Multi-Sig Wallet Compromised by Sophisticated Phishing Attack
Attackers bypassed security through a meticulously crafted fake contract, enabling illicit fund transfers.
LLMs Automate Smart Contract Formal Verification Property Generation
A novel system leverages large language models and retrieval-augmented generation to automate smart contract property creation, enhancing security and accessibility.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Formalizing Maximal Extractable Value for Robust Blockchain Security
This research establishes a rigorous theoretical framework for Maximal Extractable Value (MEV), enabling systematic analysis and the development of provably secure blockchain protocols.
Shibarium Bridge Drained by Flash Loan and Validator Key Exploit
A sophisticated flash loan attack exploited Shibarium's validator key management, compromising network consensus and enabling significant asset exfiltration.
SEC and CFTC Clarify Spot Crypto Trading for Regulated Exchanges
The joint regulatory clarification enables federally registered exchanges to integrate spot crypto markets, fundamentally altering US digital asset market structure.
Venus Protocol Recovers $13.5 Million from Lazarus Group Phishing Attack
A targeted phishing exploit against a high-value user's delegated account control enabled asset drain, underscoring critical off-chain vulnerability.
ALEX Protocol Suffers $8.3 Million Exploit via Self-Listing Logic Vulnerability
A critical flaw in self-listing verification logic enabled malicious token manipulation, bypassing controls to drain liquidity pools.
New Gold Protocol Suffers $2 Million Price Oracle Manipulation Exploit
A critical vulnerability in NGP's single-source price oracle allowed flash loan manipulation, enabling the illicit draining of $2 million and an 88% token value collapse.
Onyx Protocol NFT Liquidation Contract Exploited, Draining $3.8 Million
A critical flaw in Onyx Protocol's NFT liquidation contract enabled vUSD stablecoin draining, highlighting risks in complex DeFi contract interactions.
Shibarium Bridge Compromised via Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's cross-chain bridge allowed an attacker to manipulate governance tokens and seize validator control, leading to a multi-million dollar asset drain.
Formalizing Maximal Extractable Value for Provable Blockchain Security
This research establishes a rigorous, abstract model of MEV to enable formal security proofs against economic attacks in decentralized systems.
Onyx Protocol Suffers $3.8 Million Exploit via NFT Liquidation Contract
A critical flaw in Onyx Protocol's NFT liquidation contract enabled an attacker to drain $3.8 million, compromising stablecoin peg integrity.
Shibarium Bridge Compromised by Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's validator consensus, leveraged by a flash loan, enabled unauthorized asset exfiltration, posing systemic risk to cross-chain bridges.
Formal Verification Secures Stellar DeFi Lending Protocols
A novel formal verification tool, Certora Sunbeam Prover, mathematically guarantees the integrity of Stellar-based DeFi smart contracts, preventing catastrophic financial exploits.
BNB Reaches New All-Time High, Surpassing $1,080
BNB has achieved a new record high, pushing its market capitalization past major global companies and signaling robust investor confidence.
New Gold Protocol Drained by Flash Loan Oracle Manipulation
Single-source oracle reliance in DeFi protocols creates critical price manipulation vectors, exposing users to immediate asset devaluation and loss.
Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudited Code
A critical lapse in code review and governance allowed a developer to deploy unaudited smart contracts, creating an exploitable vector for significant asset drain.
Zero-Knowledge Mechanisms: Commitment without Disclosure
A novel framework leverages zero-knowledge proofs to enable verifiable, private execution of economic mechanisms without revealing their underlying rules or requiring trusted intermediaries.
SEC Approves Generic Digital Asset ETP Listing Standards
This SEC action streamlines digital asset ETP listings, mandating compliance frameworks adapt to new operational efficiencies and enhanced investor protections.
OWASP Identifies Top 10 Smart Contract Vulnerabilities for 2025
The OWASP Smart Contract Top 10 for 2025 highlights persistent architectural flaws, posing systemic risk to decentralized finance protocols and user assets.
Bedrock uniBTC Minting Logic Flaw Drains $2 Million in DeFi Exploit
A critical logic flaw in the uniBTC minting mechanism allowed attackers to exploit disparate asset valuations, leading to a significant capital drain.
Nemo Protocol Suffers $2.59 Million Exploit Due to Unaudited Code
A critical vulnerability stemming from unaudited code and single-signature deployment enabled a $2.59 million state manipulation attack on the Sui-based Nemo Protocol.
UXLINK Multi-Signature Wallet Compromised, $11.3 Million Drained, Tokens Minted
A `delegateCall` vulnerability in UXLINK's multi-signature wallet enabled unauthorized administrative control, leading to asset exfiltration and arbitrary token minting, underscoring critical smart contract design and access control failures.
Bedrock uniBTC Suffers $2 Million Exploit via Faulty Minting Logic
A critical minting logic flaw allowed attackers to exploit disparate asset valuations, compromising Bedrock's uniBTC collateral.
UXLINK Exploiter Loses $48 Million to Sophisticated Phishing Attack
A malicious `increaseAllowance` signature allowed a phishing group to drain $48 million from a prior UXLINK exploiter, underscoring persistent social engineering risks.
Bedrock uniBTC Minting Logic Flaw Drains $2 Million
A critical minting logic vulnerability in Bedrock's uniBTC token allowed attackers to exploit a price discrepancy, leading to a $2 million loss.
Onyx Protocol NFT Liquidation Contract Exploited, $3.8 Million Drained
A critical vulnerability within Onyx Protocol's NFT Liquidation contract allowed an attacker to drain $3.8 million in vUSD stablecoins.
Resupply Lending Protocol Exploited via ERC4626 Vault Exchange Rate Manipulation
A critical flaw in a newly deployed ERC4626 vault's exchange rate calculation allowed an attacker to drain $9.8 million by manipulating perceived collateral value.
