Cetus lost over $220 million after an attacker exploited a flaw in a smart contract math library. The attacker used spoof tokens and overflow bugs to trick the system into giving away real assets.
Solv Protocol is investigating an exploit that drained roughly $2.7 million from one of its structured yield vaults, adding to a growing list of security incidents across the decentralised finance ...
Venus Protocol, a BNB Chain lending platform, was hit by a suspected $3.7 million flash loan exploit on March 15. Security ...
Decentralized finance (DeFi) protocol Blueberry has managed to pause its protocol after a mad dash to limit potential damage from an “ongoing exploit” on Friday. In a Feb. 23 post on X, the Blueberry ...
Loopscale, a decentralized finance (DeFi) protocol built on Solana, has suspended its lending operations following a $5.8 million exploit. The incident occurred on April 26, when a hacker drained 5.7 ...
Alex Lab Foundation said it will fully reimburse users affected by the $8.3 million exploit, with compensation issued in USDC following a structured claims process. Alex Protocol, a Bitcoin ...
Unleash Protocol, an intellectual property finance platform built on the Story ecosystem, lost about $3.9 million in a security breach, according to blockchain security firm PeckShield. The attacker ...
Decentralized finance (DeFi) platform LI.FI protocol has been hit by a roughly $11 million exploit following a series of suspicious withdrawals, on-chain data shows. "Please do not interact with any ...
Nemo Protocol released a comprehensive post-mortem blaming a rogue developer for deploying unaudited code containing critical vulnerabilities that enabled a $2.59 million exploit on September 7. The ...
A couple of weeks ago, the cryptocurrency community witnessed a “peculiar” and complex exploit within the Raft Protocol, which is described as a decentralized finance (DeFi) platform operating on the ...
Attackers can abuse the way browsers and other applications handle steam:// protocol URLs in order to exploit serious vulnerabilities in the Steam client or games installed through the platform, ...
It happens all too often that the first time a vulnerability becomes known is when a forensic investigation is under way to find out how a system was broken into, or when a virus that’s already ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results