Nemo Protocol Suffers $2.59 Million Exploit from Unaudited Code Deployment

A developer's unauthorized deployment of unaudited code introduced critical public functions, enabling direct manipulation of contract state and substantial asset exfiltration.
Base L2 Integrates Solana Bridge and Explores Network Token

Base expands its architectural footprint, enabling seamless cross-chain asset flow and advancing toward a foundational interoperable layer.
Nemo Protocol Developer Deployed Unaudited Code, Enabling $2.6m Exploit

An unaudited code deployment enabled a flash loan and state manipulation attack, compromising Nemo Protocol and jeopardizing user assets.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit

A sophisticated flash loan and validator key compromise on Shibarium Bridge enabled a multi-million dollar asset drain, highlighting critical cross-chain security vulnerabilities.
Shibarium Bridge Compromised through Validator Key Theft

A sophisticated flash loan attack leveraged compromised validator keys, enabling unauthorized control over the bridge and draining substantial digital assets.
Shibarium Bridge Compromised via Validator Key Exploitation and Flash Loan

A sophisticated flash loan attack on Shibarium's bridge exploited validator key control, enabling the illicit drainage of multi-million dollar assets.
Shibarium Bridge Suffers Flash Loan Validator Key Compromise

A flash loan attack manipulated Shibarium's validator consensus, enabling unauthorized asset siphoning and exposing critical governance vulnerabilities.
Base Unveils Open-Source Bridge for Solana Interoperability

This architectural enhancement establishes direct asset flow between Base and Solana, fostering a unified multi-chain liquidity environment.
Bitcoin Hyper Launches Layer 2 Solution Enhancing Bitcoin DeFi

Bitcoin Hyper introduces a Solana SVM-powered Layer 2, bringing smart contract functionality and rapid DeFi capabilities to Bitcoin, addressing core scalability limitations.
Shibarium Bridge Validator Compromise Leads to $2.4 Million Asset Drain

A flash loan attack leveraging validator key control enabled a significant asset drain, underscoring critical cross-chain bridge security vulnerabilities.