Open-Source Trading System Leaks User Private Keys and Exchange API Credentials
The compromise of an open-source trading system's integrity has exposed private keys and exchange API credentials, enabling total asset loss.
Cryptographically Enforced Governance Bridges On-Chain Policy and Off-Chain Execution
A zero-trust framework leverages on-chain governance to cryptographically enforce authorized code versions within Trusted Execution Environments, securing decentralized application lifecycles.
Formal Verification Ensures Smart Contract Integrity and Eliminates Critical Vulnerabilities
Formal verification mathematically proves smart contract correctness, fundamentally preventing catastrophic code flaws and securing decentralized applications.
JavaScript Supply Chain Attack Threatens DeFi Ecosystem
A compromised JavaScript package, widely integrated across DeFi, enables transaction hijacking, posing a systemic risk to user funds and operational integrity.
Crypto Developers Targeted by Supply Chain Malware via Ethereum Smart Contracts
Exploiting open-source dependencies and blockchain for covert malware delivery represents an advanced supply chain vector, directly compromising developer environments and digital assets.
NPM Package Compromise Redirects Cryptocurrency Transactions via Phishing Attack
A supply chain compromise of critical npm packages, initiated by a phishing attack, injects malicious code to siphon browser-based cryptocurrency transactions.
Automated Formal Verification Secures Stellar DeFi Lending Protocols
A new automated formal verification tool, Certora Sunbeam Prover, mathematically guarantees the security of Stellar's Soroban smart contracts, mitigating critical DeFi vulnerabilities.
JavaScript Supply Chain Attack Threatens DeFi Wallet Transactions
A phishing-induced compromise of widely used JavaScript packages exposes a critical supply chain vulnerability, allowing attackers to hijack crypto transactions.
NPM Developer Credentials Compromised, Enabling Widespread Cryptocurrency Drainer Injection
A phishing attack compromised developer credentials, allowing malicious code injection into widely used JavaScript packages, covertly draining cryptocurrency during user interactions.
