The Tron network is a decentralized blockchain platform that aspires to create an expansive and interconnected global digital content ecosystem. At its core, Tron...
The decentralized cross-chain protocol Orbit Chain is allocating a hefty amount to identify the culprit who stole $81 million worth of crypto assets from...
In the ever-evolving world of Non-Fungible Tokens (NFTs), security is a paramount concern. This piece delves into the intricacies of smart contract vulnerabilities,...
Weekly Update #34January 8, 2024CipherTraceMARK COLLINS & DEMETRIOS TSEASRegulatory:Four individuals charged for laundering millions from cryptocurrencyA cryptocurrency (or crypto currency) is a digital asset...
When videoconferencing service Zoom searched for a better way to assign a severity to vulnerabilities found during bug bounty programs, the company's security team...
A former senior security engineer, Shakeeb Ahmed, pled guilty to the hacking incident on the decentralized finance yield protocol, Nirvana Finance, along with...
At Google, we maintain a Vulnerability Reward Program to honor cutting-edge external contributions addressing issues in Google-owned and Alphabet-subsidiary Web properties. To keep up...
COMMENTARYEach spring, the annual Hack the Capitol event brings together a diverse group of scientists, hackers, and policymakers to educate congressional staffers, scholars, and the...
Videoconferencing company Zoom has rolled out a new vulnerability scoring system that promises to help cybersecurity teams prioritize resources against the most dangerous threats.Still...