Cetus lost over $220 million after an attacker exploited a flaw in a smart contract math library. The attacker used spoof tokens and overflow bugs to trick the system into giving away real assets.
Bedrock said the root cause of the exploit has been “handled” and reassured users that all remaining assets were safe. Multi-asset liquid staking protocol Bedrock confirmed it fell victim to a ...
Hosted on MSN
Usual Protocol pauses contract after USD0 exploit
Usual Protocol discovered a series of unvetted transactions. BlockSec reported the breach, which led to the pausing of all Usual smart contracts. BlockSec discovered a series of suspicious ...
Decentralized finance (DeFi) protocol Blueberry has managed to pause its protocol after a mad dash to limit potential damage from an “ongoing exploit” on Friday. In a Feb. 23 post on X, the Blueberry ...
The attacker currently holds $1.8M worth of crypto including 32.5 million NXRA tokens. Nexera has paused the smart contract and trading on decentralized exchanges; the token fell 40%. The attacker is ...
Decentralized finance (DeFi) platform Cork Protocol has suffered a smart contract exploit, with hackers reportedly stealing $12 million worth of wrapped staked ether (wstETH). Blockchain security ...
(MENAFN- Crypto Breaking) CrossCurve, a cross-chain liquidity bridge, has halted interactions with its protocol as it probes a smart contract breach that security researchers describe as exploiting a ...
Unleash Protocol, an intellectual property finance platform built on the Story ecosystem, lost about $3.9 million in a security breach, according to blockchain security firm PeckShield. The attacker ...
A couple of weeks ago, the cryptocurrency community witnessed a “peculiar” and complex exploit within the Raft Protocol, which is described as a decentralized finance (DeFi) platform operating on the ...
Nemo Protocol released a comprehensive post-mortem blaming a rogue developer for deploying unaudited code containing critical vulnerabilities that enabled a $2.59 million exploit on September 7. The ...
It happens all too often that the first time a vulnerability becomes known is when a forensic investigation is under way to find out how a system was broken into, or when a virus that’s already ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results