Cetus lost over $220 million after an attacker exploited a flaw in a smart contract math library. The attacker used spoof tokens and overflow bugs to trick the system into giving away real assets.
Hosted on MSN
Usual Protocol pauses contract after USD0 exploit
Usual Protocol discovered a series of unvetted transactions. BlockSec reported the breach, which led to the pausing of all Usual smart contracts. BlockSec discovered a series of suspicious ...
Venus Protocol, a BNB Chain lending platform, was hit by a suspected $3.7 million flash loan exploit on March 15. Security ...
Decentralized finance (DeFi) protocol Blueberry has managed to pause its protocol after a mad dash to limit potential damage from an “ongoing exploit” on Friday. In a Feb. 23 post on X, the Blueberry ...
A bug in a token issued by decentralized finance (DeFi) protocol Yearn Finance was impacted in an exploit this morning, security firm PeckShield tweeted, leading to millions of dollars in losses.
The attacker currently holds $1.8M worth of crypto including 32.5 million NXRA tokens. Nexera has paused the smart contract and trading on decentralized exchanges; the token fell 40%. The attacker is ...
Alex Lab Foundation said it will fully reimburse users affected by the $8.3 million exploit, with compensation issued in USDC following a structured claims process. Alex Protocol, a Bitcoin ...
Decentralized finance (DeFi) platform LI.FI protocol has been hit by a roughly $11 million exploit following a series of suspicious withdrawals, on-chain data shows. "Please do not interact with any ...
Loopscale, a decentralized finance (DeFi) protocol built on Solana, has suspended its lending operations following a $5.8 million exploit. The incident occurred on April 26, when a hacker drained 5.7 ...
Nemo Protocol released a comprehensive post-mortem blaming a rogue developer for deploying unaudited code containing critical vulnerabilities that enabled a $2.59 million exploit on September 7. The ...
Attackers can abuse the way browsers and other applications handle steam:// protocol URLs in order to exploit serious vulnerabilities in the Steam client or games installed through the platform, ...
It happens all too often that the first time a vulnerability becomes known is when a forensic investigation is under way to find out how a system was broken into, or when a virus that’s already ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results