Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cyber Security /
Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War

Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War

Jun 19, 2025 08:00 pm Cyber Security 158

Israel-linked Predatory Sparrow hackers torched more than $90 million at Iran’s largest cryptobank as Israel-Iran cyberwar escalates.


The post Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War appeared first on SecurityWeek.



Support the originator by clicking the read the rest link below.
predatory sparrow burns million iranian crypto exchange cyber shadow
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
securityweek.com
Dual RGB Cameras Get Depth Sensing Powerup
Prev
Dual RGB Cameras Get Depth Sensing Powerup
Banana Squad Hides Data-Stealing Malware in Fake GitHub Repositories
Next
Banana Squad Hides Data-Stealing Malware in...

Related News

  • Crypto Market Outlook: How Crypto Will Come of Age in 2025
    Crypto Market Outlook: How Crypto Will Come of...
  • NCSC Urges Enterprises to Upgrade to Microsoft Windows 11 to Avoid Cyber Threats
    NCSC Urges Enterprises to Upgrade to Microsoft...
  • 36 New Public Firms Eye Bitcoin in 6 Months; Is the Corporate Crypto Boom Just Starting?
    36 New Public Firms Eye Bitcoin in 6 Months; Is...
  • Crypto funds post $3.7B inflows as Bitcoin soars to new highs
    Crypto funds post $3.7B inflows as Bitcoin...
  • Is the crypto market entering a new supercycle? Here are 5 ways to know
    Is the crypto market entering a new supercycle?...
  • $250K Bitcoin on the Horizon? Crypto Week, CLARITY & GENIUS Acts Spark Institutional Frenzy
    $250K Bitcoin on the Horizon? Crypto Week,...
  • Bitcoin Hyper Emerges as a Leading Crypto Presale, Bringing Smart Contracts and Solana Speed to the Bitcoin Network
    Bitcoin Hyper Emerges as a Leading Crypto...
  • Dogecoin Chart Is ‘One Of The Best’ In Crypto—$1 Remains Likely: Analyst
    Dogecoin Chart Is ‘One Of The Best’ In...
  • Agora Unveils White-Labeled Stablecoin Platform to Disrupt Crypto Finance
    Agora Unveils White-Labeled Stablecoin Platform...
  • McDonald’s AI Hiring Tool McHire Leaked Data of 64 Million Job Seekers
    McDonald’s AI Hiring Tool McHire Leaked Data of...
1 Best Black Friday in July 2025 deals at Best Buy: The best offers that end tomorrow
Best Black Friday in July 2025 deals at Best Buy: The best offers that end tomorrow
Bitcoin Bulls In Cloud 9? Analyst Identifies Where Risk Lies
2 Bitcoin Bulls In Cloud 9? Analyst Identifies Where Risk Lies
Apple’s $799 iPhone Might Be Available in Early 2026
3 Apple’s $799 iPhone Might Be Available in Early 2026
High-leverage trader James Wynn deactivates X account
4 High-leverage trader James Wynn deactivates X account
how hackers avoid getting caught
5 how hackers avoid getting caught

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!