Venus Protocol User Compromised via Phishing, Funds Recovered by Governance
A sophisticated phishing attack targeting a high-value user's delegated account control highlights critical user-side vulnerability in DeFi.
THORChain Founder’s Wallet Drained via Sophisticated Social Engineering Attack
A targeted social engineering exploit, leveraging compromised communication channels, bypassed traditional wallet security, highlighting critical human-factor vulnerabilities.
Venus Protocol User Phished, Funds Recovered via Governance Action
A sophisticated phishing attack on a major user's delegated account control highlights the critical vulnerability of off-chain security practices in DeFi.
Global Phishing-as-a-Service Operation Dismantled, Crypto Payment System Exposed
The takedown of a sophisticated Phishing-as-a-Service platform reveals the critical intersection of traditional credential theft and cryptocurrency-funded cybercrime, posing persistent risks to digital asset security.
Web3 Ecosystem Endures Billions in Losses from Wallet Compromises and Phishing
The pervasive threat of compromised digital asset custody and social engineering tactics continues to erode capital across decentralized finance.
OWASP Updates Smart Contract Vulnerabilities List, Highlighting Access Control Risks
Flawed access controls in smart contracts enable unauthorized function execution, posing a critical systemic risk to digital asset integrity.
Global Phishing-as-a-Service Dismantled, Targeting Microsoft 365 Credentials
Phishing-as-a-Service proliferation enables widespread credential theft, posing immediate risk to user accounts and organizational data.
DeFi Ecosystem Confronts Evolving Smart Contract Vulnerabilities and Systemic Risk
The pervasive reliance on complex smart contract logic and external data feeds introduces critical attack vectors, demanding a paradigm shift in security posture to mitigate multi-billion dollar exposures.
Evolving Crypto Scams Cost Users $25.4 Million in September
Evolving social engineering and technical attack vectors exploit user vigilance and smart contract weaknesses, leading to escalating financial losses.
