Microsoft researchers have discovered StilachiRAT malware, designed to evade detection and steal credentials stored in Google Chrome.
Security News

Blockchain and cryptocurrency security is essential. After all, an autonomous monetary system can only go so far if it can be easily exploited by hackers, rendered inoperable through a mere software bug, or shut down by the powers that be.
Bitcoin’s unique security model is possible through a clever alignment of incentives between the network’s stakeholders — miners, developers, merchants and users. Any attempt to capture the network or reorganize the chain would result in the value of the currency plummeting and thus render any intended benefit completely worthless. The cost of being a bad actor significantly outweighs any possible reward.
Thus, it is in every participant’s best interest to simply play by the rules and collectively work toward the maturation and adoption of the Bitcoin (BTC) ecosystem.
Since its launch in January 2009, the Bitcoin network has never been compromised at the base layer and has had virtually 0% downtime, making it one of the most secure computer systems on the planet.
Cryptocurrency wallets, applications and exchanges that build products and services atop Bitcoin and other crypto networks, however, have frequently been the target of hacks and scams, highlighting the ongoing need to establish best practices around cybersecurity and operational security.
- Explained
- How to
Address poisoning attacks involve tracking, misusing or compromising cryptocurrency addresses.
11497 - News
As long as victims keep falling for handing over their 24-word seed phrase, bad actors will keep going for the easiest payday, says a crypto executive.
5390 - News
Zoth suffered an $8.4 million exploit after admin privileges were compromised. The team promised to publish a full incident report post-investigation.
17474 - News
The endorsement suggests that Ethereum may play an important role in the US’s permissioned security token ecosystem.
2931 - News
The securities regulator has clarified its stance on so-called “Covered Crypto Assets” and “Protocol Mining” involving public, permissionless PoW networks.
5085 - Explained
California’s DFPI crypto scam tracker lets users identify scams early and helps safeguard crypto assets from fraudulent activities.
- News
Bybit has already paid out $2.2 million for “bounty hunters” who can provide valuable information on the Lazarus Group’s transaction patterns related to the stolen funds.
5729 - News
The SEC’s dismissal of its years-long case against Ripple Labs marks a “new chapter” for crypto, the CEO said.
9547 - News
Pre-transaction verification solutions may stop a significant amount of phishing attacks, according to the CEO of Cyvers blockchain security firm.
7139 - News
An attacker has compromised the dashboard of an AI-powered crypto bot and prompted it to transfer $106,200 worth of Ether out of its wallet.
3384 - Report
Cointelegraph Research explores how Elastos leverages Bitcoin’s security to support decentralized finance through trustless crosschain solutions.
9602 - Explained
If you’ve been scammed in the crypto space, you’re not alone. Here’s a clear guide on reporting the scam and safeguarding your digital assets moving forward.
- Explained
Discover how AI bots exploit vulnerabilities, why traditional security measures are no longer enough, and what steps can keep your crypto safe.
- Opinion
As Web3 grows, its metadata problem intensifies, risking a global data security crisis. Can anonymity networks and new technologies protect users from AI-powered surveillance?
4150