Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks Targeting NFT Marketplaces and Cryptographic Aficionados

Everything technology touches gets a digital makeover and the creative space wouldn’t be the exception. Non-fungible tokens (NFTs) are virtual assets that represent objects influenced by art, music, games, and videos. You can only buy them online, likely with cryptocurrency. NFTs are generally encoded with the same underlying software as many cryptos. In fact, they are part of the Ethereum blockchain, a cryptocurrency, like bitcoin or dogecoin.

Introducing the first web3 engine.

Fireblocks Web3 Engine is the most comprehensive and secure suite of Web3 solutions for gaming studios, NFT services, and enterprises building the next generation of Web3 products. The Fireblocks Web3 Engine consists of 3 product suites: The #DeFi Suite: Build new DeFi-enabled Web3 services to generate yield for users, with connection to the widest range of both EVM and non-EVM blockchain protocols.

How Businesses Can Scale in the Financial Digital Asset Space

Manual operations limit the scaling of a digital asset business. Fireblocks Head of APAC & Vice President, Product Strategy and Business Solutions, Stephen Richardson, shares how over 1,200 institutions have leveraged Fireblocks to efficiently scale their crypto and digital asset businesses.

The Cybersecurity Dangers of Cryptocurrency

Cryptocurrency, the next generation of money. Adored by luminaries from Elon Musk to Snoop Dogg. Now the official currency of El Salvador, and a funding source for Ukrainian resistance to the Russian invasion. But is crypto really all that it seems? Cryptocurrency has tremendous potential to address a host of the world’s financial issues: from limited access to financial resources, to ineffective and costly payment and transfer services.

How Fireblocks Is Innovating MPC Wallet Technology

Our MPC-CMP algorithm at Fireblocks has brought a complete evolution in our clients’ security architecture. There are many benefits in utilizing MPC, such as the distribution of signing, the removal of a single point of failure from the system, and flexible M event signing structures. But MPC has its downsides, including a low transaction speed due to multiple rounds in the MPC signing process, and a lack of a truly air-gapped MPC solution.

What Is Cryptojacking and How Can You Defend Against It?

It should come as no surprise that as cryptocurrencies become more popular and edge towards the mainstream, the mining of these digital currencies—which uses computing power to solve complex math problem— has given rise to a new form of cyber attack: cryptojacking. Cryptojacking may sound like a way to steal someone's cryptocurrency assets, but it's a less obvious form of theft.

The Karakurt Web: Threat Intel and Blockchain Analysis Reveals Extension of Conti Business Model

Tetra Defense, an Arctic Wolf® company, partnered with Chainalysis to analyze the link between the Karakurt cyber extortion group to both Conti and Diavol ransomware through Tetra’s digital forensics and Chainalysis’ blockchain analytics. As recent leaks have revealed, Conti and Trickbot are complicated operations with sophisticated structures. But, our findings indicate that web is even wider than originally thought, to include additional exfiltration-only operations.