Attackers are exploiting cryptocurrency blockchains to host malware and expose visitors of breached websites. They use cryptocurrency transactions on the Binance Smart Chain (BSC) to keep the malware from being shut down by security experts. The BSC, aware of the hack, has blacklisted addresses connected to the malware and vowed to enhance efforts to thwart such malicious activities.

The NCSC wants developers to get serious on software security
The NCSC’s new Software Security Code of Practice has been praised by cyber professionals as a significant advancement in enhancing software supply chain security.