https://youtube.com/@apacalpa
The lesson? Even billion-dollar companies can overlook BASIC security hygiene:
Protect your dev environments
Secure critical infrastructure
Vet your third-party providers
Otherwise, congrats—you've just funded North Korea.
The lesson? Even billion-dollar companies can overlook BASIC security hygiene:
Protect your dev environments
Secure critical infrastructure
Vet your third-party providers
Otherwise, congrats—you've just funded North Korea.
Experts point to North Korea’s Lazarus Group as the likely culprits. Yep, Bybit’s crypto stash might now fund a little a small country...
Experts point to North Korea’s Lazarus Group as the likely culprits. Yep, Bybit’s crypto stash might now fund a little a small country...
Bybit has been scrambling, promising tighter security. Safe{Wallet} is investigating how a single compromised developer environment brought down their entire security.
Bybit has been scrambling, promising tighter security. Safe{Wallet} is investigating how a single compromised developer environment brought down their entire security.
Forensic analysts discovered the truth hidden in the Chrome cache—because even hackers forget browser cache exists... sometimes.
Forensic analysts discovered the truth hidden in the Chrome cache—because even hackers forget browser cache exists... sometimes.
And just TWO MINUTES after pulling off the heist, the attackers wiped all evidence, updating Safe{Wallet}’s AWS bucket with clean code. Talk about efficiency.
And just TWO MINUTES after pulling off the heist, the attackers wiped all evidence, updating Safe{Wallet}’s AWS bucket with clean code. Talk about efficiency.
When Bybit security signed off on the transaction, it appeared perfectly legitimate, until the altered script silently redirected all the ETH straight into the hacker’s wallet.
When Bybit security signed off on the transaction, it appeared perfectly legitimate, until the altered script silently redirected all the ETH straight into the hacker’s wallet.
This code didn’t just blindly steal funds, it specifically activated ONLY when Bybit moved funds from their cold wallet. Sneaky, targeted, and patient.
This code didn’t just blindly steal funds, it specifically activated ONLY when Bybit moved funds from their cold wallet. Sneaky, targeted, and patient.
Hackers compromised a Safe{Wallet} developer's computer via social engineering, stole AWS tokens, and quietly injected malicious JavaScript into Safe{Wallet}'s AWS bucket.
Hackers compromised a Safe{Wallet} developer's computer via social engineering, stole AWS tokens, and quietly injected malicious JavaScript into Safe{Wallet}'s AWS bucket.
Bybit relied on Safe{Wallet}, a secure, third-party multisig wallet.
Sounds safe, right?
Well, someone thought it'd be a good idea to store critical signing JavaScript in an AWS bucket.
Bybit relied on Safe{Wallet}, a secure, third-party multisig wallet.
Sounds safe, right?
Well, someone thought it'd be a good idea to store critical signing JavaScript in an AWS bucket.
Bybit, a major crypto exchange, lost $1.5 BILLION in Ethereum. But this wasn't some high-tech, futuristic cyberattack.... it's worse.
Bybit, a major crypto exchange, lost $1.5 BILLION in Ethereum. But this wasn't some high-tech, futuristic cyberattack.... it's worse.
You could theoretically vary the magnetron’s output power to encode binary data. This would involve dynamically adjusting the power supply to create different output levels.
high voltage that is necessary for multiple components would be needed to switch on/off rapidly...
You could theoretically vary the magnetron’s output power to encode binary data. This would involve dynamically adjusting the power supply to create different output levels.
high voltage that is necessary for multiple components would be needed to switch on/off rapidly...