Ackee is finalizing its ERC-4337 detector to identify prohibited opcode usage and repository access, transforming a very labor-intensive manual review…
Browsing: HACKING NEWS
North Korean hackers are targeting South Korean cryptocurrency companies and distributing ‘Durian’ malware. The resurgence of dormant hackers like Careto…
What are inscriptions, ordinal numbers, runes? We recently shared the story of how the Ordinals protocol was added to the…
Ripple partners with SBI Group and HashKey DX to introduce XRPL solutions to Japan. HashKey DX leverages the power of…
Telos has revealed details of a new partnership with Ponos Technology to develop a hardware-accelerated Ethereum L2 zkEVM network. Plans…
space catchA new AR M2E (Move-to-Earn) game has confirmed its public beta release date. After extensive development, the game will…
Note: Ackee audited previous versions of the protocol before the attacked MimCurveStakeDAO strategy was added. Exploit Causes The exploit consisted…
Ever Steak A trustworthy and responsible validator. 625k+ user over 70 years old A blockchain network created by engineers for…
prime protocol Users can deposit an asset on a supported chain and take out another asset loan backed by the…
Of the 157 protocols listed on Rekt, 92 were hacked due to being unaudited or out of scope, and websites…