Bitcoin Hyper Raises $16.6 Million for Bitcoin Layer 2 with SVM Integration
Bitcoin Hyper's Layer 2, leveraging Solana Virtual Machine, unlocks high-speed DeFi and dApp composability for the Bitcoin ecosystem, addressing core scalability and programmability limitations.
Shibarium Bridge Compromised by Flash Loan and Validator Key Manipulation
A critical vulnerability in Shibarium's validator consensus, leveraged by a flash loan, enabled unauthorized asset exfiltration, posing systemic risk to cross-chain bridges.
Shibarium Bridge Compromised via Flash Loan and Validator Key Exploit
A critical vulnerability in Shibarium's cross-chain bridge allowed an attacker to manipulate governance tokens and seize validator control, leading to a multi-million dollar asset drain.
Nemo Protocol Hacked via Developer’s Unaudited Code Deployment
A developer's unreviewed code introduced critical flash loan and query function flaws, enabling a $2.6 million state manipulation exploit.
Force Bridge Suffers $3.9 Million Private Key Compromise across Chains
Compromised private keys enabled unauthorized privileged function calls, draining multi-chain assets and exposing critical cross-chain bridge vulnerabilities.
Shibarium Bridge Exploited via Flash Loan and Validator Key Compromise
A critical vulnerability in Layer 2 bridge architecture, leveraging flash loan mechanics, allowed attackers to seize validator control and drain assets.
MetaMask Unveils Dollar-Backed Stablecoin for Seamless Web3 to Real-World Spending
MetaMask's new $mUSD stablecoin, integrated with wallet features and a Mastercard partnership, strategically reduces user friction between on-chain assets and traditional finance.
Nemo Protocol Developer Exploit Enables $2.6 Million Flash Loan Attack
An internal code deployment flaw allowed unauthorized contract state manipulation, exposing user funds to immediate exfiltration.
Nemo Protocol Suffers $2.59 Million Exploit from Unaudited Code Deployment
A developer's unauthorized deployment of unaudited code introduced critical public functions, enabling direct manipulation of contract state and substantial asset exfiltration.
