4 days ago

North Korean Hackers Use BeaverTail Malware to Steal Crypto Data

TLDR North Korean hackers are targeting non-developer job applicants in the cryptocurrency sector. The attackers use BeaverTail an...

1 week ago

Quantum Computing’s Threat on Bitcoin is Inevitable: What To Expect and How To P...

Quantum computers are capable of breaking the mathematical difficulty underlying cryptography, making this one of the biggest thre...

1 week ago

NGP Protocol Exploit on BNB Chain Drains $2M, Price Collapses as Funds Move Thro...

TLDR: NGP protocol exploited on BNB Chain, $2M drained via price oracle manipulation and flash loan attack. Attacker bypassed buy...

1 week ago

Ledger Says Tangem Cards Can Be Brute-Forced Faster, Wallet Maker Disagrees

TLDR: Ledger Donjon researchers revealed Tangem cards allow unlimited PIN guesses using a tearing attack technique. The flaw bypas...

1 week ago

Binance’s CZ Warns Crypto Firms About North Korean Hacker Tactics

TLDR: Binance’s CZ warned that North Korean hackers pose as job candidates and recruiters to breach crypto company networks. Hacke...

1 week ago

Israel Freezes $1.5M in USDT After Blacklisting 187 Iran-Linked Crypto Wallets

TLDR: NBCTF named 187 crypto wallets tied to IRGC, holding $1.5B in USDT, in its latest seizure order. Tether blacklisted 39 of th...

1 week ago

Monero Suffers Deepest-Ever Blockchain Reorganization, Invalidating 118 Transact...

The reorganization was pinned on Qubic, which has acquired over half of Monero's mining power last month and uses XMR rewards to b...

1 week ago

SHIB Updates on Shibarium Bridge Exploit, Validator Key Lockdown Underway

TLDR: The Shibarium tracker used bridge funds to acquire 4.6M BONE and briefly gain validator control before chain security was lo...

1 week ago

Kame Aggregator on Sei Hit by $1M Exploit, Hacker Returns 185 ETH

TLDR: Kame Aggregator exploit drained over $1M from Sei users by abusing unlimited token approvals on connected wallets. Users wer...

1 week ago

Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know

TLDR: Hackers trick users with fake podcast invites before requesting screen control through Microsoft Teams. Once granted, attack...