Search
'A New Class of Attack' In Crypto Is 'Actively Exploited' - Research
23.7.2020
The crypto market went through one of its wildest rides with the March market crash, among other events seeing a so-called "zero-bid" attack on MakerDAO, a decentralized lending facility built on the Ethereum (ETH) blockchain and the creator of the DAI stablecoin. A recent research...
Researchers Expose Flaw in Bitcoin Wallets That Could Be Exploited for Double-Spending
2.7.2020
A standard way to transact Bitcoin could be vulnerable to double-spending and DoS attacks, ZenGo has found
Loopring DEX Quickly Fixes Major Bug Before It Can Be Exploited
7.5.2020
A security vulnerability on decentralized exchange, Loopring, was identified and quickly patched before it could be exploited
DeFi Project bZx Exploited for Second Time in a Week, Loses $630K in Ether
18.2.2020
The attacker manipulated price feeds in order to create and profit from an under collateralized loan
BTC Halving Countdown, Kobe Death Exploited, Donut Row: Hodler’s Digest, Jan. 27–Feb 2
2.2.2020
In this week’s Hodler’s Digest, the SEC says Telegram tokens are worth less than donuts, and a pioneer Bitcoin investor says the cryptocurrency isn’t what it used to be
Ethereum Name Service Auction Exploited to Grab Apple Domain – And It Can’t Be Undone
1.10.2019
A bug in an ENS auction was exploited, allowing domains like "apple.eth" to be nabbed by an attacker. The only recourse is to ask for them back
Lightning Labs CTO Confirms LN Vulnerabilities ‘Exploited in the Wild’
10.9.2019
The CTO of Lightning Labs confirms cases of the vulnerability on Lightning Network first reported on Aug. 30 having been exploited
Hide Information in Images
9.7.2018
If you’ve followed this blog, you know that I’m obsessed with figuring out every way to interact with, abuse, and convert different types of media. Whether it’s images, video, or audio, if something can be changed or exploited, I want to figure out how to do it. I remember...