article thumbnail

Using blockchain to combat counterfeiting in manufacturing

CGI

Using blockchain to combat counterfeiting in manufacturing. Correspondingly, for manufacturers and retailers, safeguarding the consumer experience and ensuring safety and trust are key to protecting the brand. Product authenticity plays a huge role in assuring consumer confidence for B2B and B2C businesses.

article thumbnail

MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

The Last Watchdog

Related: Securing identities in a blockchain Today we may be standing on the brink of the next great upheaval. Blockchain technology in 2019 may prove to be what the internet was in 1999. Public blockchains and private DLTs are in a nascent stage, as stated above, approximately where the internet was in the 1990s.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Applications of Blockchain in Data Management

AIIM

Blockchain is one of the most important new technologies that has impacted the business world in the last decade. Along with cloud computing, artificial intelligence (AI), and robotic process automation (RPA), blockchain is transforming business operations and challenging traditional methods the world over.

article thumbnail

As of May 2024, Black Basta ransomware affiliates hacked over 500 organizations worldwide

Security Affairs

The researchers analyzed blockchain transactions, they discovered a clear link between Black Basta and the Conti Group. Most of the victims are in the manufacturing, engineering and construction, and retail sectors. The largest received ransom payment was $9 million, and at least 18 of the ransoms exceeded $1 million.

article thumbnail

US offers $10 million reward for info on Hive ransomware group leaders

Security Affairs

The authorities reported that from June 2021 through at least November 2022, threat actors targeted a wide range of businesses and critical infrastructure sectors, including Government Facilities, Communications, Critical Manufacturing, Information Technology, and especially Healthcare and Public Health (HPH).

article thumbnail

Threat actors are stealing funds from General Bytes Bitcoin ATM

Security Affairs

GENERAL BYTES is the world’s largest Bitcoin, Blockchain, and Cryptocurrency ATM manufacturer. The ATM machines manufactured by the company are remotely controlled by a Crypto Application Server (CAS), which manages the operation of the devices.

article thumbnail

Security Affairs newsletter Round 303

Security Affairs

Bug bounty hacker earned $5,000 reporting a Stored XSS flaw in iCloud.com Experts warn of threat actors abusing Google Alerts to deliver unwanted programs FBI warns of the consequences of telephony denial-of-service (TDoS) attacks An attacker was able to siphon audio feeds from multiple Clubhouse rooms Georgetown County has yet to recover from a sophisticated (..)

Security 278