Cryptosec Maps Dark Web SIM Swapping Economy

In the U.S. alone, SIM-swapping attacks resulted in $72 million worth of losses last year, four-million dollars more than 2021, according to the Federal Bureau of Investigation. In a 2022 public service announcement, the FBI defined SIM swapping as a “malicious technique where criminal actors target mobile carriers to...

Verified Crypto Account Listings Proliferate on the Dark Web

Verified crypto-exchange accounts have become a hot commodity on the dark web, with login credentials available for as little as $20, according to May data from threat intelligence firm Privacy Affairs. But the price for verified crypto accounts has been steadily rising, with some ‘logs,’ a darknet slang term...

A Deep Dive Into the ‘Rags to Riches’ Manual for Withdrawing...

Annualized data from blockchain forensics provider Chainalysis indicates that crypto-enabled crime has dropped precipitously through the first half of 2023, but cybercriminals are also continuously evolving new cash-out methods to cover their tracks. Chainalysis’s mid-year update found that crypto inflows to “known illicit entities” were down 65% compared to where...

How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...

This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical for node operators, smart contract developers, and end users. In many ways, Security Operations Center (SOC) analysts and node operators face similar blockchain-related security challenges. The...

How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...

This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security.  Check out the first two articles in the series exploring the differences for node operators and application developers. This article explores how user security differs between traditional IT and blockchain environments. ...

How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...

This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security.  Check out the first article in the series discussing the differences for node operators. This article focuses on the differences between application security (AppSec) for traditional applications and smart...

Potential $600M FTX Hack

FTX Hack
In the midst of the FTX meltdown, the once 2nd largest exchange appears to also be facing...

BNB Chain Halted After Suspected Hack, $536M Compromised

BNB Wallet Hack
BNB Chain has been halted after one of the biggest BNB holders started displaying erratic on-chain behavior,...

SWIFT Publishes a Study on Central Bank Digital Currency Network

SWIFT CBDC Network
The Society for Worldwide Interbank Financial Telecommunications (SWIFT), a messaging network that fosters functional communication amongst banks...

Transit Swap Hacker Returned 70% of the Money

Transit Swap Hack
A hacker that stole $23 million from the decentralized exchange (DEX) Transit Swap today returned $16M, or...

Hong Kong About to Start Trials of its Central Bank Digital Currency (CBDC)

Hong Kong CBDC
The Hong Kong Monetary Authority (HKMA) statd on Tuesday that it plans to start trials of its...

$3.3M Hack of Profanity’s Vanity Ethereum Addresses

Profanity Hack
Ethereum custom addresses created via the Profanity tool have been hacked. Almost $3.3 million stolen from several...

MAS Launches Financial Services Industry Transformation Map 2025

MAS
Mr Lawrence Wong, Deputy Prime Minister and Minster for Finance, and Monetary Authority of Singapore (MAS) Deputy...

Treasury will warn White House that crypto needs major regulations

US Treasury
The US Treasury is expected to release four reports this months in which it will outline various...

Australian Federal Police (AFP) Establishes a New Crypto AML Unit

AFP
The Australian Federal Police has set up a new cryptocurrency unit to target money laundering as more...

New UK Crypto Rules for Sanctions

UK Treasury
UK Treasury’s Office of Financial Sanctions Implementation updated its sanctions guidance on 30 August to explicitly include...

Marin Ivezic's Personal Blog

Marin Ivezic

For 30+ years I’ve been protecting financial services and critical infrastructure against financial crime, cyber, and regulatory risks. I previously held multiple interim CRO, CISO and technology leadership roles in Global 2000 companies. Since 2013 I have been advising institutions and regulators around the world on safe, secure and compliant adoption of crypto assets and other decentralized technologies.
[This is a personal blog with guest contributors. Any views or opinions are personal. See Terms.]

Free Blockchain and Crypto Security Course

Timeline of Major DeFi and Crypto Hacks

Article Series

My books (published and in process)