June 27, 2022, 6:14 p.m. | Paul Ducklin

Naked Security nakedsecurity.sophos.com

The crooks needed at least two private keys, each stored in two parts... but they got them anyway.

blockchain crypto cryptocurrency data loss ether hack hacked harmony keys

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer, Infrastructure Protection

@ Google | Hyderabad, Telangana, India

Senior Security Software Engineer

@ Microsoft | London, London, United Kingdom

Consultor Ciberseguridad (Cadiz)

@ Capgemini | Cádiz, M, ES

Cyber MS MDR - Sr Associate

@ KPMG India | Bengaluru, Karnataka, India

Privacy Engineer, Google Cloud Privacy

@ Google | Pittsburgh, PA, USA; Raleigh, NC, USA