SwissBorg Solana Staking Exploited via Partner API Compromise

A third-party API compromise allowed unauthorized stake account authority manipulation, exposing on-chain controls and leading to significant asset loss.
Nemo Protocol Developer Exploit Enables $2.6 Million Flash Loan Attack

An internal code deployment flaw allowed unauthorized contract state manipulation, exposing user funds to immediate exfiltration.
Nemo Protocol Suffers $2.6 Million Exploit Due to Unaudi

A developer's unauthorized code deployment and flash loan vulnerability led to a $2.6 million loss, exposing critical internal control failures.
SwissBorg Partner API Exploited for $41 Million Solana Token Theft

An external partner API compromise facilitated unauthorized access to SwissBorg's earnings program, resulting in significant asset exfiltration.
NPM Supply Chain Compromise Threatens JavaScript Crypto Ecosystem

A pervasive supply chain attack on NPM accounts injects malicious code, covertly swapping cryptocurrency addresses during user-approved transactions.
JavaScript Malware Compromises DeFi Wallet Dependencies

A supply chain attack injected crypto-stealing malware into widely used JavaScript packages, exposing DeFi's critical vulnerability to external software dependencies.
Solana Network Extensions Enable Unified Custom Execution Environments

Solana's network extensions introduce bespoke Layer 1 execution environments, preserving unified state and composability while fostering application-specific optimization.
Multi-Signature Wallet Drained by Sophisticated Phishing Attack Leveraging Disguised Approval

A sophisticated phishing campaign exploited the Safe Multi Send mechanism, allowing attackers to siphon $3M by masking malicious approvals.
Multi-Signature Wallet Drained via Sophisticated Phishing Attack

A meticulously crafted phishing campaign exploited multi-signature wallet approval mechanisms, enabling the unauthorized transfer of significant digital assets.
JavaScript Supply Chain Attack Hijacks Crypto Transactions across Chains

Attackers compromise widely used JavaScript packages, replacing legitimate crypto transaction destinations with malicious addresses, posing an immediate threat to asset integrity.