Overview A logic bomb is a malicious piece of code or software that is designed to execute a specific set…
-
-
Overview Selfish mining is a strategic attack or mining technique that can be employed by a group of miners in…
-
Crypto Hacks & ExploitsNewsWeb3 Security
FriendTech Wallet Compromised For 22 ETH In A Phishing Scam
by ImmuneBytesA FriendTech user, @yyctrader1, has reportedly lost 22 ETH due to a phishing exploit on his FriendTech wallet. The perpetrator…
-
Overview Stars Arena, a project on the Avalanche blockchain, experienced a significant security breach on October 7, 2023. The hack…
-
Overview The term “PoS timebomb” typically refers to a potential issue or challenge in blockchain networks that use a Proof…
-
Overview A Finney attack is a type of blockchain attack named after its creator, Hal Finney, one of the early…
-
Oct 6 😈On Oct 6, 2022, the $RES Token on the Binance Smart Chain suffered a flash loan attack, leading…
-
Crypto Hacks & ExploitsNewsWeb3 Security
South Korean Crypto Exchange, Upbit Exploited for an Undisclosed Sum
by ImmuneBytesOn Sep 24, Upbit, recognized as the largest cryptocurrency exchange in South Korea was exploited due to a technical glitch…
-
Crypto Hacks & ExploitsNewsWeb3 Security
Another DeFi Exploited: Mixin Network Suffers a $200M Security Breach
by ImmuneBytesThe Hack Mixin Network has been hit bit a massive security breach on Sep 23, 2023. The losses due to…
-
Smart Contract AuditWeb3 Security
Solidity Security Vulnerability: Unchecked Return Values
by ImmuneBytesThe Underlying Issue In Solidity, developers can perform external calls using various methods, like send(), call(), and transfer(). However, each…