User Endpoints Compromised by LeakyInjector LeakyStealer Malware Duo
The LeakyStealer malware family uses low-level API injection via LeakyInjector to bypass detection and systematically drain browser-based crypto wallets.
MetaMask Plans Token Launch and Perpetual Trading for Users
MetaMask is evolving beyond a simple wallet, launching a rewards program and its own token, alongside mobile perpetuals trading, signaling a major shift towards a community-driven DeFi ecosystem.
Unity Gaming Flaw Threatens Mobile Crypto Wallets
A newly identified vulnerability in the Unity game engine could allow malicious code to compromise mobile crypto wallets, urging immediate user action.
Chrome V8 Engine Flaw Enables Crypto Wallet Drains
A critical type confusion vulnerability in Chrome's V8 engine permits arbitrary code execution, directly exposing user crypto assets to theft.
Supply Chain Attack Poisons JavaScript Packages, Threatening Crypto Wallets
A phishing compromise of critical JavaScript package maintainers exposed DeFi to widespread transaction redirection, highlighting systemic supply chain vulnerabilities.
