Abstract: Blockchain platforms have revolutionized decentralized computing, with smart contracts enabling trustless and autonomous applications. However, the diversity of blockchain ecosystems—such as ...
Cybersecurity researchers have uncovered a new technique that hackers are using to distribute malware by leveraging Ethereum smart contracts. The method, recently exposed by ReversingLabs, highlights ...
Bad actors have started using Ethereum smart contracts to deploy malicious software and code, and are therefore able to bypass traditional security scans using this novel technique. Researchers at ...
Hackers are using Ethereum smart contracts to hide malware in popular npm packages. Malicious npm packages like “colortoolsv2” and “mimelib2” conceal C2 instructions through Ethereum smart contracts.
Kathleen Kinder brings over 11 years of experience in the research industry, with deep expertise in finance, cryptocurrency, and insurance. ... See full bio Hackers have found a new way to deliver ...
Cybersecurity researchers have identified two malicious packages posted to the npm registry in July 2025. These packages used Ethereum blockchain smart contracts to carry out hidden attacks on ...
A malicious campaign targeting developers through npm and GitHub repositories has been uncovered, featuring an unusual method of using Ethereum smart contracts to conceal command-and-control (C2) ...
Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum blockchain to carry out malicious actions on compromised ...
The information provided on Inside Bitcoins is for educational and informational purposes only and should not be considered financial, investment, or trading advice. Cryptocurrency markets are highly ...
Rich Widmann, Google Cloud's head of Web3 strategy, confirmed that the Universal Ledger is a layer-1 blockchain. The system uses Python for smart contracts, diverging from industry standards like ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results