Vulnerability
- Exploited
Four.meme Exploit: Attacker Bypasses Transfer Restrictions to Drain Liquidity on PancakeSwap!
A new exploit has rocked PancakeSwap, the largest decentralized exchange (DEX) on the BNB Chain, as an attacker manipulated Four.meme,…
Read More » - Vulnerability
Ledger Helps Hardware Wallet Competitor, Trezor, Fix Security Vulnerability
Hardware wallet provider Ledger recently helped rival firm Trezor identify and resolve a critical vulnerability in its microcontroller’s security. The…
Read More » - News
U.S. Law Enforcement Seizes $31M in Crypto Linked to Uranium Finance Hack.
The US authorities have seized about $31m in cryptocurrency connected to the 2021 Uranium Finance hack, marking a major breakthrough…
Read More » - News
Hacker Discovers Crucial Flaw in $DOGE, Crashes 69% of Network Nodes
On December 12, a known vulnerability, “DogeReaper,” compromised the Dogecoin blockchain, rendering most network nodes inactive. Andreas Kohl, co-founder of…
Read More » - News
Trust Wallet Alert Crypto-lites Of Zero-day Exploits Targeting iOS Users
Trust Wallet sends an alerting announcement on its official X account that iOS users must guard against a zero-day exploit…
Read More » - News
New Attack Offers Hackers Access to Apple User’s Crypto Keys
“GoFetch” is a side-channel attack that targets state-of-the-art Apple CPUs, which puts at risk cryptographic keys in Apple’s M1, M2,…
Read More » - News
Hackers Discover New Way to Deploy Crypto-Siphoning Phemedrone Stealer
Researchers found hackers exploiting a recently patched security vulnerability in Microsoft Windows to deploy an open-source information stealer known as…
Read More » - News
Hackers Breach U.S. Government Systems Through Adobe ColdFusion Vulnerability
The U.S. CISA cautions that threat actors are actively taking advantage of a crucial vulnerability in Adobe ColdFusion to compromise…
Read More » - News
Retool Claims Google Authenticator Sync Feature Enable Hackers Steal $15 million from Fortress Trust
A recent cyberattack targeted 27 cryptocurrency firms and has been attributed to a newly introduced Google Authenticator synchronization feature. The…
Read More » - Explained
Blockchain Exploitable Loopholes That Are Not Perceivable
In recent years blockchain technology has seen sweeping adoptions. Apart from the initial conversion into cryptocurrencies today, healthcare, real estate,…
Read More »