{"id":1759534,"date":"2018-01-23T02:58:29","date_gmt":"2018-01-23T07:58:29","guid":{"rendered":"https:\/\/securityboulevard.com?page_id=1759534&#038;preview_id=1759534"},"modified":"2018-05-05T01:03:17","modified_gmt":"2018-05-05T05:03:17","slug":"blockchain-digital-currency-bitcoin","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/","title":{"rendered":"Blockchain &#038; Digital Currencies"},"content":{"rendered":"<div id=\"pl-1759534\"  class=\"panel-layout\" ><div id=\"pg-1759534-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1759534-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1759534-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1759534-0-0-0\" >\t\t\t<div class=\"textwidget\"><p>Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it&#8217;s impact on the Cybersecurity Community.<\/p>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1759534-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"9d281d7783\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2035664\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/schneider-electric-hellcat-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/baguettes-richixbw-sergio-arze-nFOGUoiMXqc-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Baguettes\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/baguettes-richixbw-sergio-arze-nFOGUoiMXqc-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/baguettes-richixbw-sergio-arze-nFOGUoiMXqc-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/baguettes-richixbw-sergio-arze-nFOGUoiMXqc-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/schneider-electric-hellcat-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Schneider Electric Confirms Ransom Hack \u2014 Hellcat Demands French Bread as \u2018Joke\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-06T12:29:24-05:00\">4 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2034021\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/ibm-addresses-ai-quantum-security-risks-with-new-platform\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/12\/Hackers-Sandbox-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"IBM quantum generative AI security, management, organizations, GDPR, Strike Force privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/ibm-addresses-ai-quantum-security-risks-with-new-platform\/\" class=\"_self cvplbd\" target=\"_self\" >IBM Addresses AI, Quantum Security Risks with New Platform<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-23T08:43:20-04:00\">1 month ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2033639\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/world-economic-forum-ai-quantum-require-paradigm-shift-in-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"765\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/04\/AIOps-765x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"AI emerging technology secure by design cybersecurity\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/world-economic-forum-ai-quantum-require-paradigm-shift-in-security\/\" class=\"_self cvplbd\" target=\"_self\" >World Economic Forum: AI, Quantum Require \u2018Paradigm Shift\u2019 in Security<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-17T16:19:34-04:00\">2 months ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#9d281d7783\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#9d281d7783\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-5c649bax6g\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1759534-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037369\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-evolution-of-hashing-algorithms-from-md5-to-modern-day\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"The Evolution of Hashing Algorithms: From MD5 to Modern Day\" title=\"\" data-cvpsrc=\"https:\/\/images.unsplash.com\/photo-1655720028125-d5979d4bf62f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDU3fHxoYXNoaW5nJTIwYWxnb3JpdGhtfGVufDB8fHx8MTczMTkwODc5NXww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-evolution-of-hashing-algorithms-from-md5-to-modern-day\/\" class=\"_self cvplbd\" target=\"_self\" >The Evolution of Hashing Algorithms: From MD5 to Modern Day<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/deepak-gupta-tech-entrepreneur-cybersecurity-aut\/\" rel=\"author\">Deepak Gupta - Tech Entrepreneur, Cybersecurity Author<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T10:58:19-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/algorithm\/' title='algorithm' class='pt-cv-tax-algorithm'>algorithm<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crypto\/' title='Crypto' class='pt-cv-tax-crypto'>Crypto<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-security\/' title='Cyber Security' class='pt-cv-tax-cyber-security'>Cyber Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-protection\/' title='data protection' class='pt-cv-tax-data-protection'>data protection<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/encryption\/' title='encryption' class='pt-cv-tax-encryption'>encryption<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hashing\/' title='hashing' class='pt-cv-tax-hashing'>hashing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Hashing algorithms have come a long way! This blog post takes you on a journey through the evolution of hashing, from early examples like MD5 to the modern SHA family and beyond ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher&feed_id=978&blog_url=https:\/\/guptadeepak.com\/\">Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035664\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/schneider-electric-hellcat-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Baguettes\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/baguettes-richixbw-sergio-arze-nFOGUoiMXqc-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/schneider-electric-hellcat-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Schneider Electric Confirms Ransom Hack \u2014 Hellcat Demands French Bread as \u2018Joke\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-06T12:29:24-05:00\">November 6, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/baguette\/' title='Baguette' class='pt-cv-tax-baguette'>Baguette<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/bgtt\/' title='BGTT' class='pt-cv-tax-bgtt'>BGTT<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crypto\/' title='Crypto' class='pt-cv-tax-crypto'>Crypto<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crypto-crime\/' title='crypto crime' class='pt-cv-tax-crypto-crime'>crypto crime<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crypto-currency\/' title='crypto currency' class='pt-cv-tax-crypto-currency'>crypto currency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocoin\/' title='cryptocoin' class='pt-cv-tax-cryptocoin'>cryptocoin<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocrurrency\/' title='Cryptocrurrency' class='pt-cv-tax-cryptocrurrency'>Cryptocrurrency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrencies\/' title='cryptocurrencies' class='pt-cv-tax-cryptocurrencies'>cryptocurrencies<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrency\/' title='cryptocurrency' class='pt-cv-tax-cryptocurrency'>cryptocurrency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrency-humor\/' title='Cryptocurrency Humor' class='pt-cv-tax-cryptocurrency-humor'>Cryptocurrency Humor<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/grep\/' title='grep' class='pt-cv-tax-grep'>grep<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/greppy\/' title='greppy' class='pt-cv-tax-greppy'>greppy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hellcat\/' title='Hellcat' class='pt-cv-tax-hellcat'>Hellcat<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ica\/' title='ICA' class='pt-cv-tax-ica'>ICA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/international-contract-agency\/' title='International Contract Agency' class='pt-cv-tax-international-contract-agency'>International Contract Agency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">That\u2019s a lot of pain: $125,000 ransom seems small\u2014but why do the scrotes want it paid in baguettes? ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034486\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/jpmorgan-chase-bank-glitch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"An unfortunate TikToker shows off his negative balance\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/10\/jpmorgan-chase-glitch-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/jpmorgan-chase-bank-glitch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >TikTok \u2018Infinite Money Glitch\u2019 \u2014 Idiots Chased by JPMorgan<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-29T12:11:23-04:00\">October 29, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/chase-bank\/' title='Chase Bank' class='pt-cv-tax-chase-bank'>Chase Bank<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/disinformation\/' title='disinformation' class='pt-cv-tax-disinformation'>disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/how-to-be-safe-on-social-media\/' title='how to be safe on social media' class='pt-cv-tax-how-to-be-safe-on-social-media'>how to be safe on social media<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/j-p-morgan-chase\/' title='J.P. Morgan Chase' class='pt-cv-tax-j-p-morgan-chase'>J.P. Morgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/jp-morgan-chase\/' title='JP Morgan Chase' class='pt-cv-tax-jp-morgan-chase'>JP Morgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/jpmorgan-chase\/' title='JPMorgan Chase' class='pt-cv-tax-jpmorgan-chase'>JPMorgan Chase<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/misinformation\/' title='Misinformation' class='pt-cv-tax-misinformation'>Misinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-disinformation\/' title='online disinformation' class='pt-cv-tax-online-disinformation'>online disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/social-disinformation\/' title='Social disinformation' class='pt-cv-tax-social-disinformation'>Social disinformation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/social-media\/' title='social media' class='pt-cv-tax-social-media'>social media<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/socialmedia\/' title='socialmedia' class='pt-cv-tax-socialmedia'>socialmedia<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-glitches\/' title='software glitches' class='pt-cv-tax-software-glitches'>software glitches<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/tiktok\/' title='TikTok' class='pt-cv-tax-tiktok'>TikTok<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/x\/' title='X' class='pt-cv-tax-x'>X<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Dimon\u2019s dollars (not yours): No, Chase Bank isn\u2019t going to let you cash bad checks. It\u2019s fraud\u2014no matter what X and TikTok tell you ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034021\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/ibm-addresses-ai-quantum-security-risks-with-new-platform\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"IBM quantum generative AI security, management, organizations, GDPR, Strike Force privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/12\/Hackers-Sandbox-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/ibm-addresses-ai-quantum-security-risks-with-new-platform\/\" class=\"_self cvplbd\" target=\"_self\" >IBM Addresses AI, Quantum Security Risks with New Platform<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-23T08:43:20-04:00\">October 23, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity-risks-of-generative-ai\/' title='cybersecurity risks of generative ai' class='pt-cv-tax-cybersecurity-risks-of-generative-ai'>cybersecurity risks of generative ai<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ibm-cybersecurity\/' title='IBM Cybersecurity' class='pt-cv-tax-ibm-cybersecurity'>IBM Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/quantum-cryptography\/' title='quantum cryptography' class='pt-cv-tax-quantum-cryptography'>quantum cryptography<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">IBM is rolling out Guardian Data Security Center, a framework designed to give enterprises the tools they need to address the emerging cyberthreats that come the ongoing development of generative AI and ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2033639\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/world-economic-forum-ai-quantum-require-paradigm-shift-in-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"AI emerging technology secure by design cybersecurity\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/04\/AIOps-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/world-economic-forum-ai-quantum-require-paradigm-shift-in-security\/\" class=\"_self cvplbd\" target=\"_self\" >World Economic Forum: AI, Quantum Require \u2018Paradigm Shift\u2019 in Security<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-17T16:19:34-04:00\">October 17, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ai\/' title='AI' class='pt-cv-tax-ai'>AI<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hybrid-and-emerging-technologies\/' title='Hybrid and Emerging Technologies' class='pt-cv-tax-hybrid-and-emerging-technologies'>Hybrid and Emerging Technologies<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/quantum-computers\/' title='Quantum Computers' class='pt-cv-tax-quantum-computers'>Quantum Computers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/secure-by-design\/' title='secure by design' class='pt-cv-tax-secure-by-design'>secure by design<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/world-economic-forum\/' title='World Economic Forum' class='pt-cv-tax-world-economic-forum'>World Economic Forum<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The World Economic Forum is advocating a shift in security thinking from secure by design to resilience by design in the face of the rapid development and expanding connectivity of emerging technologies ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2033301\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/doj-created-nexfundai-crypto-firm-in-crypto-scamming-sting\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"DOJ cryptocurrency scams\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/07\/Breach-Disclosure-Laws-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/doj-created-nexfundai-crypto-firm-in-crypto-scamming-sting\/\" class=\"_self cvplbd\" target=\"_self\" >DOJ Created NexFundAI Crypto Firm in Crypto Scamming Sting<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-14T11:48:27-04:00\">October 14, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrency-fraud\/' title='cryptocurrency fraud' class='pt-cv-tax-cryptocurrency-fraud'>cryptocurrency fraud<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/department-of-justice-doj\/' title='Department of Justice (DOJ)' class='pt-cv-tax-department-of-justice-doj'>Department of Justice (DOJ)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/money-laundering\/' title='money laundering' class='pt-cv-tax-money-laundering'>money laundering<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The DOJ created NexFundAI, a false cryptocurrency company and token, in a sting that nabbed 19 people and companies accused of scamming investors by falsely creating the illusion of activity around their ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2033274\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/perfectl-malware\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/perfectl-malware\/\" class=\"_self cvplbd\" target=\"_self\" >Perfectl Malware<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/bruce-schneier\/\" rel=\"author\">Bruce Schneier<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-14T07:06:27-04:00\">October 14, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/attribution\/' title='attribution' class='pt-cv-tax-attribution'>attribution<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrency\/' title='cryptocurrency' class='pt-cv-tax-cryptocurrency'>cryptocurrency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hacking\/' title='Hacking' class='pt-cv-tax-hacking'>Hacking<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/linux\/' title='Linux' class='pt-cv-tax-linux'>Linux<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/malware\/' title='Malware' class='pt-cv-tax-malware'>Malware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/uncategorized\/' title='Uncategorized' class='pt-cv-tax-uncategorized'>Uncategorized<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Schneier on Security&feed_id=485&blog_url=https:\/\/www.schneier.com\">Schneier on Security<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2032653\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/doj-wants-to-claw-back-2-67-million-stolen-by-lazarus-group\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"cryptocurrency ransomware DOJ seize Lazarus\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Trust-Cryptocurrency-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/doj-wants-to-claw-back-2-67-million-stolen-by-lazarus-group\/\" class=\"_self cvplbd\" target=\"_self\" >DOJ Wants to Claw Back $2.67 Million Stolen by Lazarus Group<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-07T13:43:49-04:00\">October 7, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrency-asset-theft\/' title='cryptocurrency asset theft' class='pt-cv-tax-cryptocurrency-asset-theft'>cryptocurrency asset theft<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/department-of-justice-doj\/' title='Department of Justice (DOJ)' class='pt-cv-tax-department-of-justice-doj'>Department of Justice (DOJ)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/lazarus-group\/' title='Lazarus Group' class='pt-cv-tax-lazarus-group'>Lazarus Group<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/north-korean-hacking\/' title='North Korean Hacking' class='pt-cv-tax-north-korean-hacking'>North Korean Hacking<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The DOJ wants to seize $2.67 million from the $69 million in crypto the North Korean-backed Lazarus Group stole in from the options exchange Deribit in 2022 and online gambling platform Stake.com ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2032481\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/emulating-the-surging-hadooken-malware\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/emulating-the-surging-hadooken-malware\/\" class=\"_self cvplbd\" target=\"_self\" >Emulating the Surging Hadooken Malware<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/ian-rogers\/\" rel=\"author\">Ian Rogers<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-03T15:16:18-04:00\">October 3, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/adversary-emulation\/' title='adversary emulation' class='pt-cv-tax-adversary-emulation'>adversary emulation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/broad-based-attacks\/' title='Broad-Based Attacks' class='pt-cv-tax-broad-based-attacks'>Broad-Based Attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptomining\/' title='cryptomining' class='pt-cv-tax-cryptomining'>cryptomining<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hadooken\/' title='Hadooken' class='pt-cv-tax-hadooken'>Hadooken<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/linux\/' title='Linux' class='pt-cv-tax-linux'>Linux<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/malware\/' title='Malware' class='pt-cv-tax-malware'>Malware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/oracle\/' title='Oracle' class='pt-cv-tax-oracle'>Oracle<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/remote-code-execution-rce\/' title='Remote Code Execution (RCE)' class='pt-cv-tax-remote-code-execution-rce'>Remote Code Execution (RCE)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/weblogic-servers\/' title='Weblogic Servers' class='pt-cv-tax-weblogic-servers'>Weblogic Servers<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=AttackIQ&feed_id=1032&blog_url=https:\/\/www.attackiq.com\/\">AttackIQ<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2029968\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/09\/shocking-sql-injection-in-tsa-app-bitcoin-atm-scams-targeting-seniors\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container cvp-block\" target=\"_self\" ><span class=\"cvp-play\"><\/span><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"cvp-videothumb skip-lazy  cvplazy\" alt=\"Shocking SQL Injection in TSA App &amp; Bitcoin ATM Scams Targeting Seniors\" data-cvpsrc=\"https:\/\/i.ytimg.com\/vi\/sL1sfY3ATXM\/hqdefault.jpg\" \/><iframe title=\"Shocking SQL Injection in TSA App &amp; Bitcoin ATM Scams Targeting Seniors\" width=\"290\" height=\"163\" data-skip-lazy data-no-lazy class=\"cvp-videothumb\" data-cvpsrc=\"https:\/\/www.youtube.com\/embed\/sL1sfY3ATXM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/09\/shocking-sql-injection-in-tsa-app-bitcoin-atm-scams-targeting-seniors\/\" class=\"_self cvplbd\" target=\"_self\" >Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/tom-eston\/\" rel=\"author\">Tom Eston<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-09-09T00:00:48-04:00\">September 9, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/atm\/' title='atm' class='pt-cv-tax-atm'>atm<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/bitcoin\/' title='Bitcoin' class='pt-cv-tax-bitcoin'>Bitcoin<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/bitcoin-atm\/' title='Bitcoin ATM' class='pt-cv-tax-bitcoin-atm'>Bitcoin ATM<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/bug-bounty\/' title='bug bounty' class='pt-cv-tax-bug-bounty'>bug bounty<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-security\/' title='Cyber Security' class='pt-cv-tax-cyber-security'>Cyber Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-privacy\/' title='Data Privacy' class='pt-cv-tax-data-privacy'>Data Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/digital-privacy\/' title='Digital Privacy' class='pt-cv-tax-digital-privacy'>Digital Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/elderly\/' title='Elderly' class='pt-cv-tax-elderly'>Elderly<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/episodes\/' title='Episodes' class='pt-cv-tax-episodes'>Episodes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/exploit\/' title='Exploit' class='pt-cv-tax-exploit'>Exploit<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hacking\/' title='Hacking' class='pt-cv-tax-hacking'>Hacking<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/information-security\/' title='Information Security' class='pt-cv-tax-information-security'>Information Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/infosec\/' title='Infosec' class='pt-cv-tax-infosec'>Infosec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/podcast\/' title='Podcast' class='pt-cv-tax-podcast'>Podcast<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/podcasts\/' title='Podcasts' class='pt-cv-tax-podcasts'>Podcasts<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/privacy\/' title='Privacy' class='pt-cv-tax-privacy'>Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/scam\/' title='scam' class='pt-cv-tax-scam'>scam<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/scams\/' title='Scams' class='pt-cv-tax-scams'>Scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security\/' title='security' class='pt-cv-tax-security'>security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-research\/' title='Security Research' class='pt-cv-tax-security-research'>Security Research<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-researcher\/' title='Security Researcher' class='pt-cv-tax-security-researcher'>Security Researcher<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/senior-citizens\/' title='Senior Citizens' class='pt-cv-tax-senior-citizens'>Senior Citizens<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/seniors\/' title='Seniors' class='pt-cv-tax-seniors'>Seniors<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sql-injection\/' title='sql injection' class='pt-cv-tax-sql-injection'>sql injection<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sqli\/' title='sqli' class='pt-cv-tax-sqli'>sqli<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/technology\/' title='technology' class='pt-cv-tax-technology'>technology<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/tsa\/' title='tsa' class='pt-cv-tax-tsa'>tsa<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/vulnerability\/' title='vulnerability' class='pt-cv-tax-vulnerability'>vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/weekly-edition\/' title='Weekly Edition' class='pt-cv-tax-weekly-edition'>Weekly Edition<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Shared Security Podcast&feed_id=546&blog_url=https:\/\/sharedsecurity.net\/\">Shared Security Podcast<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1759534\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"46\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"ccfca8cde774e55bb7e4de5f6ce02502\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-a9ca7bbk4s\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it&#8217;s impact on the Cybersecurity Community.<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1759534","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Blockchain &amp; Digital Currencies - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it&#039;s Impact on the Cybersecurity Community.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain &amp; Digital Currencies\" \/>\n<meta property=\"og:description\" content=\"Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it&#8217;s impact on the Cybersecurity Community.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-05T05:03:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/\",\"url\":\"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/\",\"name\":\"Blockchain & Digital Currencies - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2018-01-23T07:58:29+00:00\",\"dateModified\":\"2018-05-05T05:03:17+00:00\",\"description\":\"Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it's Impact on the Cybersecurity Community.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockchain &#038; Digital Currencies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Blockchain & Digital Currencies - Security Boulevard","description":"Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it's Impact on the Cybersecurity Community.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/","og_locale":"en_US","og_type":"article","og_title":"Blockchain & Digital Currencies","og_description":"Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it&#8217;s impact on the Cybersecurity Community.","og_url":"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-05-05T05:03:17+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/","url":"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/","name":"Blockchain & Digital Currencies - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2018-01-23T07:58:29+00:00","dateModified":"2018-05-05T05:03:17+00:00","description":"Latest updates on blockchain, the technology that underpins bitcoin and most digital currencies and it's Impact on the Cybersecurity Community.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/blockchain-digital-currency-bitcoin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Blockchain &#038; Digital Currencies"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-7nJA","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1759534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1759534"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1759534\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1759534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}