Cork Protocol Suffers $12m Exploit via Uniswap V4 Hook Manipulation
A sophisticated economic-logic exploit in Cork Protocol's Uniswap V4 hook bypassed access controls, enabling unauthorized token issuance and draining $12.1M in assets.
Nervos Force Bridge Suffers $3.9 Million Access Control Exploit
A compromised access control mechanism in the Nervos Force Bridge allowed an attacker to drain $3.9 million in cross-chain assets, exposing critical vulnerabilities in bridge security.
Moby Trade Suffers Private Key Compromise, $2.5 Million Drained
A compromised administrative private key enabled unauthorized contract upgrades, exposing user funds to direct exfiltration.
UPCX Platform Suffers $70 Million Private Key Compromise and Contract Upgrade Exploit
A compromised administrative private key enabled a malicious smart contract upgrade, allowing an attacker to drain $70 million from the UPCX payment platform.
KiloEx Loses $7.5 Million to Price Oracle Manipulation Exploit
A critical missing access control check in KiloEx's MinimalForwarder contract allowed attackers to manipulate price oracles, draining $7.5M.
Phemex Hot Wallets Compromised, $85 Million in Crypto Drained
A breach of Phemex's hot wallets, likely through compromised private keys, allowed threat actors to drain over $85 million, underscoring critical centralized exchange vulnerability.
Decentralized Federated Learning Framework Enhances IoT Privacy and Security
A novel framework integrates DABE, HE, SMPC, and blockchain to secure IoT federated learning, enabling privacy-preserving AI and verifiable data exchange.
DeFi Ecosystem Confronts Evolving Smart Contract Vulnerabilities and Systemic Risk
The pervasive reliance on complex smart contract logic and external data feeds introduces critical attack vectors, demanding a paradigm shift in security posture to mitigate multi-billion dollar exposures.
Zksync Airdrop Contract Admin Key Leak Leads to Unauthorized Minting
A compromised administrative key in a zkSync airdrop contract enabled unauthorized token minting, highlighting critical access control vulnerabilities.
