Bitcoin Mining Pool Suffers Private Key Deduction via Weak Entropy Flaw
A weak pseudorandom number generator in a third-party tool allowed private key derivation, compromising a massive Bitcoin treasury.
Mining Pool Hot Wallets Drained Exploiting Weak Cryptographic Key Generation
A critical failure in a 32-bit pseudo-random key generation algorithm enabled the brute-force compromise of over 5,000 high-value Bitcoin hot wallets.
Eclair Lightning Network Funds at Risk from Old Commitment Transaction Exploit
A critical flaw in older Eclair versions enables attackers to broadcast stale commitment transactions, risking full channel fund theft.
