B57

Pure Crypto. Nothing Else.

China hackers

Cybersecurity Alert: Spike in Cryptocurrency Mining Malware Fueled by Leaked NSA Tool

Eternal Blue leak causes a dramatic rise in cryptocurrency mining malware infections on Microsoft systems. Read more about this cyber threat!

Weekly Crypto Wrap-Up: Controversies, Innovations, and Predictions

Join us for a roundup of the week’s top crypto stories, featuring scandals, innovations, and expert insights on digital currencies!

The Rise of Cryptojacking: Understanding the Malware Surge

Cryptojacking surged by 629% in 2018, highlighting a new wave of cybersecurity threats. Learn how criminals exploit systems for cryptocurrency.

Global Cybercrime Ring Busted: How a Gang Stole Over $1.2 Billion Through Phishing and Bitcoin

Spanish police arrest a cyber gang accused of stealing $1.24 billion from banks worldwide through phishing methods.

YouTube Under Attack: The Cryptojacking Saga Unfolds

Explore the cryptojacking incident reported on YouTube, where hackers used ads to mine cryptocurrency. Learn how Google responded swiftly.

Stellar Lumen Heist: How $400,000 Was Swiped in a DNS Hijack

Discover how a DNS hijack led to a $400,000 theft of Stellar Lumen (XLM) coins from Blackwallet.co. Insights from the developer and community response.

North Korea’s Bitcoin Hoarding: A Growing Cyber Threat

Discover how North Korea is hoarding Bitcoin for cyber attacks and what it means for global cybersecurity.

Electroneum Faces Major DDoS Attack: The Slippery Slope of Cryptocurrency Launches

Electroneum’s $40 million ICO is marred by a DDoS attack, locking out investors and raising serious security questions.

Understanding Estonia’s ID Card Crisis: A Deep Dive into the Digital Security Flaw

Explore the crisis surrounding Estonia’s ID cards after a serious security flaw was uncovered. Understand its implications and future steps.

How Blockchain is Turning Cybersecurity into a Team Sport

Explore how Blockchain technology safeguards against cyber threats by pooling bandwidth and incentivizing ethical hackers.