The third quarter saw the smallest losses from hacks that the industry has seen in the last three years, according to a report by cybersecurity company Hacken. About $460 million was stolen across 28 ...
Cryptopolitan on MSN
Hackers turn to mixers and DeFi as speed of laundering stolen funds doubles
Hackers accelerated the laundering of funds in the second half of 2025, using DeFi protocols and Web3 infrastructure to fragment and disguise their haul. Highly liquid protocols were attacked the most ...
IoTeX was hacked after attackers compromised a private key. Millions in crypto were moved as the team works to contain the incident.
The first half of 2025 has marked a grim milestone for the cryptocurrency industry, with over $2.1 billion stolen across 75 distinct hacks and exploits, according to a recent report by TRM Labs. This ...
ZkLend lost nearly $10 million in an exploit. The protocol offered the hacker a 10% bounty if the remaining funds were returned before Feb. 14. Update (Feb. 12, 11:23 am UTC): This article has been ...
Blockchain security firm CertiK has revealed that $1.67 billion worth of crypto was stolen by hackers in the first quarter of 2025, a 303% rise on the previous quarter. The figure is two thirds of the ...
The world's second-largest crypto exchange Bybit suffered an exploit Friday that saw it drained of about $1.4 billion worth of Ethereum and staked ether. Bybit CEO Ben Zhou immediately shared news of ...
The former boss of the L3Harris-owned hacking and surveillance tools maker Trenchant faces nine years in prison for selling several exploits to a Russian broker, which counts the Russian government ...
Cryptopolitan on MSN
Lending protocols top DeFi hack targets with 67 historical exploits
Lending protocols are some of the most active DeFi apps. Due to the heavy usage of smart contracts, they are also the most at ...
Enterprise cybersecurity tools, such as routers, firewalls, and VPNs, exist to protect corporate networks from intruders and malicious hackers, something that is particularly important in today’s age ...
Serbian law enforcement officials are using a Cellebrite mobile "information extraction" product in tandem with an exploit chain to target dissidents, including most recently the phone of a Serbian ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果