companies with a clear cloud strategy position themselves to achieve more from cloud…
This Next-Generation Data Center Fabric Is a Total Game Changer
As applications and IT services advance, scaling and modernizing data centers and meeting increased performance and security requirements grows more and more challenging. While networking technology has evolved over the…