stacker news ~bitcoin:
Thousands of sats stolen by Phoenix Wallet
Thousands of sats stolen by Phoenix Wallet
Stacker News
Thousands of sats stolen by Phoenix Wallet \ stacker news ~bitcoin
Last week, I transferred a large amount on chain into Phoenix wallet. Normally, it is supposed to deduct a fee, and then open up a lightning channel. The app has not done that. The funds are sitting in their “swap in” wallet, with the keys being controlled…
Anil Patel / anilsaidso:
RT by anilsaidso: Don’t measure your life by someone else’s ruler.
—Kevin Kelley
RT by anilsaidso: Don’t measure your life by someone else’s ruler.
—Kevin Kelley
El naranja toma noviembre: analiza la acumulación del gigante de tesorería en Bitcoin
#Analise #Gráfico #Noticias #Bitcoin_corporativo #Michael_Saylor #Strategy_Bitcoin
via BitcoinyCriptos
#Analise #Gráfico #Noticias #Bitcoin_corporativo #Michael_Saylor #Strategy_Bitcoin
via BitcoinyCriptos
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
#Security #Opsec #ESET_research
#Security #Opsec #ESET_research
Welivesecurity
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
The case for cybersecurity: Why successful businesses are built on protection
#Security #Opsec #Business_Security
#Security #Opsec #Business_Security
Welivesecurity
The case for cybersecurity: Why successful businesses are built on protection
It’s time to recognize the gravity of cyber risk, put security front and center and, ultimately, turn awareness into action.
IT service desks: The security blind spot that may put your business at risk
#Security #Opsec #Business_Security
#Security #Opsec #Business_Security
Welivesecurity
IT service desks: The security blind spot that may put your business at risk
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
SnakeStealer: How it preys on personal data – and how you can protect yourself
#Security #Opsec #Malware
#Security #Opsec #Malware
Welivesecurity
SnakeStealer: How it preys on personal data – and how to stay safe
Here’s what to know about the malware that tops infostealer charts in 2025 and has an insatiable appetite for valuable data.
UX Collective - Medium
A Hippocratic Oath for tech… with teeth
#systems_thinking #technology #design #ai #ux
source
A Hippocratic Oath for tech… with teeth
#systems_thinking #technology #design #ai #ux
source
Medium
A Hippocratic Oath for tech… with teeth
From Frankenstein’s dilemma to the Greek agora, history offers blueprints for building tech industry legitimacy.