As part of the infamous Contagious Interview campaign, North Korean threat actors were seen abusing legitimate Microsoft ...
Blockchain-based utility token demonstrates end-to-end provenance, compliance readiness, and auditability for refined rare ...
North Korean hackers abuse Visual Studio Code task files in fake job projects to deploy backdoors, spyware, and crypto miners ...
DeadLock ransomware relies on Polygon smart contracts to spin proxy servers to produce a nearly unshuttable infrastructure.
A Miami proptech startup that modernizes property title verification with artificial intelligence and blockchain technology ...
Researchers at cybersecurity company Group-IB found that DeadLock, a ransomware family discovered in July 2025, is now using smart contracts, or self-executing programs, on the popular Polygon (POL) ...
The Boston-based bank is trimming both its workforce and its office space while simultaneously rolling out new technology ...
Group-IB researchers said the most unusual aspect of DeadLock lies in its use of Polygon smart contracts to manage ...
Cybersecurity firm Group-IB found the DeadLock ransomware is exploiting Polygon smart contracts to create a resilient ...
DeadLock, a ransomware group that first emerged in July 2025, has made news again, and this time it is for abusing Polygon ...
A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate ...