Chrome V8 Engine Flaw Exposes Crypto Wallets to Private Key Theft
A critical Type Confusion vulnerability in Chromium's V8 JavaScript engine enables remote code execution, directly threatening digital asset private keys and facilitating wallet drains.
Algebraic Verifiable Delay Functions Vulnerable to Parallel Computation
Cryptanalysis reveals fundamental flaws in algebraic Verifiable Delay Functions, demonstrating parallel computation can bypass intended sequential delays, necessitating new secure designs.
GMX V1 Suffers $42 Million Reentrancy Exploit on Arbitrum
A reentrancy vulnerability, introduced during a prior patch, allowed an attacker to manipulate price oracle logic and drain $42 million from GMX V1 liquidity pools.
Bedrock uniBTC Suffers $2 Million Exploit via Faulty Minting Logic
A critical minting logic flaw allowed attackers to exploit disparate asset valuations, compromising Bedrock's uniBTC collateral.
UXLINK Multi-Signature Wallet Compromised, $11.3 Million Drained, Tokens Minted
A `delegateCall` vulnerability in UXLINK's multi-signature wallet enabled unauthorized administrative control, leading to asset exfiltration and arbitrary token minting, underscoring critical smart contract design and access control failures.
Moby Options Protocol Suffers Private Key Compromise, Millions Lost
A compromised administrative private key enabled unauthorized contract upgrades, leading to significant asset drain and highlighting critical key management failures.
Nemo Protocol Suffers $2.59 Million Exploit Due to Unaudited Code
A critical vulnerability stemming from unaudited code and single-signature deployment enabled a $2.59 million state manipulation attack on the Sui-based Nemo Protocol.
JavaScript Supply Chain Attack Threatens DeFi Ecosystem
A compromised JavaScript package, widely integrated across DeFi, enables transaction hijacking, posing a systemic risk to user funds and operational integrity.
ALEX Protocol Suffers $16.18 Million Access Control Exploit on Stacks
A critical access control vulnerability allowed an attacker to manipulate token transfer logic, leading to a significant loss of digital assets.
