zkHive (@zkhive) 's Twitter Profile
zkHive

@zkhive

$ZKHIVE is the first decentralized Firewall for crypto platforms, powered by AI-assisted formal verification.

#zkHive TG: t.me/zkhive_token

ID: 1761006539530256384

linkhttp://zkhive.network calendar_today23-02-2024 12:34:19

211 Tweet

5,5K Followers

5 Following

zkHive (@zkhive) 's Twitter Profile Photo

A @Chainalysis report indicates that 2024 has seen over $2 billion in crypto hacks, with access control vulnerabilities accounting for a significant portion, including unauthorized admin access, reentrancy, and weak auth. $ZKHIVE enhance security by providing a layer of privacy

zkHive (@zkhive) 's Twitter Profile Photo

Breaking!🚨 SlowMist has discovered a new phishing scam targeting crypto users involving malware that decrypts data, steals credentials, and gives hackers full access to victims' crypto wallets through deceptive Zoom links. FYI Infosecurity Magazine reports phishing was the

zkHive (@zkhive) 's Twitter Profile Photo

.Kaspersky's 2024 Malicious Files Report reveals a 14% increase in daily malicious file detections, hitting an average of 467,000 per day, with a significant 33% rise in Trojan detections. Find the full report here: kaspersky.com/about/press-re… Meanwhile, crypto hacks in 2024,

zkHive (@zkhive) 's Twitter Profile Photo

Be aware from potential threats! Reported by The Hacker news unveils the top 5 malware threats to prepare for 2025, emphasizing the urgent need for robust defenses against evolving cyber threats. Phishing campaigns containing malicious links tops the list, with sophisticated

zkHive (@zkhive) 's Twitter Profile Photo

Pay attention AI Enhanced Phishing 📣 Over the past few weeks, there's been a significant uptick in AI-generated phishing emails. Hackers are now using advanced LLMs to craft highly personalized and convincing phishing attempts, making it harder for traditional filters to

zkHive (@zkhive) 's Twitter Profile Photo

Interesting… Even Google is inadvertently promoting phishing scams that lead to malware infections. x.com/ryanchenkie/st… As we previously reported, there is a significant rise in AI enhanced phishing attacks that leads to malwares draining crypto wallets.  For your digital

zkHive (@zkhive) 's Twitter Profile Photo

Attention macOS users! Hackers are targeting YOU with a 127% surge in password stealing malware, as exposed by ESET. These sneaky attacks disguise malware as legit software, stealing Keychain passwords, crypto wallet info, and more. link to the full report:

zkHive (@zkhive) 's Twitter Profile Photo

According to TechRadar , malicious PDFs are flooding SMS inboxes, aiming to steal your data. Attackers are using advanced techniques to hide malicious links within the files, exploiting the trust users place in the format to steal sensitive data. These files exploit

zkHive (@zkhive) 's Twitter Profile Photo

New research from Palo Alto Networks reveals three techniques to jailbreak #DeepSeek, turning it into a tool for malicious activities. Hackers can manipulate DeepSeek into producing scripts or code that could be used for malicious purposes, generating malicious files, SQL

zkHive (@zkhive) 's Twitter Profile Photo

A New Lazarus Group Campaign, dangerous cross-platform JavaScript stealer is targeting user data, including crypto wallets! It exploits web vulnerabilities to steal sensitive info directly from your browser. How the Attack Works - The attacker embeds malicious JavaScript code

zkHive (@zkhive) 's Twitter Profile Photo

The latest Proofpoint blog discusses emerging cybersecurity threats, revealing a new MacOS malware called FrigidStealer. This malware is delivered via web inject campaigns, triggered when a user clicks on seemingly legitimate software update prompts that inject malicious code.

zkHive (@zkhive) 's Twitter Profile Photo

Meet the new cyber threats, TA2726 and TA2727, who manipulate web content in web inject campaigns. It happens when users interact with altered website content, unknowingly triggering credential theft that could drain your crypto wallets. Always ensure website authenticity.

zkHive (@zkhive) 's Twitter Profile Photo

Hackers are impersonating #DeepSeek with fake sites like deepseekso[.]com, deceiving users into sharing data and downloading the Vidar stealer, which has already drained millions from crypto wallets via malicious JavaScript and Telegram C2. Protect your crypto with our

zkHive (@zkhive) 's Twitter Profile Photo

Be aware bees! Hackers are leveling up their game. Add a layer of protection with $ZKHIVE go ahead and try our cutting edge AI firewall now integrated to your chrome browser now! #zkhive chromewebstore.google.com/detail/zkhive/…

zkHive (@zkhive) 's Twitter Profile Photo

Hackers are using tap-to-pay attack vectors to hijack your wallets. Use #ZKHIVE bot and chrome extension to stop it from happening in REAL TIME zkhive.network