Bitcoin Hyper Launches Layer 2 Solution Enhancing Bitcoin DeFi
Bitcoin Hyper introduces a Solana SVM-powered Layer 2, bringing smart contract functionality and rapid DeFi capabilities to Bitcoin, addressing core scalability limitations.
Shibarium Bridge Compromised via Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's Layer 2 bridge allowed attackers to exploit governance token mechanics, enabling unauthorized validator control and asset exfiltration.
Base Unveils Open-Source Bridge for Solana Interoperability
This architectural enhancement establishes direct asset flow between Base and Solana, fostering a unified multi-chain liquidity environment.
Shibarium Bridge Suffers Flash Loan Validator Key Compromise
A flash loan attack manipulated Shibarium's validator consensus, enabling unauthorized asset siphoning and exposing critical governance vulnerabilities.
Shibarium Bridge Compromised via Validator Key Exploitation and Flash Loan
A sophisticated flash loan attack on Shibarium's bridge exploited validator key control, enabling the illicit drainage of multi-million dollar assets.
Shibarium Bridge Compromised through Validator Key Theft
A sophisticated flash loan attack leveraged compromised validator keys, enabling unauthorized control over the bridge and draining substantial digital assets.
Shibarium Bridge Compromised by Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's validator key management allowed a flash loan attack to drain $2.4 million, exposing systemic bridge risks.
Nemo Protocol Developer Deployed Unaudited Code, Enabling $2.6m Exploit
An unaudited code deployment enabled a flash loan and state manipulation attack, compromising Nemo Protocol and jeopardizing user assets.
Base L2 Integrates Solana Bridge and Explores Network Token
Base expands its architectural footprint, enabling seamless cross-chain asset flow and advancing toward a foundational interoperable layer.
Nemo Protocol Suffers $2.59 Million Exploit from Unaudited Code Deployment
A developer's unauthorized deployment of unaudited code introduced critical public functions, enabling direct manipulation of contract state and substantial asset exfiltration.
Nemo Protocol Developer Exploit Enables $2.6 Million Flash Loan Attack
An internal code deployment flaw allowed unauthorized contract state manipulation, exposing user funds to immediate exfiltration.
MetaMask Unveils Dollar-Backed Stablecoin for Seamless Web3 to Real-World Spending
MetaMask's new $mUSD stablecoin, integrated with wallet features and a Mastercard partnership, strategically reduces user friction between on-chain assets and traditional finance.
Shibarium Bridge Exploited via Flash Loan and Validator Key Compromise
A critical vulnerability in Layer 2 bridge architecture, leveraging flash loan mechanics, allowed attackers to seize validator control and drain assets.
Force Bridge Suffers $3.9 Million Private Key Compromise across Chains
Compromised private keys enabled unauthorized privileged function calls, draining multi-chain assets and exposing critical cross-chain bridge vulnerabilities.
Nemo Protocol Hacked via Developer’s Unaudited Code Deployment
A developer's unreviewed code introduced critical flash loan and query function flaws, enabling a $2.6 million state manipulation exploit.
Shibarium Bridge Compromised via Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's cross-chain bridge allowed an attacker to manipulate governance tokens and seize validator control, leading to a multi-million dollar asset drain.
Shibarium Bridge Compromised by Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's validator consensus, leveraged by a flash loan, enabled unauthorized asset exfiltration, posing systemic risk to cross-chain bridges.
Bitcoin Hyper Raises $16.6 Million for Bitcoin Layer 2 with SVM Integration
Bitcoin Hyper's Layer 2, leveraging Solana Virtual Machine, unlocks high-speed DeFi and dApp composability for the Bitcoin ecosystem, addressing core scalability and programmability limitations.
TAC Protocol Bridges Ethereum DeFi to Telegram’s Billion-User Network
TAC Protocol's EVM-compatible mainnet unlocks Ethereum DeFi within Telegram MiniApps, strategically expanding decentralized finance to a vast, untapped user base.
Yala YU Stablecoin Depegs from Unauthorized Minting Exploit
A critical cross-chain bridging vulnerability allowed an attacker to mint unbacked YU tokens, depegging the stablecoin and causing $7.7 million in losses.
Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudited Code
A critical lapse in code review and governance allowed a developer to deploy unaudited smart contracts, creating an exploitable vector for significant asset drain.
Nervos Force Bridge Suffers $3.9 Million Access Control Exploit
A compromised access control mechanism in the Nervos Force Bridge allowed an attacker to drain $3.9 million in cross-chain assets, exposing critical vulnerabilities in bridge security.
Shibarium Bridge Drained by Flash Loan and Validator Key Compromise
A critical flaw in Shibarium's validator key management, exacerbated by flash loan manipulation, enabled a $2.4M cross-chain bridge drain.
Shibarium Bridge Suffers $2.3 Million Validator Compromise
A critical flaw in Shibarium's validation mechanism enabled attackers to compromise validators, facilitating unauthorized fund withdrawals and halting bridge operations.
Shibarium Bridge Compromised, $2.4 Million Drained by Flash Loan Exploit
A critical Layer 2 bridge vulnerability, leveraging flash loans and validator key compromise, enabled attackers to siphon substantial digital assets.
PulseChain Lending Protocol BetterBank Drained by Reward Manipulation
A manipulated reward system allowed attackers to exploit liquidity, compromising user assets in a complex DeFi attack.
Shibarium Bridge Validators Compromised, Millions Drained in Exploit
A critical vulnerability in Shibarium's validator key management enabled attackers to manipulate the bridge, leading to significant asset exfiltration.
D3 Global Launches Doma Protocol, Unlocking DomainFi Potential
D3 Global's Doma Protocol transforms internet domains into liquid, tradable real-world assets, enabling new DeFi primitives for digital real estate.
Yala Protocol Suffers Bridge Exploit via Compromised Deployment Key
An exploited temporary deployment key facilitated an unauthorized cross-chain bridge, leading to the overissuance of tokens and a significant asset drain.