The latest release of Echidna, version 2.2.4, brings a host of improvements in fuzzing speed and user experience, promising a more efficient and enjoyable tool for developers. This update introduces
Read MoreIn a devastating blow to the Indian cryptocurrency landscape, WazirX, one of the country’s largest crypto exchanges, has suffered a massive security breach resulting in the loss of approximately $235
Read MoreFractal ID, a blockchain identity platform, disclosed a data breach that occurred on July 14. According to a notice on Fractal’s website, the breach involved an attacker gaining access to
Read MoreIn a recent social media post, blockchain investigator ZachXBT suggested that the North Korea-backed Lazarus Group orchestrated the $305 million hack of the Japan-based DMM Bitcoin exchange. ZachXBT pointed out
Read MoreThe Cyvers platform identified multiple suspicious transactions involving Dough Finance. They promptly reached out to the lending protocol Aave to assess any potential impact on its pools. Fortunately, Aave confirmed
Read MoreDeFi platform Compound Finance has confirmed a significant security breach that has compromised its official website. The protocol’s domain has been hijacked and is currently hosting a phishing site, posing
Read MoreSolana security researchers and developers are being offered a substantial incentive to enhance the security and performance of the blockchain’s highly anticipated new validator client, “Firedancer.” Starting Wednesday, July 10,
Read MoreLast week, a hacker group known as ShinyHunters claimed to have stolen 33 million phone numbers from U.S. messaging giant Twilio. On Tuesday, Twilio confirmed that “threat actors” had successfully
Read MoreBittensor, a decentralized AI network, has paused blockchain transactions after users’ wallets were compromised, resulting in the loss of $8 million worth of assets. Earlier today, blockchain investigator ZachXBT informed
Read MoreThe article presents a list of ERC-20 integration issues that either arise from tokens not fully following the ERC-20 standard or implementing uncommon behaviors that might lead to security vulnerabilities.
Read More