• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ All CS Digest Sections / RECENT HEADLINES / Blockchain and Digital Currency

CS Digest Section: Blockchain and Digital Currency

Second-Largest US Bank Wins Patent for Crypto Storage System

Posted: 11/13/2018 | Leave a Comment

Recent times have seen banks hedging their bets or even fully integrating cryptocurrencies. The acquisition and filing of patents is how large organizations truly express their interest in a given field, and Bank of America continues to lead the way, now having secured its latest patent in the blockchain and crypto space, one for "tamper-responsive" remote

https://www.ccn.com/second-largest-us-bank-wins-patent-for-crypto-storage-system/

VMware Unveils New Blockchain Service

Posted: 11/13/2018 | Leave a Comment

One of the new technologies announced on Tuesday by VMware at its VMworld 2018 Europe conference is VMware Blockchain, which aims to provide enterprises a decentralized trust infrastructure based on permissioned blockchain.

https://www.securityweek.com/vmware-unveils-new-blockchain-service

This Cryptojacking Mining Malware Pretends to be a Flash Update

Posted: 10/16/2018 | Leave a Comment

Cryptojacking crooks hide mining malware in what looks like a legitimate software update.

https://www.zdnet.com/article/cryptojacking-mining-malware-pretends-to-be-a-flash-update/

KickICO Platform Loses $7.7 Million in Recent Hack

Posted: 08/07/2018 | Leave a Comment

On Friday, ICO platform KickICO acknowledged a security breach during which an unknown attacker (or attackers) stole over 70 million KICK tokens ($7.7 million at the time of the hack) from the platform's wallets.

https://www.bleepingcomputer.com/news/security/kickico-platform-loses-77-million-in-recent-hack/

Cryptocurrency Trading App Taylor Says all Funds Have Been Stolen in Cyberattack

Posted: 05/29/2018 | Leave a Comment

A nightmare for promising startups but a common problem in the cryptocurrency industry is theft -- and the attacker which allegedly targeted Taylor did not hold back.

https://www.zdnet.com/article/all-of-cryptocurrency-trading-app-taylors-funds-have-been-stolen/

AWS Traffic Hijack: Users Sent to Phishing Site in Two-hour Cryptocurrency Heist

Posted: 05/01/2018 | Leave a Comment

Attackers on Tuesday pulled off a complex attack using kinks in core internet infrastructure that caused users of an Ethereum wallet developer's website to be redirected to a phishing site.

https://www.zdnet.com/article/aws-traffic-hijack-users-sent-to-phishing-site-in-two-hour-cryptocurrency-heist/

Isolated, Air-Gapped Cypto-Wallets Hacked

Posted: 05/01/2018 | Leave a Comment

For those who manage their cryptocurrency in offline, or "cold," wallets under the premise that they cannot be compromised, recent news from researcher Dr. Mordechai Guri from Ben-Gurion University of the Negev, Israel, raises some alarms. Guri demonstrated that cold wallets can be infected with malicious code, allowing an attacker to access the wallet’s

https://www.infosecurity-magazine.com/news/isolated-airgapped-cypto-wallets/

Windows Servers Targeted for Cryptocurrency Mining via IIS Flaw

Posted: 04/17/2018 | Leave a Comment

Hackers are leveraging an IIS 6.0 vulnerability to take over Windows servers and install a malware strain that mines the Electroneum cryptocurrency.

https://www.bleepingcomputer.com/news/security/windows-servers-targeted-for-cryptocurrency-mining-via-iis-flaw/

81% of Recent ICOs Were Scams, Research Finds

Posted: 04/03/2018 | Leave a Comment

Four out of five initial coin offerings (ICOs) that have taken place in the last year have been classified as scams, according to a recent study by Satis Group, an ICO advisory firm. ICOs have been the rage of the cryptocurrency world because they allow companies to raise money for various ventures by issuing cryptocurrency tokens that users could buy and

https://www.bleepingcomputer.com/news/cryptocurrency/81-percent-of-recent-icos-were-scams-research-finds/

CoinMiner Campaigns Move to the Cloud via Docker, Kubernetes

Posted: 04/03/2018 | Leave a Comment

After becoming a scourge inside browsers, on desktops, and on servers, cryptocurrency-mining malware is now invading the cloud, and it appears to be quite successful.

https://www.bleepingcomputer.com/news/security/coinminer-campaigns-move-to-the-cloud-via-docker-kubernetes/

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
US Department of Defense Logo USD(R&E) Logo DTIC Logo DoD IACs Logo

Copyright 2012-2021, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information
Accessibility / Section 508 | FOIA | Link Disclaimer | No Fear Act | Policy Memoranda | Privacy, Security & Copyright | Recovery Act | USA.Gov

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT