1.4 billion dollars of bybit stolen in the largest stolen cryptocurrency theft


Since the so -called government efficiency with the US government continues to rape by making a widespread reduction in the federal labor force, numerous in -law cases claim that the group’s access to sensitive data, privacy law inspired It violates and needs and needs it. To stop it, DOGE obtained staff at the Homeland Security and Security Infrastructure Security and Security Agency this week and accessed CISA digital systems after the agency last week last week He had frozen his eight -year -old.

The National Institute of Standards and Technology was also in control of approximately 500 employees this week, which could have a serious impact on NIST cyber security standards and software vulnerability. Last week, the US digital service declines, which includes cyber security for the central veterans’ portal, VA.gov, potentially makes VA systems and data more vulnerable without anyone.

Several US government sectors are now investigating TP-Link routers built in China following China’s offensive digital spy campaigns. (The company denies any relationship with cyber attacks.) A wired research showed that Google advertising technology users can target categories that should not be under the policies of the company, including people with chronic diseases or individuals. The debt available. Advertisers can also target “national security decision makers” and individuals involved in the development of classified defense technology.

Google researchers warned this week that hackers were tied to Russia and deceived Ukrainian soldiers with fake QR codes for signal invitations to exploit the defect to allow attackers to spy on target messages. The signal has done updates to stop the operation. And a wired deep dive examines how difficult it is for web users who delete their intimate images and videos from the web.

And there are more things every week, we collect security news and privacy that we have not covered deeply. Click the titles to read the full stories. And stay safe there.

Implementation of encryption exchange is a high -risk business, as victims of hacking such as the Gox Mountains, Bitfinex, FTX and many other people can certify. But before that no Crypto platform lost $ 10 digits in a single magazine. This new record belongs to Babyte, which showed on Friday that thieves have hacking of ethereum -based holding. According to an estimate by Cryptocurrency Elliptic – the largest cryptocurrency theft at all times, with some actions, hackers were $ 1.4 billion.

Ben Zhou, CEO of Bibbit, wrote in X that hackers have used “black transaction” – thus the “masked deal” mistake – to deceive the exchanging exchanged in the encrypted signature on the Code Contract Contract Code with its own warehouse “Please be sure that other cold wallets are safe.” “All the perceptions are normal.” Zhou later added in another note in X that the exchange can cover the loss, which, if real, indicates that no user will lose their budget.

Thefts of other historical hacks, such as Gox and FTX Mountains, each lost the cryptocurrencies worth hundreds of millions of dollars at the time of the discovery of robberies. Even the robbery of the Bitfinex Heist 2016, which was worth about $ 4.5 billion at the time of the robbery and most of the budget received in 2022, was worth only $ 72 million at the time of robbery. The $ 1.4 billion in Babyte is much bigger with this loss, and given that all encrypted thefts reached $ 2.2 billion in 2024, according to Blockchain Chainalysis Analysis, a new Crypto mass criterion.

The British government raised privacy warnings around the world earlier this month when Apple demands access to encrypted data to users. This data is protected by the advanced protection of Apple data, which encrypts user information so that no one other than the user can decrypt it – even Apple. Apple has now reached the pressure of England, and this is disabled end -to -end encryption for ICloud across the country. “Even by turning off this protection, Apple expressed their willingness in a statement:” Increasing cloud storage is essential with an end -to -end encryption of the past, “the company said. “Apple is still committed to providing the highest level of security for its personal data, and we hope we can do so in the UK in the future.” Supporters of privacy around the world argue that this action – and the British pressure for it – weakens the security and privacy of British citizens and makes technical companies vulnerable to similar supervision demands from other governments around the world.

The only thing that is worse than the Scourge of Stalkerware Apps-Mulcul mounted on phones using spouses or other handheld spies to evaluate all the movements and communications of the victim-when these programs are so guaranteed that the information of the victims is also guaranteed. Leaks to the Internet of Stalkerware Cocospy and Spyic, which appears to be made by a person in China and mainly subscribe to the source code Thanks to a security vulnerability in both programs, data stolen from millions of victims exposed to both the security vulnerability in both programs, he discovered. Shared defects and information about it with Techcrunch. Found Techcrunch includes data exposed to messages, contact reports and photos. In a Carrmic twist, they also included millions of email addresses from the registered Stalkerware users, who had installed programs for spying on victims.

Leave a Reply

Your email address will not be published. Required fields are marked *