North Korean Hackers Use BeaverTail Malware to Steal Crypto Data
TLDR North Korean hackers are targeting non-developer job applicants in the cryptocurrency sector. The attackers use BeaverTail an...
Quantum Computing’s Threat on Bitcoin is Inevitable: What To Expect and How To P...
Quantum computers are capable of breaking the mathematical difficulty underlying cryptography, making this one of the biggest thre...
NGP Protocol Exploit on BNB Chain Drains $2M, Price Collapses as Funds Move Thro...
TLDR: NGP protocol exploited on BNB Chain, $2M drained via price oracle manipulation and flash loan attack. Attacker bypassed buy...
Ledger Says Tangem Cards Can Be Brute-Forced Faster, Wallet Maker Disagrees
TLDR: Ledger Donjon researchers revealed Tangem cards allow unlimited PIN guesses using a tearing attack technique. The flaw bypas...
Binance’s CZ Warns Crypto Firms About North Korean Hacker Tactics
TLDR: Binance’s CZ warned that North Korean hackers pose as job candidates and recruiters to breach crypto company networks. Hacke...
Israel Freezes $1.5M in USDT After Blacklisting 187 Iran-Linked Crypto Wallets
TLDR: NBCTF named 187 crypto wallets tied to IRGC, holding $1.5B in USDT, in its latest seizure order. Tether blacklisted 39 of th...
Monero Suffers Deepest-Ever Blockchain Reorganization, Invalidating 118 Transact...
The reorganization was pinned on Qubic, which has acquired over half of Monero's mining power last month and uses XMR rewards to b...
SHIB Updates on Shibarium Bridge Exploit, Validator Key Lockdown Underway
TLDR: The Shibarium tracker used bridge funds to acquire 4.6M BONE and briefly gain validator control before chain security was lo...
Kame Aggregator on Sei Hit by $1M Exploit, Hacker Returns 185 ETH
TLDR: Kame Aggregator exploit drained over $1M from Sei users by abusing unlimited token approvals on connected wallets. Users wer...
Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know
TLDR: Hackers trick users with fake podcast invites before requesting screen control through Microsoft Teams. Once granted, attack...