#blockchain-security

[ follow ]
#quantum-computing
fromTechRepublic
2 days ago
Information security

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
fromSecurityWeek
3 days ago
Information security

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Information security
fromTechRepublic
2 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Information security
fromSecurityWeek
3 days ago

Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption

Google's Quantum AI warns that cryptocurrencies are more vulnerable to quantum attacks than previously believed, shortening the timeline for potential threats.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Fenbushi Capital Co-Founder Bo Shen Launches Bounty to Recover $42M Crypto Theft From 2022

A significant crypto theft of $42 million occurred due to a compromised seed phrase, with ongoing efforts to trace and recover the stolen assets.
fromCointelegraph
6 months ago

Applied MEV protection via Shutter's threshold encryption

MEV is especially notorious on Ethereum, where it continues to be extracted at a rate equivalent to 11% of block rewards. Data shows that nearly $300,000 was lost in sandwich attacks in September. This reveals that MEV is a recurring hidden fee, not a minor inefficiency, hitting large trades hardest in volatile markets.
Cryptocurrency
fromCointelegraph
5 months ago

How Batched Threshold Encryption could end extractive MEV and make DeFi fair again

On most modern blockchains, transaction data is publicly viewable in the mempool before it is sequenced, executed and confirmed in a block. This transparency creates avenues for sophisticated parties to engage in extractive practices known as Maximal Extractable Value (MEV). MEV exploits the block proposer's ability to reorder, include or omit transactions for financial gain.
Cryptocurrency
Information security
fromCointelegraph
1 month ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
fromThe Hacker News
2 months ago

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check Point Research said in a technical report published last week.
Information security
#bitcoin
fromHackernoon
4 years ago
Cryptocurrency

Bitcoin Mining's Centralization Threat: Six Pools Now Control 95% of Mined Blocks | HackerNoon

fromHackernoon
4 years ago
Cryptocurrency

Bitcoin Mining's Centralization Threat: Six Pools Now Control 95% of Mined Blocks | HackerNoon

Information security
fromArs Technica
3 months ago

Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025

Supply-chain attacks surged in 2024–2025, allowing attackers to compromise single targets and infect thousands or millions of downstream users, causing widespread theft and outages.
fromTheregister
5 months ago

Attackers dig up $11M in Garden Finance crypto exploit

In a statement issued on Friday, Garden again said that user funds were safe and that the attack exploited one of its solvers. In the context of decentralized finance, a solver is typically an algorithm or trading agent that's relied on to execute transactions in the most efficient manner possible. Garden is a blockchain bridge protocol company, and its solvers earn a small profit for carrying out transactions between blockchains.
Information security
#ethereum
fromHackernoon
8 months ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

fromHackernoon
8 months ago
Cryptocurrency

AVVERIFIER Outpaces Mythril and ETHBMC in Smart Contract Vulnerability Detection | HackerNoon

Cryptocurrency
fromHackernoon
2 years ago

The Limits of Automated Selfish Mining Detection | HackerNoon

The analysis provides a fully automated procedure with formal correctness guarantees for selfish mining attacks in blockchain.
fromcointelegraph.com
9 months ago

The crypto trap that won't let you sell and how to avoid it

Modern honeypot scams involve deceptive tactics such as tampered wallets sold on platforms like TikTok, which are preloaded with private keys used to instantly steal funds.
Cryptocurrency
[ Load more ]