Cetus lost over $220 million after an attacker exploited a flaw in a smart contract math library. The attacker used spoof tokens and overflow bugs to trick the system into giving away real assets.
Decentralized finance (DeFi) platform LI.FI protocol has been hit by a roughly $11 million exploit following a series of suspicious withdrawals, on-chain data shows. "Please do not interact with any ...
Nexera, a blockchain infrastructure protocol that focuses on tokenization, has suffered an exploit with $1.8 million being stolen, according to crypto security firm Cyvers. The company, formerly known ...
A hacker stole $3.6 million from a DeFi protocol DForce in a reentrancy attack targeting its Arbitrum and Optimism chains. DForce confirmed the attack on Twitter, saying it paused all vaults to avoid ...
Multi-asset liquid staking protocol Bedrock confirmed it fell victim to a “security exploit” involving uniBTC, as hackers made off with about $2 million in funds. In a Sept. 27 X post, Bedrock said it ...
Alex Protocol, a Bitcoin decentralized finance (DeFi) platform on the Stacks blockchain, suffered an exploit on June 6, resulting in $8.3 million in digital asset losses. In an X announcement, Alex ...
Loopscale, a decentralized finance (DeFi) protocol built on Solana, has suspended its lending operations following a $5.8 million exploit. The incident occurred on April 26, when a hacker drained 5.7 ...
Nemo Protocol released a comprehensive post-mortem blaming a rogue developer for deploying unaudited code containing critical vulnerabilities that enabled a $2.59 million exploit on September 7. The ...
A couple of weeks ago, the cryptocurrency community witnessed a “peculiar” and complex exploit within the Raft Protocol, which is described as a decentralized finance (DeFi) platform operating on the ...
Attackers can abuse the way browsers and other applications handle steam:// protocol URLs in order to exploit serious vulnerabilities in the Steam client or games installed through the platform, ...
It happens all too often that the first time a vulnerability becomes known is when a forensic investigation is under way to find out how a system was broken into, or when a virus that’s already ...