Search

Nalezeno "attack vectors": 8

Cross-Layer Attack Vectors in Multi-Layer Blockchain Protocols


The evolution of blockchain technology has led to the development of multi-layer blockchain protocols, designed to improve scalability, security, and […] The post Cross-Layer Attack Vectors in Multi-Layer Blockchain Protocols appeared first on

Web3 Lost $38.9 Million to Bad Actors in First Month of 2024: Quantstamp


Bad actors have stolen $38.9 million from various Web3 projects in the first month of 2024. According to a recent report from Quantstamp, a decentralized finance (DeFi) security startup, bad actors used different attack vectors to steal funds, including smart contract hacks, key compromises,...

A New Academic Paper Describes 3 Attack Methods Against an Ethereum PoS Chain


Following the Altair upgrade on the Ethereum network, the protocol’s native cryptocurrency reached a new all-time price high. Altair is the next step for the Ethereum’s network’s proof-of-stake (PoS) transition. However, a recently submitted white paper explains that a group...

Lightning Network Exploits Continue to Hinder the Bitcoin Scaling Solution


While bitcoin has run-up to all new price highs in 2020, a great number of crypto supporters have been complaining about the mempool backlog and the high fees needed to send a transaction. Meanwhile, the Lightning Network is far from seeing widespread adoption, and a number of attack vectors have...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace