crypto.security Open in urlscan Pro
2606:4700:3108::ac42:2b81  Public Scan

Submitted URL: https://cryptosecurity.kinsta.cloud/
Effective URL: https://crypto.security/
Submission: On December 17 via automatic, source certstream-suspicious — Scanned from US

Form analysis 4 forms found in the DOM

GET https://crypto.security/

<form method="get" class="td-search-form" action="https://crypto.security/">
  <!-- close button -->
  <div class="td-search-close">
    <span><i class="td-icon-close-mobile"></i></span>
  </div>
  <div role="search" class="td-search-input">
    <span>Search</span>
    <input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
  </div>
</form>

POST #

<form id="loginForm" action="#" method="post">
  <div class="td-login-inputs"><input class="td-login-input" autocomplete="username" type="text" name="login_email" id="login_email" value="" required=""><label for="login_email">your username</label></div>
  <div class="td-login-inputs"><input class="td-login-input" autocomplete="current-password" type="password" name="login_pass" id="login_pass" value="" required=""><label for="login_pass">your password</label></div>
  <input type="button" name="login_button" id="login_button" class="wpb_button btn td-login-button" value="Login">
</form>

POST #

<form id="forgotpassForm" action="#" method="post">
  <div class="td-login-inputs"><input class="td-login-input" type="text" name="forgot_email" id="forgot_email" value="" required=""><label for="forgot_email">your email</label></div>
  <input type="button" name="forgot_button" id="forgot_button" class="wpb_button btn td-login-button" value="Send My Password">
</form>

GET https://crypto.security/

<form method="get" class="td-search-form" action="https://crypto.security/">
  <div role="search" class="td-head-form-search-wrap">
    <input id="td-header-search" type="text" value="" name="s" autocomplete="off"><input class="wpb_button wpb_btn-inverse btn" type="submit" id="td-header-search-top" value="Search">
  </div>
</form>

Text Content

GitHub Linkedin Mail RSS Skype Telegram Twitter WhatsApp WordPress Xing

 * Home
 * Industry News
 * My Articles
   * All My Articles
   * Article Series: Differences Between Blockchain Security and Traditional
     Cybersecurity
   * Article Series: Security Threats to Blockchain Networks – Cyber Attacks
     Taxonomy
   * Article Series: 12 Largest DeFi / Crypto Hacks
 * My Books
   * Blockchain and Crypto Security
   * Blockchain and Crypto Security Course
   * The Future of Leadership in the Age of AI
   * Securing Society 5.0
 * Resources
   * Timeline of Major DeFi and Crypto Hacks and Exploits
   * Cryptocurrencies and Converters
   * Crypto Exchanges
 * About
   * About Me
   * Industry Qualifications
   * Contact


Search

Sunday, December 15, 2024
GitHub Linkedin Mail RSS Skype Telegram Twitter WhatsApp WordPress Xing
Sign in
Welcome! Log into your account

your username
your password
Forgot your password? Get help
Password recovery
Recover your password

your email
A password will be e-mailed to you.


MARIN IVEZIC – CRYPTO & BLOCKCHAIN SECURITY, CRYPTO COMPLIANCE, FINANCIAL CRIME

 * Home
 * Industry News
 * My Articles
   * All My Articles
   * Article Series: Differences Between Blockchain Security and Traditional
     Cybersecurity
   * Article Series: Security Threats to Blockchain Networks – Cyber Attacks
     Taxonomy
   * Article Series: 12 Largest DeFi / Crypto Hacks
 * My Books
   * Blockchain and Crypto Security
   * Blockchain and Crypto Security Course
   * The Future of Leadership in the Age of AI
   * Securing Society 5.0
 * Resources
   * Timeline of Major DeFi and Crypto Hacks and Exploits
   * Cryptocurrencies and Converters
   * Crypto Exchanges
 * About
   * About Me
   * Industry Qualifications
   * Contact


Most popular articles this week:


BLOCKCHAIN AND CRYPTO SECURITY TRAINING – FREE


HOW BLOCKCHAIN SECURITY DIFFERS FROM TRADITIONAL CYBERSECURITY – 1 – NODE
OPERATORS


INTRODUCTION TO BLOCKCHAIN LAYERS 0, 1, AND 2 SECURITY


SECURITY THREATS TO BLOCKCHAIN NETWORKS – 1 – CYBER ATTACKS TAXONOMY


WHY DEVSECOPS IS ESSENTIAL FOR THE BLOCKCHAIN ECOSYSTEM




BLOCKCHAIN AND CRYPTO SECURITY TRAINING – FREE

July 27, 2022


HOW BLOCKCHAIN SECURITY DIFFERS FROM TRADITIONAL CYBERSECURITY – 1 – NODE
OPERATORS

November 2, 2022


INTRODUCTION TO BLOCKCHAIN LAYERS 0, 1, AND 2 SECURITY

September 8, 2022


SECURITY THREATS TO BLOCKCHAIN NETWORKS – 1 – CYBER ATTACKS TAXONOMY

May 18, 2022


WHY DEVSECOPS IS ESSENTIAL FOR THE BLOCKCHAIN ECOSYSTEM

August 3, 2022


SECURITY THREATS TO BLOCKCHAIN NETWORKS – 2 – A HOLISTIC OVERVIEW

June 3, 2022


THE TOP 4 SUPPLY CHAIN SECURITY RISKS OF BLOCKCHAIN SMART CONTRACTS

October 1, 2022


THE 12 BIGGEST HACKING INCIDENTS IN THE HISTORY OF CRYPTO

November 1, 2022


MY ARTICLES

 * All
 * AI
 * Crypto & Blockchain Security
 * Crypto Compliance
 * Crypto Financial Crime
 * Crypto Investigation
 * FinTech & DeFi
 * Management
 * Society 5.0

More

Crypto Investigation


CRYPTOSEC MAPS DARK WEB SIM SWAPPING ECONOMY

Marin Ivezic - December 5, 2023
In the U.S. alone, SIM-swapping attacks resulted in $72 million worth of losses
last year, four-million dollars more than 2021, according to the Federal Bureau
of Investigation. In a 2022 public service announcement, the FBI defined SIM
swapping as a “malicious technique where criminal actors target mobile carriers
to...

Crypto Investigation


VERIFIED CRYPTO ACCOUNT LISTINGS PROLIFERATE ON THE DARK WEB

Marin Ivezic - November 5, 2023
Verified crypto-exchange accounts have become a hot commodity on the dark web,
with login credentials available for as little as $20, according to May data
from threat intelligence firm Privacy Affairs. But the price for verified crypto
accounts has been steadily rising, with some ‘logs,’ a darknet slang term...

Crypto Investigation


A DEEP DIVE INTO THE ‘RAGS TO RICHES’ MANUAL FOR WITHDRAWING...

Marin Ivezic - October 5, 2023
Annualized data from blockchain forensics provider Chainalysis indicates that
crypto-enabled crime has dropped precipitously through the first half of 2023,
but cybercriminals are also continuously evolving new cash-out methods to cover
their tracks. Chainalysis’s mid-year update found that crypto inflows to “known
illicit entities” were down 65% compared to where...

Crypto & Blockchain Security


HOW BLOCKCHAIN SECURITY DIFFERS FROM TRADITIONAL CYBERSECURITY – 4 – SECURITY...

Marin Ivezic - December 11, 2022
This article concludes our four-part series on the basic differences between
traditional IT security and blockchain security. Previous articles discussed the
security differences critical for node operators, smart contract developers, and
end users. In many ways, Security Operations Center (SOC) analysts and node
operators face similar blockchain-related security challenges. The...

Crypto & Blockchain Security


HOW BLOCKCHAIN SECURITY DIFFERS FROM TRADITIONAL CYBERSECURITY – 3 – USER...

Marin Ivezic - November 15, 2022
This article is the third in a four-part series exploring the differences
between traditional IT security and blockchain security.  Check out the first
two articles in the series exploring the differences for node operators and
application developers. This article explores how user security differs between
traditional IT and blockchain environments. ...

Crypto & Blockchain Security


HOW BLOCKCHAIN SECURITY DIFFERS FROM TRADITIONAL CYBERSECURITY – 2 – SMART...

Marin Ivezic - November 15, 2022
This article is the second in a four-part series discussing the differences
between traditional IT security / cybersecurity and blockchain security.  Check
out the first article in the series discussing the differences for node
operators. This article focuses on the differences between application security
(AppSec) for traditional applications and smart...


INDUSTRY NEWS


POTENTIAL $600M FTX HACK

November 12, 2022
In the midst of the FTX meltdown, the once 2nd largest exchange appears to also
be facing...
Read more


BNB CHAIN HALTED AFTER SUSPECTED HACK, $536M COMPROMISED

October 6, 2022
BNB Chain has been halted after one of the biggest BNB holders started
displaying erratic on-chain behavior,...
Read more


SWIFT PUBLISHES A STUDY ON CENTRAL BANK DIGITAL CURRENCY NETWORK

October 5, 2022
The Society for Worldwide Interbank Financial Telecommunications (SWIFT), a
messaging network that fosters functional communication amongst banks...
Read more


TRANSIT SWAP HACKER RETURNED 70% OF THE MONEY

October 2, 2022
A hacker that stole $23 million from the decentralized exchange (DEX) Transit
Swap today returned $16M, or...
Read more


HONG KONG ABOUT TO START TRIALS OF ITS CENTRAL BANK DIGITAL CURRENCY (CBDC)

September 20, 2022
The Hong Kong Monetary Authority (HKMA) statd on Tuesday that it plans to start
trials of its...
Read more


$3.3M HACK OF PROFANITY’S VANITY ETHEREUM ADDRESSES

September 16, 2022
Ethereum custom addresses created via the Profanity tool have been hacked.
Almost $3.3 million stolen from several...
Read more


MAS LAUNCHES FINANCIAL SERVICES INDUSTRY TRANSFORMATION MAP 2025

September 15, 2022
Mr Lawrence Wong, Deputy Prime Minister and Minster for Finance, and Monetary
Authority of Singapore (MAS) Deputy...
Read more


TREASURY WILL WARN WHITE HOUSE THAT CRYPTO NEEDS MAJOR REGULATIONS

September 8, 2022
The US Treasury is expected to release four reports this months in which it will
outline various...
Read more


AUSTRALIAN FEDERAL POLICE (AFP) ESTABLISHES A NEW CRYPTO AML UNIT

September 6, 2022
The Australian Federal Police has set up a new cryptocurrency unit to target
money laundering as more...
Read more


NEW UK CRYPTO RULES FOR SANCTIONS

September 5, 2022
UK Treasury’s Office of Financial Sanctions Implementation updated its sanctions
guidance on 30 August to explicitly include...
Read more


MARIN IVEZIC'S PERSONAL BLOG

For 30+ years I’ve been protecting financial services and critical
infrastructure against financial crime, cyber, and regulatory risks. I
previously held multiple interim CRO, CISO and technology leadership roles in
Global 2000 companies. Since 2013 I have been advising institutions and
regulators around the world on safe, secure and compliant adoption of crypto
assets and other decentralized technologies.

[This is a personal blog with guest contributors. Any views or opinions are
personal. See Terms.]


FREE BLOCKCHAIN AND CRYPTO SECURITY COURSE



TIMELINE OF MAJOR DEFI AND CRYPTO HACKS




TIMELINE OF MAJOR DEFI AND CRYPTO HACKS AND EXPLOITS

 

ARTICLE SERIES




ARTICLE SERIES: FOUR-PART SERIES EXPLORING HOW BLOCKCHAIN SECURITY DIFFERS FROM
“TRADITIONAL” CYBERSECURITY

 


ARTICLE SERIES: SIX-PART SERIES ON TAXONOMY OF SECURITY THREATS TO BLOCKCHAIN
NETWORKS

 


ARTICLE SERIES: 12 LARGEST CRYPTO HACKS

 

 

MY BOOKS (PUBLISHED AND IN PROCESS)



ABOUT US
Crypto.Security is Marin Ivezic's personal blog exploring topics related to
cybersecurity and financial crime with particular focus on cryptocurrencies,
blockchain, Web3, DeFi, DAO, smart contracts. Follow me also on Mastodon
Contact us: marin@crypto.security
FOLLOW US
GitHub Linkedin Mail RSS Skype Telegram Twitter WhatsApp WordPress Xing
 * Privacy Policy
 * Terms of Use

© Marin Ivezic All rights reserved

Bitcoin (BTC) $ 106,329.49 4.96%

Ethereum (ETH) $ 4,007.04 3.82%

XRP (XRP) $ 2.48 3.41%

Tether (USDT) $ 1.01 0.56%

Solana (SOL) $ 227.08 3.50%

BNB (BNB) $ 728.43 2.23%

Dogecoin (DOGE) $ 0.411923 4.00%

USDC (USDC) $ 1.01 0.78%

Cardano (ADA) $ 1.11 5.63%

Lido Staked Ether (STETH) $ 4,000.92 3.76%