Drift Protocol exploit leads to the attacker converting $280M in assets to $267M Ethereum, impacting Solana's DeFi ecosystem.
Gold, silver fall as investors doubt Trump’s exit plan (The Wall Street Journal): Gold and silver prices swung into the red, ...
In the wake of Claude Code's source code leak, 5 actions enterprise security leaders should take now
Gartner issued a same-day advisory after Anthropic leaked Claude Code's full architecture. CrowdStrike CTO Elia Zaitsev and ...
Solana perp DEX Drift Protocol has suffered an exploit that impacted more than $200 million in funds, with some estimates ...
While DFDV actively allocates a portion of its balance sheet to onchain strategies to generate organic yield, all capital allocation is conducted under a disciplined risk management framework focused ...
Haowi Wong said the dispute escalated after the exploit into continuous attacks and serious allegations from Wang Lei and a community member called “web3feng.” ...
Microsoft revealed that it is developing a data center networking technology using micro LED technology with the potential to reduce energy consumption and improve performance as demand for AI and ...
Starting in June 2025, the attacker quietly accumulated approximately 84% of Venus's THE supply cap (14.5M tokens) over nine months. With virtually no market depth to absorb the sell-off, THE ...
In response to the ongoing warfare in the Persian Gulf precipitated by the US-Israeli attack on Iran, Chinese companies are advertising freight transport from China to Europe through Central Asia and ...
The Google Threat Intelligence Group has revealed alarming details about "Coruna," a sophisticated exploit kit targeting iPhones running outdated versions of iOS. If your iPhone is not yet updated to ...
Google’s Threat Intelligence Group and security company iVerify have shared details about Coruna, an exploit kit that chains multiple vulnerabilities to target iPhones running older iOS versions. Here ...
A powerful iPhone hacking toolkit that researchers say may have originated as a U.S.-built capability has surfaced in the hands of foreign espionage actors and financially motivated criminal groups, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results