A flaw in Rarible, an NFT Marketplace, put cryptowallets at risk

rarible

Rarible is the most used marketplace for buying and selling NFTs (non-fungible tokens), but a flaw in its systems allowed cybercriminals to take possession of users’ cryptowallets. All this thanks to malicious NFTs, a kind of phishing within the platform that deceived users. Learn more about this already fixed bug. Read: Ukrainian soldiers are hacked […]

How hackers access a system

hackers access a system

Many organizations relied on their professional teams to keep up with security in any aspect, but we are humans, and some mistakes are bound to happen. That is where hackers attack, taking advantage of security flaws. So, how can hackers access a system? Well, the answer is a little complicated. However, here at Eagle Tech, […]

Get to know how hackers operate

PALABRA CLAVE: how hackers operate

Many people have this idea of a hacker working in a dark room, trying to get the information of a single individual, but the reality is way far from that scenario. Knowing how hackers operate is the first step in the path to secure information, not only personal but also from organizations and companies, which […]