
The mass compromise of the VoIP firm’s customers is the first confirmed incident where one software supply chain attack enabled another, researchers say.
The mass compromise of the VoIP firm’s customers is the first confirmed incident where one software supply chain attack enabled another, researchers say.
North Korean hackers appear to have used the corrupted VoIP software to go after just a handful of crypto firms with “surgical precision.”
A spy group working for the Kim regime has been feeding stolen coins into crypto mining services in an effort to throw tracers off their trail.
Any mention of crypto was deliberately veiled at this year’s festival. And that strategy might catch on.
The FBI’s latest Internet Crime Report highlights the stunning rise of investment-themed crimes over the past 18 months.
And according to tracing firm Chainalysis, one very prolific scammer ran at least 264 of those scams in 2022 alone.
The world’s most prolific crypto thieves have used Sinbad.io to launder tens of millions. Its creator, “Mehdi,” answers WIRED’s questions.
This week on Gadget Lab, we talk to Tracers in the Dark author Andy Greenberg about how authorities are catching crypto criminals by following the money.
The crypto money-laundering market is tighter than at any time in the past decade, and the few big players are moving a “shocking” amount of currency.
This week on Gadget Lab, we talk about the development of the Ledger Stax, a cryptocurrency wallet designed by Tony Fadell.