Cryptocurrency launchpad hit by $3 million supply chain attack

SushiSwap’s MISO launchpad hacked via a malicious GitHub commit.

Cryptocurrency launchpad hit by $3 million supply chain attack

Enlarge (credit: Austin Distel)

SushiSwap's chief technology officer says the company's MISO platform has been hit by a software supply chain attack. SushiSwap is a community-driven decentralized finance (DeFi) platform that lets users swap, earn, lend, borrow, and leverage cryptocurrency assets all from one place. Launched earlier this year, Sushi's newest offering, Minimal Initial SushiSwap Offering (MISO), is a token launchpad that lets projects launch their own tokens on the Sushi network.

Unlike cryptocurrency coins that need a native blockchain and substantive groundwork, DeFi tokens are an easier alternative to implement, as they can function on an existing blockchain. For example, anybody can create their own "digital tokens" on top of the Ethereum blockchain without having to recreate a new cryptocurrency altogether.

Attacker steals $3 million in Ethereum via one GitHub commit

In a Twitter thread today, SushiSwap CTO Joseph Delong announced that an auction on MISO launchpad had been hijacked via a supply chain attack. An "anonymous contractor" with the GitHub handle AristoK3 and access to the project's code repository had pushed a malicious code commit that was distributed on the platform's front-end.

Read 14 remaining paragraphs | Comments

Dell XPS 15 9510 review: Come for the screen, stay for everything else

Limited ports and a midrange GPU don’t detract much from an excellent laptop.

Most people buying a laptop these days will get by just fine with a 13- or 14-inch thin-and-light PC like the Dell XPS 13 or Lenovo’s ThinkPad X1 Carbon. These laptops have reasonably powerful processors and integrated graphics that are good enough for an external monitor or two, but they prioritize a thin profile and light weight over performance.

Still, sometimes you need something larger and more powerful, whether it’s because you want a bigger screen to use away from your desk or you need extra processor cores or graphical power for editing videos or playing games. And if you want those things in a laptop that doesn’t totally disregard size and weight—and if you prefer or require Windows instead of macOS—that’s when you buy something like the XPS 15.

The latest XPS 15 (officially, model number 9510) is yet another iterative improvement for a laptop that has always looked and felt like a blown-up version of the XPS 13. But six- or eight-core Intel Tiger Lake processors and a new Nvidia GeForce RTX GPUs with ray tracing capabilities make this version of the XPS 15 especially appealing for professionals and light gamers, even if updated competitors like Lenovo’s ThinkPad X1 Extreme Gen 4 (and, when it’s finally released, an updated version of the 16-inch MacBook Pro with Apple Silicon) give it a run for its money.

Read 27 remaining paragraphs | Comments

Urteil zu Schrems II: US-Datentransfer kann mit Verschlüsselung abgesichert werden

Der belgische Staatsrat hat ein wichtiges Urteil zum Datentransfer in die USA gefällt. Doch wann reicht die Verschlüsselung von Daten wirklich aus? Ein Bericht von Christiane Schulzki-Haddouti (Privacy Shield, Soziales Netz)

Der belgische Staatsrat hat ein wichtiges Urteil zum Datentransfer in die USA gefällt. Doch wann reicht die Verschlüsselung von Daten wirklich aus? Ein Bericht von Christiane Schulzki-Haddouti (Privacy Shield, Soziales Netz)

Telegram emerges as new dark web for cyber criminals

Growing network of hackers sharing data leaks on encrypted messaging app.

Telegram emerges as new dark web for cyber criminals

Enlarge (credit: Carl Court / Getty Images)

Telegram has exploded as a hub for cybercriminals looking to buy, sell, and share stolen data and hacking tools, new research shows, as the messaging app emerges as an alternative to the dark web.

An investigation by cyber intelligence group Cyberint, together with the Financial Times, found a ballooning network of hackers sharing data leaks on the popular messaging platform, sometimes in channels with tens of thousands of subscribers, lured by its ease of use and light-touch moderation.

In many cases, the content resembled that of the marketplaces found on the dark web, a group of hidden websites that are popular among hackers and accessed using specific anonymizing software.

Read 25 remaining paragraphs | Comments