security protocols
-
Understanding the April Crypto Attacks: A closer look at the $103.6 Million Loss
On April 30th, according to CertiK Alert data, the April attacks have caused a total of approximately $103.6 million in losses, including approximately $19.8 million in losses caus
-
How Threshold Network and Imunefi’s New Vulnerability Reward Plan is Ensuring Maximum Security?
According to reports, the privacy protocol Threshold Network has partnered with the vulnerability reward platform Imunefi to launch a new vulnerability reward plan to improve the s
-
FilDA Multi-Chain Lending Agreement Faces Cyber Attack and Losses of $700,000
On April 23, it was reported that FilDA, a multi chain lending agreement, issued a statement on exploit, saying that it had been attacked on the Yilai Cloud intelligent chain (ESC)
-
Asset Allocation and Rebalancing of Hot and Cold Wallets: Ouyi OKX’s Routine Maintenance Update
On April 23rd, it was announced by Ouyi OKX that according to routine maintenance, asset allocation and rebalancing of hot and cold wallets will be carried out within the next 24 h
-
MetaPoint (POT) Project Suffers Major Setback Following Hacker Attacks
According to reports, according to CertiK monitoring, the MetaPoint (POT) project has been suspended from operation due to hacker attacks on its Telegram, and its currency price ha
-
Bitcoin Company Sues Gryphon Digital Mining Over Alleged Fraud Attack
On April 8th, it was reported that Bitcoin mining company Sphere 3D is suing its commercial partner Gryphon Digital Mining, claiming that it lost $500000 in Bitcoin in a fraud atta
-
. bit warns against the risk of using DID for asset trading currently
On April 4th, it was reported that. bit recently discovered and analyzed the security risks associated with asset loss when using DID for asset trading. After recognizing these ser
-
The Mysterious Connection: Euler Finance and Proton Email Address
It is reported that an Euler Finance attacker commented on his Proton email contact address in a recent transaction sent to the Euler team.
Euler attackers send Proton email contac