User Endpoints Compromised by LeakyInjector LeakyStealer Malware Duo
The LeakyStealer malware family uses low-level API injection via LeakyInjector to bypass detection and systematically drain browser-based crypto wallets.
UPCX Payment Platform Suffers $70 Million Admin Key Compromise
A compromised administrative key allowed an attacker to upgrade a critical smart contract, enabling unauthorized fund withdrawals.