Multi-Sig Wallet Compromised by Sophisticated Phishing Attack
Attackers bypassed security through a meticulously crafted fake contract, enabling illicit fund transfers.
LLMs Automate Smart Contract Formal Verification Property Generation
A novel system leverages large language models and retrieval-augmented generation to automate smart contract property creation, enhancing security and accessibility.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Formalizing Maximal Extractable Value for Robust Blockchain Security
This research establishes a rigorous theoretical framework for Maximal Extractable Value (MEV), enabling systematic analysis and the development of provably secure blockchain protocols.
Shibarium Bridge Drained by Flash Loan and Validator Key Exploit
A sophisticated flash loan attack exploited Shibarium's validator key management, compromising network consensus and enabling significant asset exfiltration.
SEC and CFTC Clarify Spot Crypto Trading for Regulated Exchanges
The joint regulatory clarification enables federally registered exchanges to integrate spot crypto markets, fundamentally altering US digital asset market structure.
Venus Protocol Recovers $13.5 Million from Lazarus Group Phishing Attack
A targeted phishing exploit against a high-value user's delegated account control enabled asset drain, underscoring critical off-chain vulnerability.
ALEX Protocol Suffers $8.3 Million Exploit via Self-Listing Logic Vulnerability
A critical flaw in self-listing verification logic enabled malicious token manipulation, bypassing controls to drain liquidity pools.
New Gold Protocol Suffers $2 Million Price Oracle Manipulation Exploit
A critical vulnerability in NGP's single-source price oracle allowed flash loan manipulation, enabling the illicit draining of $2 million and an 88% token value collapse.
