ICO reprimands the Electoral Commission after cyber attack compromises servers
We have issued a reprimand to the Electoral Commission after hackers gained access to servers that contained the personal information of approximately 40 million people.
Read More »Organisations must do more to combat the growing threat of cyber attacks
We are calling for all organisations to boost their cyber security and protect the personal information they hold, amid the growing threat of cyber attacks. Our own trend data reveals…
Read More »Statement in response to reports of a cyber breach at the Ministry of Defence
Our spokesperson said: “The Ministry of Defence has made us aware of this incident and we are assessing the information provided”. Q&A from the Information Commissioner’s Office What is the…
Read More »Avely Finance launches $20,000 bug bounty for liquid staking
Avely Finance has launched a bug bounty programme ahead of the mainnet launch of its liquid staking protocol for the Zilliqa network. The platform offers a liquid staking protocol built…
Read More »Secured #2: Public Vulnerability Disclosures
Today, we disclosed the first set of vulnerabilities from the Ethereum Foundation’s Bug Bounty Programs. These vulnerabilities were previously discovered and reported directly to the Ethereum Foundation or client teams…
Read More »Security Alert – Geth suffers from a very low probable DoS attack vector – Update immediately
Affected configurations: All Go client versions Likelihood: Very low Severity: High Details: A bug in Geth (and potentially other clients) may suffer from a DoS attack and allows remote attackers to stall synchronisation process almost…
Read More »Hive: How we strived for a clean fork
The DAO soft-fork attempt was difficult. Not only did it turn out that we underestimated the side effects on the consensus protocol (i.e. DoS vulnerability), but we also managed to…
Read More »Security Alert – Mist can be vulnerable when navigating to malicious DApps
Mist leaks some low level APIs, which Dapps could use to gain access to the computer’s file system and read/delete files. This would only affect you if you navigate to…
Read More »Secured no. 1
Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and…
Read More »Secured #2: Public Vulnerability Disclosures
Today, we disclosed the first set of vulnerabilities from the Ethereum Foundation’s Bug Bounty Programs. These vulnerabilities were previously discovered and reported directly to the Ethereum Foundation or client teams…
Read More »