• About
  • Disclaimer
  • Privacy Policy
  • Contact
Thursday, July 17, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

MITRE Launches New Framework to Sort out Crypto Dangers

Md Sazzad Hossain by Md Sazzad Hossain
0
MITRE Launches New Framework to Sort out Crypto Dangers
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

How India’s DPDP Act Impacts Digital Lending

Anomaly detection betrayed us, so we gave it a brand new job – Sophos Information


MITRE has launched a brand new cybersecurity framework geared toward addressing vulnerabilities in digital monetary programs comparable to cryptocurrency.

Referred to as the Adversarial Actions in Digital Asset Cost Applied sciences (AADAPT) framework, it offers builders, policymakers and monetary organizations with a structured methodology for figuring out, analyzing and mitigating potential dangers related to digital asset funds.

In response to MITRE, the AADAPT framework, introduced on July 14, makes use of insights from real-world assaults as cited by greater than 150 sources together with authorities, business and academia.

The AADAPT framework identifies adversarial ways, strategies and procedures linked to digital asset cost applied sciences, together with consensus algorithms and good contracts.

Cyber threats related to cryptocurrency embody double-spending assaults, phishing schemes and ransomware incidents that impression companies, governments and particular person customers.

Smaller organizations, native governments and municipalities are significantly susceptible, usually missing the sources to reinforce their cybersecurity measures, MITRE famous.

AADAPT seeks to handle these disparities by offering sensible steering and instruments tailor-made to the distinctive wants of this monetary market phase.

“Digital cost property like cryptocurrency are set to rework the way forward for international finance, however their safety challenges can’t be ignored,” stated Wen Masters, VP of cyber applied sciences at MITRE. “With AADAPT, MITRE is empowering stakeholders to undertake strong safety measures that not solely safeguard their property but in addition construct belief throughout the ecosystem.”

AADAPT is modeled after the MITRE ATT&CK framework and its ways and strategies are complementary to these in ATT&CK.

In July 2025, cybersecurity agency CertiK discovered that round $2.47bn in cryptocurrency had been stolen through scams, hacks and exploits within the first half of 2025.

The surge was spurred by a hack focusing on cryptocurrency change Bybit in February, which resulted in $1.4bn in cryptocurrency being stolen.

The Bybit hack was linked to Lazarus, a state-sponsored North Korean APT group.

Tags: cryptoFrameworkLaunchesMITRErisksTackle
Previous Post

What You Have to Know

Next Post

Amazon Bedrock Data Bases now helps Amazon OpenSearch Service Managed Cluster as vector retailer

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits
Cyber Security

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

by Md Sazzad Hossain
July 16, 2025
How India’s DPDP Act Impacts Digital Lending
Cyber Security

How India’s DPDP Act Impacts Digital Lending

by Md Sazzad Hossain
July 16, 2025
Anomaly detection betrayed us, so we gave it a brand new job – Sophos Information
Cyber Security

Anomaly detection betrayed us, so we gave it a brand new job – Sophos Information

by Md Sazzad Hossain
July 15, 2025
Why it’s best to by no means pay to receives a commission
Cyber Security

Why it’s best to by no means pay to receives a commission

by Md Sazzad Hossain
July 14, 2025
Weekly Replace 460
Cyber Security

Weekly Replace 460

by Md Sazzad Hossain
July 14, 2025
Next Post
Amazon Bedrock Data Bases now helps Amazon OpenSearch Service Managed Cluster as vector retailer

Amazon Bedrock Data Bases now helps Amazon OpenSearch Service Managed Cluster as vector retailer

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Decoding CLIP: Insights on the Robustness to ImageNet Distribution Shifts

Disentangled Representational Studying with the Gromov-Monge Hole

April 18, 2025
Luiz Domingos, CTO and Head of Massive Enterprise R&D at Mitel – Interview Sequence

Luiz Domingos, CTO and Head of Massive Enterprise R&D at Mitel – Interview Sequence

March 22, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Tips on how to Dry Flooded Carpet Shortly: Fast Steps

Tips on how to Dry Flooded Carpet Shortly: Fast Steps

July 17, 2025
Python’s Interning Mechanism: Why Some Strings Share Reminiscence | by The Analytics Edge | Jul, 2025

Python’s Interning Mechanism: Why Some Strings Share Reminiscence | by The Analytics Edge | Jul, 2025

July 17, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In