Jan 1 😈On Jan 1, 2022, DeFi Tinyman on Alogrand chain lost $3M worth of assets from its contract pools…
-
-
Overview In the context of blockchain and cryptocurrencies, “smurfing” is a term used to describe a tactic employed by individuals…
-
Overview Liquidity pool vulnerabilities refer to weaknesses and risks associated with decentralized finance (DeFi) liquidity pools, which are a crucial…
-
Overview A replay attack is a type of malicious activity where an attacker intercepts and retransmits a valid transaction or…
-
Overview In decentralized finance (DeFi), mirroring attacks refer to a type of exploit or vulnerability that can occur in DeFi…
-
Overview Pump-and-dump schemes in the context of NFTs (Non-Fungible Tokens) operate similarly to traditional pump-and-dump schemes but within the unique…
-
Dec 1 😈On December 1, 2023, the FCN-TRUST (FCN) token On BSC was exploited for over $504k in a flash…
-
Overview Routing attacks are typically associated with blockchain network security and routing protocols used in traditional internet infrastructure. Routing attacks,…
-
Overview A dictionary attack is a type of brute-force attack where an attacker attempts to gain unauthorized access to a…
-
Crypto Hacks & ExploitsWeb3 Security
Time Token Hack—Dec 7, 2023—Detailed Analysis Report
by ImmuneBytesOverview On December 7, a substantial exploit occurred on the TIME token. TIME token serves as the inherent token of…