Search
FBI and CSIA issue alert over North Korean cyberattacks on crypto targets
19.4.2022
The cybersecurity agency believes that the threat from North Korean hackers will not go away unless crypto firms take necessary but simple steps to ensure their security
OFAC Update Claims Ronin Hack Is Tethered to North Korea’s Hacker Syndicate Lazarus Group
15.4.2022
According to the U.S. Treasury and the Office of Foreign Assets Control (OFAC), the recent Ronin bridge hack may have been tied to the North Korean hacker syndicate called Lazarus Group. Federal law enforcement officials have tied the flagged ethereum address connected with the Ronin bridge exploit...
Report: Microsoft, Nvidia, Ubisoft Hacked By Suspected Teenagers
24.3.2022
Over the past month a number of the world’s biggest tech companies have been hacked by a group known as Lapsus$, including Microsoft, Nvidia, Ubisoft, Samsung and Okta. These haven’t been minor breaches, either; Nvidia lost sensitive GPU designs, and Microsoft gigabytes of important source code....
Truth or fiction? Popular former hacker claims to have $7B in BTC
16.3.2022
“I’m quite wealthy. Yeah, I do not have to work if I don’t choose to. I have over seven billion dollars worth of Bitcoin,” stated the hacker known as Gummo
Elden Ring Hacker Wants Devs To Put A Stop To His Killing Spree
11.3.2022
Elden Ring has been hacked. Maybe that comes as no surprise, considering Souls games often have copious issues with game-breaking exploits. But this is no ordinary hack. No, Elden Ring is just the latest FromSoft game to be targeted by a notorious Souls hacker with a particular penchant...
Attacker Hacks Arbitrum’s Treasure DAO for Over 100 NFTs by Leveraging Marketplace Exploit
4.3.2022
A non-fungible token market platform built on top of Arbitrum called Treasure DAO was hacked on March 3 at 7:33 a.m. (EST), according to a post mortem analysis authored by the security-focused firm Certik. The company’s report notes that “over 100 NFTs were stolen in...
De-Mixing Wasabi Coinjoin Transactions: A Deep Dive Into Chainalysis’ Deanonymizing Claims
23.2.2022
On Tuesday, journalist Laura Shin published a story that claims to identify the 2016 Genesis DAO hacker who siphoned 3.6 million ethereum from the decentralized autonomous organization. While the story surprised the crypto community, one of the biggest eye-openers was the blockchain analysis...
Journalist Claims She Identified the 2016 DAO Hacker, Evidence Shows Investigators ‘De-Mixed’ Wasabi Transactions
22.2.2022
An article published by journalist Laura Shin, and research stemming from the blockchain surveillance firm Chainalysis, claims to identify the alleged identity of The DAO hacker who drained millions of dollars worth of ethereum from the decentralized autonomous organization on June 17, 2016....
Cydia Dev Discloses Ethereum L2 Bug — Optimism Attacker Could Have ‘Printed an Arbitrary Quantity of Tokens’
13.2.2022
On February 10, the well-known developer of Cydia and iOS Jailbreak, Jay Freeman, otherwise known as Saurik, published a Twitter thread about a bug he found in the Layer-2 (L2) scaling protocol known as Optimism. According to Freeman, the vulnerability, which has been patched, could have allowed...
iOS jailbreak dev wins $2M bounty for finding critical Optimism bug
11.2.2022
Ethereum scaling startup Optimism disclosed a “critical bug” fix in the project’s Geth fork that would have allowed malicious hackers to create infinite ETH
Jump Crypto Replaces $320 Million in Ethereum Taken From Wormhole Exploit
4.2.2022
On February 2, 2022, the Wormhole Network’s ethereum ↔ solana bridge was exploited for 120,000 WETH (wrapped ethereum) worth $320 million and the following day, the team explained that “all funds have been restored and Wormhole is back up.” The team has also said...
Wormhole Network’s Cross-Chain Bridge Exploited for Over $250 Million in Ethereum
3.2.2022
Reports indicate that the Wormhole Network’s ethereum ↔ solana bi-directional bridge has been exploited by an attacker for 93,750 ether or more than $250 million using today’s ethereum exchange rates. The developers behind the Wormhole Network have told the public the network...
Hacker Siphons $80 Million From Qubit Cross-Chain Bridge, Largest Defi Exploit of 2022 to Date
28.1.2022
Findings stemming from a recent report published by the security-focused blockchain firm Certik indicate that the Binance smart chain ↔ Ethereum bridge called Qubit has been hacked for $80 million. Data shows on January 27, 2022, an attacker siphoned a number of tokens from an exploit...
Engineer hacks Trezor wallet, recovers $2M in 'lost' crypto
26.1.2022
Hacker helps Trezor One owner who forgot his wallet passcode and seed phrase to recover cryptocurrency funds valued over $2 million
Multichain hacker returns 322 ETH, keeps hefty finders fee
21.1.2022
Owing to a security vulnerability in six tokens, Multichain users lost more than $3M over the week. A white hat hacker returned 322 ETH, but in excess of 527 ETH is still exploited
Polygon upgrade quietly fixes bug that put $24B of MATIC at risk
30.12.2021
“Considering how much was at stake, I believe our team has made the best decisions possible given the circumstances,” said Polygon’s co-founder Jaynti Kanani
Hackers Appear One Step Closer To Jailbreaking The PS5
8.11.2021
The PlayStation 5 only launched a year ago this week, but already hackers appear to have made massive breakthroughs in potentially jailbreaking the latest Sony console. Both theFlow0 and Fail0verflow posted screenshots on Twitter over the weekend indicating they managed to unlock the PS5’s debug...
Immunefi to bolster DeFi security service with new funds
26.10.2021
The platform has paid out more than $7.5 million in bug bounties since inception in December 2020
DeFi security project 'Lossless' helps recover $16.7M from Cream Finance hack
4.10.2021
Lossless also plans to ship a security tool that will reportedly aid DeFi projects in preventing hacks and exploits on their platforms
White hat hacker paid DeFi’s largest reported bounty fee
30.9.2021
Cointelegraph spoke to the hacker for insights on the timeline of events, as well as the wider implications of bounty programs on DeFi's security landscape