Cryptocurrency Transactions Security

Explore top LinkedIn content from expert professionals.

  • View profile for Sergey Nazarov

    Co-Founder of Chainlink

    26,856 followers

    Over the past year, we’ve seen overwhelming demand among institutions for onchain financial products and tokenized real-world assets (RWAs) due to the greater liquidity and accessibility they offer. Chainlink is at the center of this mega-trend, providing a growing collection of major financial institutions and market infrastructures access to the services they require to enrich RWAs with data, transfer RWAs cross-chain, and keep RWAs updated even as they move cross-chain. An example of this, ARTA TechFin—a leading Hong Kong-based financial institution—is developing cross-chain tokenized funds using multiple Chainlink services: CCIP for secure token transfers across public and private blockchains; Data Feeds for Net Asset Value (NAV) reporting; and Proof of Reserve for verifying the collateral backing on chain fund tokens. This collaboration is both a strong indicator of the growing institutional demand for onchain finance and Chainlink’s role as the foundation for the Internet of Contracts.

  • View profile for Vaughan Shanks

    Helping security teams respond to cyber incidents better and faster | CEO & Co-Founder, Cydarm Technologies

    12,079 followers

    ASD and partners have released a guide to "Managing cryptographic keys and secrets", and given the current wave of infostealer-originated compromises, it's well worth a read. Key takeaways (pardon the pun) are: 🔑 Your organization needs a Key Management Plan (KMP) that articulates the threats to cyrptographic material as well as mitigation and response strategies 🔑 Key generation is best achieved using Hardware Security Modules (HSMs) - as famous computer scientist Donald Knuth said in "random numbers should not be generated with a method chosen at random" 🔑 Keys need to be stored with least privilege (separation of duties) and strong access controls, and distributed securely 🔑 Deploy effective logging and monitoring, and conduct audits 🔑 Plan for key rollovers and destruction, with keys having defined maximum usage periods 🔑 Prepare for transition to quantum-resistant algorithms There is a lot more detail in the guide, including links to the relevant standards. This is a good starting point for developing a policy and KMP for your organization, especially if you need to comply with ISM or FIPS. What the guide does not cover is practical implementation advice, such as how to automate trusted key management processes - SPIFFE (Secure Production Identity Framework For Everyone) is perhaps better suited for more technical practitioners. 📘 "Managing cryptographic keys and secrets": https://lnkd.in/gwvGQ5ep 📘 [Mentioned] SPIFFE: https://lnkd.in/g9bGHTP2

  • View profile for Andra-Maria Maute

    Architecting for Enterprise Transformation | 10+ years experience in IT, Financial Services & Cyber | Speaker | Digital Assets Lecturer | Rock Climber

    7,642 followers

    The #stablecoin market has seen significant growth, with stablecoin transfer volume reaching $27.6 trillion, surpassing the combined annual volumes of Visa and Mastercard by over 7%, driving demand for enterprise-grade solutions. The key companies providing enterprise-grade, full-stack platforms for stablecoin issuance seem to be Taurus SA, Fireblocks (in 2024 15% of global stablecoin volume), and Utila. Moreover, beyond issuing USDC, Circle provides APIs and infrastructure for other institutions to build stablecoin solutions. The key capabilities of these enterprise platforms offer: ✅ Multi-chain deployment (EVM and non-EVM blockchains) ✅ Mint/burn contract management ✅ Regulatory compliance tools ✅ Multi-party computation (MPC) wallet infrastructure ✅ API integration for existing banking systems ✅ Real-time monitoring and reporting ✅ Gas optimization and treasury management Which full-stack platform for stablecoin issuance does your company use?

  • View profile for Antonio Grasso
    Antonio Grasso Antonio Grasso is an Influencer

    Technologist & Global B2B Influencer | Founder & CEO | LinkedIn Top Voice | Driven by Human-Centricity

    42,206 followers

    Quantum-ready blockchain strengthens digital trust by protecting data, smart contracts, and decentralized operations from quantum threats. We must see this evolution as essential for the future of digital ecosystems. Quantum computing is progressing faster than many expected, and traditional encryption could soon be insufficient. Preparing our infrastructures today means protecting the integrity of tomorrow’s data flows. A quantum-safe blockchain applies advanced cryptography designed to resist future decryption algorithms. It enables organizations to automate processes securely, manage collaboration without central authorities, and maintain transparency across complex networks. These qualities will be critical for global businesses that depend on reliability, privacy, and interoperability. The transition toward quantum security is not only a technical necessity but also a cultural shift toward long-term digital resilience. It challenges us to think beyond current risks and to build trust into every layer of our digital interactions. #QuantumComputing #Blockchain #CyberResilience

  • View profile for Matthew Rosenquist
    Matthew Rosenquist Matthew Rosenquist is an Influencer

    Founder Cybersecurity Insights, CISO at Mercury Risk, former Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker, 199k followers

    199,263 followers

    The Society for Worldwide Interbank Financial Telecommunication (SWIFT) and over 30 banks servicing 200 countries, have announced they will develop a blockchain global shared digital ledger to support global payments. SWIFT will integrate the blockchain with legacy systems and continue innovating to deliver more capable financial services. I am a fan of blockchain technology, the most famous instance being Bitcoin, and with its rise in the traditional finance industry, we must prepare for a greater focus by cybercriminals. The good news is blockchains have some inherent security and resilience benefits, but the downside is that the technology is relatively news in the global finance sector. One mistake or vulnerability could have severe repercussions and be a windfall for attackers. This is why many of these organizations have been ruthlessly testing such systems for years before deciding on a major deployment. Cybersecurity will need to adapt to extend our umbrella of digital trust to include these systems. That means: 1. Updating security policies, procedures, and guidelines. 2. Inclusion of system telemetry into our alerting systems with new detection rules. 3. Updating our incident and crisis response plans and tests. 4. Active monitoring of the threat agents activities and chatter. 5. Evolving the security standards for the design, integration, operation, and updates of blockchain technologies. 6. Preparation for compliance to the cybersecurity legislation and standards that will eventually occur. Blockchain technology will bring great benefits to the financial sector, including lower costs and faster cross-border transfers, but it will become a target for cybercriminals. Cybersecurity must play a strong role in its architecture, development, and operations to protect financial assets, customer privacy, and intuitional reputations. #cybersecurity #cybersecuritynews #blockchain #cybercrime Cybersecurity Insights

  • View profile for Alvin Rodrigues
    Alvin Rodrigues Alvin Rodrigues is an Influencer

    I help organisations turn their people into their strongest security asset | Cybersecurity Awareness Trainer | Keynote Speaker | Author | Human Firewall Builder and Behaviour Change Specialist

    10,308 followers

    How smart teams fall for fake leaders? Over coffee, a few friends said they picture cyberattacks as neat, step-by-step and one at a time. The reality is different: attackers run campaigns that are multi-step, multi-channel, and relentless at exploiting trust. If you share the same impression, I would like you to review how a Singapore company lost US$499,000 in March of this year. Source: https://lnkd.in/g2C-HRFG The Cybercriminals use a multi-channel social engineering attack powered by deepfake impersonation, leading to authorised push payment fraud. How did the team fall? ✅ A WhatsApp message from the "CFO" arrives. Duty kicks in. A familiar name in casual conversation prompts a quick 'yes'. ✅ A “lawyer” appears. Urgency combined with an NDA creates pressure and secrecy. Questions fade. ✅ Zoom begins. Faces and voices look right. Relief. You comply. ✅ Payment steps follow. It feels routine. You execute. ❌ Then they ask for more. Doubt finally shows up. Practical fixes you can start today: 1️⃣ Verify transfers on two channels. Call a known number and log it. 2️⃣ Use a rotating code word for approvals. 3️⃣ Hold 24 hours on new or changed payees, with a callback. 4️⃣ Split payment duties and verify each stage. The Maker. The Checker. The Releaser. Clear limits. 5️⃣ Run a 15-minute drill each quarter. Trust your people. Trust your process more. If you lead HR, risk, or security, or are a business owner looking to improve your security posture, I would be happy to discuss this further. Who am I? A human firewall builder and keynote speaker who moderates roundtables and runs hands-on workshops to embed cyber habits and strengthen your security posture. #AlvinSRatwork#AlvinSRCyberGuy#CyFiSafe#ExecutiveDirector#CyberCulture#HumanFirewall#CyberAwareness#BusinessTechnologist#CyberHabits

  • View profile for Sharat Chandra

    Blockchain & Emerging Tech Evangelist | Driving Impact at the Intersection of Technology, Policy & Regulation | Startup Enabler

    48,548 followers

    #Blockchain | #GDPR | #Compliance : Leveraging Zero Knowledge Proofs for GDPR Compliance in Blockchain Projects. As blockchain technology continues to mature, its core features - immutability and transparency - present obstacles for complying with modern privacy regulations, including the General Data Protection Regulation (GDPR). The permanent and public nature of on-chain data, combined with blockchain’s decentralized framework, creates challenges for developing blockchain-based or decentralized solutions in areas that involve personal data. Zero-Knowledge Proofs (ZKPs) offer a way to overcome these obstacles, enabling blockchain projects to meet GDPR requirements while preserving the benefits of decentralization. This paper explores the key benefits and potential applications of ZKPs in achieving GDPR compliance. In a typical implementation, ZKPs generate a proof that can be hashed and stored on the blockchain, while the underlying data remains off-chain. This proof can be verified by the network without exposing any sensitive information. For example, a ZKP could prove that a user is over a certain age without revealing the user’s exact birthdate. The cryptographic proof ensures that the verification is valid, but no personal data is shared or stored on the blockchain. By limiting the exposure of personal information and reducing the amount of data stored on-chain, ZKPs help blockchain systems comply with GDPR’s data minimization requirements. Additionally, ZKPs address the right to be forgotten by ensuring that personal data remains off-chain, while only a hash of the data is stored on the blockchain. If a user requests their data to be erased, the cryptographic keys linked to the proof can be revoked or invalidated, rendering the proof unusable and ensuring that personal data becomes inaccessible. This approach allows blockchain to maintain its security and immutability while complying with GDPR’s legal obligations. 

  • View profile for Arjun Mukherjee

    CTO at Mesh | ex Coinbase, Goldman Sachs

    10,428 followers

    ⚠️ Recruiters and hiring managers: be careful out there. Mesh recently extended a verbal offer to a candidate who seemed to tick all the boxes: driven, articulate, and technically sharp. On paper, he looked like a great fit. The interview started strong. He was confident, thoughtful, and handled technical questions well. But then small details started to feel… off. → He crushed the virtual interview but had unusually modest compensation expectations → He said he was completely open to relocating, but only six months after starting → He had a seemingly valid medical reason for needing to skip an in-person meeting None of this alone was a dealbreaker, but something still didn’t sit right. Then came the moment that tipped the balance. The candidate listed 3+ years at Coinbase, which overlapped with my own time there. So I asked a few simple questions about the team he worked on and the people he collaborated with. He couldn’t answer them. He couldn’t describe his team, name any colleagues, or provide any real details about his time at Coinbase. At this point, the unsettling realization was that he had already made it extremely far in our process. We were even preparing a formal offer. What’s more concerning: the traditional safeguards didn’t catch anything. Standard background checks (including SSN verification, education checks, and screening through platforms like Checkr) all came back clean. So we dug deeper. After additional vetting, we confirmed the candidate was an impersonator attempting to infiltrate our company. Unfortunately, this is becoming more common. Remote hiring creates incredible opportunities for global talent, but it has also opened the door to highly sophisticated impersonation attempts that disproportionately target web3 companies. Fraudsters are getting better at forging W2s and paystubs, building convincing professional footprints, and even using AI to conduct deepfake video interviews. Trust your instincts and verify aggressively. Every hire is part of your company’s security perimeter, so screening processes should be rigorous and layered with multiple cross-checks. Diligence today can prevent disaster tomorrow. 🛡️ [Image source: CoinDesk] #CryptoSecurity #BlockchainBuilders #TrustInCrypto

  • View profile for Flavio Queiroz, MSc, CISSP, CISM, CRISC, CCISO

    Cybersecurity Leader | Information Security | GRC | Security Operations | Mentor | GSOC, GCIH, GDSA, GISP, GPEN, GRTP, GCPN, GDAT, GCISP, GCTIA, CTIA, eCMAP, eCTHP, CTMP

    30,632 followers

    [THREAT CAMPAIGN] UNC1069’s Fake Meeting Tactics Targeting Human Entry Points ℹ️ The campaign attributed to UNC1069 (overlapping with Bluenoroff/Lazarus) uses highly convincing fake meeting scenarios to socially engineer victims, primarily in crypto, Web3, and tech sectors, into executing malicious commands, leading to full system compromise and financial theft. 📍 CORE TRADECRAFT ■ Social Engineering at “enterprise-grade realism” • Initial contact via LinkedIn or Telegram, often using compromised accounts or fake VC personas. • Victim is invited to a meeting via Calendly-like scheduling flows. • Redirect to fake Zoom / Google Meet / Teams infrastructure controlled by attackers. ■ Fake Meeting + Deepfake Layer • Pre-recorded or AI-generated video (deepfake executives). • Simulated live interaction. • Main narrative: “We can’t hear you” → creates urgency and confusion. ■ ClickFix Execution Technique • Victim is instructed to “fix audio issues” by running terminal / PowerShell commands. • This is the critical execution point triggering the infection chain. 📍 MULTI-PLATFORM ATTACK CHAIN • Windows → PowerShell downloaders → VBS-based RATs. • macOS → Mach-O payloads → RAT deployment. • Linux → ELF binaries → RAT execution. 📍 CAPABILITIES Observed tooling (across broader UNC1069 activity): • Modular downloaders (staged delivery). • RATs for persistence and control. • Data theft modules (credentials, browser sessions, tokens). • Possible chaining into supply chain attacks (e.g., axios incident). • Objective: financial gain via crypto theft + credential harvesting. 📍 CTI PERSPECTIVE • Human-layer exploitation > technical exploits. • ClickFix is a dominant initial access technique. • Cross-platform parity is now standard. • AI-enabled deception is operationalized. 📌 Source: Validin 🔗 https://lnkd.in/eQDY-u7d #UNC1069 #threathunting #threatdetection #threatanalysis #threatintelligence #cyberthreatintelligence #cyberintelligence #cybersecurity #cyberprotection #cyberdefense

Explore categories