DeFi Lending Protocol Drained by Oracle Price Manipulation and Logic Flaw
A critical failure in oracle input validation and access control logic allowed a multi-stage exploit to drain $50M via collateral manipulation.
User Endpoints Compromised by LeakyInjector LeakyStealer Malware Duo
The LeakyStealer malware family uses low-level API injection via LeakyInjector to bypass detection and systematically drain browser-based crypto wallets.
