weekly digest

Weekly News Digest #66
  • Industry News
  • weekly digest

Weekly News Digest #66

Grim Finance lost $30M, new hire blamed for vulnerability Hackers stole >$30M from Grim Finance by exploiting platform vulnerability. Due to the advanced attack, all vaults were put on pause to prevent further attacks. The exploit was found in the platform’s vault contract. The company has notified DAI, AnySwap, and Circle (USDC) of the incident

24 Dec 2021

Weekly News Digest #65
  • Industry News
  • weekly digest

Weekly News Digest #65

Terrifying zero-click iPhone attack The surveillance company NSO Group developed an exploit allowing the users of its software to gain access to an iPhone to install malware – in this case, a target does not even need to click on a link. Last month, NSO Group was added to the “entity list” of the US

17 Dec 2021

Weekly News Digest #64
  • Industry News
  • weekly digest

Weekly News Digest #64

Discord tokens are stolen by malicious NPM packages 17 new malicious packages in the npm (Node.js package manager) repository have been discovered by the security firm JFrog. The key purpose of these packages is to steal users’ Discord tokens. By hijacking users’ Discord tokens, attackers can get full control over the victims’ accounts. In the

10 Dec 2021

Weekly News Digest #63
  • Industry News
  • weekly digest

Weekly News Digest #63

$120 million hack affecting Badger DAO Protocol Badger DAO Protocol has fallen victim to a hack, $120.3 million in cryptocurrencies was stolen from its users. The first messages from users mentioning possible problems were coming on Wednesday at 9 p.m. ET. According to the data provided by PeckShield, the total amount of lost assets included

3 Dec 2021

Weekly News Digest #62
  • Industry News
  • weekly digest

Weekly News Digest #62

Users may see their passwords stolen by a “silent threat” delivered by stealthy malware A new JavaScript downloader is used by cybercriminals to distribute 8 kinds of remote access Trojan malware and information-stealing malware. The key purpose of this malicious activity is to gain backdoor control of infected Windows systems and steal sensitive information such

26 Nov 2021

Weekly News Digest #61
  • Hacken News
  • weekly digest

Weekly News Digest #61

Courses on how to build botnets by dark web crooks Botnets are widely used to commit ransomware attacks, distribute malware and, generally, perform many other types of malicious activities. And this threat is likely to increase in the coming future since dark web forums are actively offering lessons to visitors on how to make money

19 Nov 2021

Weekly News Digest #60
  • Industry News
  • weekly digest

Weekly News Digest #60

Attackers can smuggle malware onto your network via a sneaky trick A relatively new form of cyberattacks dubbed “HTML smuggling” has been flagged by Microsoft. This malicious technique is used during targeted cyberattacks and in email campaigns deploying remote access Trojans and banking malware. Through this malicious technique, an attacker can “smuggle” encoded malicious script

12 Nov 2021

Weekly News Digest #59
  • Industry News
  • weekly digest

Weekly News Digest #59

FBI warning: Ransomware groups are tying their attacks to major events in the financial world Significant financial events are used by ransomware groups as leverage during their malicious activities. Such events as mergers and acquisitions are an ideal time for ransomware groups to commit attacks aimed at making victims pay the ransom. Before committing these

5 Nov 2021

Weekly News Digest #58
  • Industry News
  • weekly digest

Weekly News Digest #58

HTTPS Threats: 314% increase compared to 2020 According to the State of Encrypted Attacks report released by cybersecurity firm Zscaler, tech companies and retailers are facing a growing number of https threats since January. HTTPS threats have increased by 314% while attacks on retailers have increased by 800%, and attacks on tech companies by an

29 Oct 2021

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo