Hack


Finance

DeFi Has Become Crypto Crime’s Main Arena, Crystal Blockchain Says

Hackers and scammers have shifted from breaching centralizing entities to exploiting decentralized projects, according to a new report.

Crypto criminals are increasingly targeting DeFi protocols. (Andrey_Popov/Shutterstock)

Tech

Harmony Proposes Issuing ONE Tokens to Reimburse Victims of $100M Hack

Developers decided against using treasury funds, citing the project’s long-term viability.

(Shutterstock)

Finance

'Cryptojacking' in Financial Sector Has Risen 269% This Year, SonicWall Says

Cyberattacks targeting the finance industry are now five times higher than attacks on retail.

(Boonchai Wedmakawand/Getty Images)

Finance

Another Twitter Hack Hits the NFT Community

An influencer’s Twitter and Discord accounts were compromised on Tuesday in what many fear could be a widening takeover.

(Sara Kurfeß/Unsplash)

Videos

RPT: Axie Infinity’s Ronin Network Hack Started With Fake Job Ad

A fake job ad for Axie Infinity reportedly led to a sophisticated exploit in March that drained $625 million in crypto from the protocol's Ronin network, according to The Block. "The Hash" panel discusses the latest details of one of the largest hacks in DeFi history.

Recent Videos

Tech

Crema Finance Attacker Returns Almost $8M, Keeps $1.7M Bounty

The protocol had more than $9 million worth of cryptocurrencies stolen from its platform over the weekend in a flash loan attack.

(Boonchai Wedmakawand/Getty Images)

Tech

Solana DeFi Protocol Crema Loses $8.8M in Exploit

Crema Finance developers said they are coordinating with “relevant organizations” to gather more information.

Inverse Finance developers paused borrowing functions for users and said they were investigating the incident. (Shutterstock)

Tech

Two Polygon, Fantom Front Ends Hit by DNS Attack

Two gateways provided by Ankr were exploited on Friday, but Polygon said there are no indications any funds were lost.

Two RPC interfaces for Polygon and Fantom were impacted in a DNS hijack attack. (Mika Baumeister/Unsplash)