Compromising a business supply chain is a key goal for cyber attackers, because by gaining access to a company that provides software or services to many other companies, it's possible to find a ...
The industry appears to have been spared from potentially massive impacts of the open-source attack, after the insertion of a backdoor by a project maintainer was quickly caught by a Microsoft ...
Gnosis Chain executed, on December 22, a governance-approved hard fork to recover around $9.4 million of the frozen funds from the Balancer hack. Passed one day of the execution, the Gnosis official ...
The insertion of a backdoor into code used by most Linux distributions was discovered and fixed ‘before it posed a significant risk to the broader Linux community,’ says Red Hat’s Vincent Danen. The ...
Smart contract audits secure blockchain code but do not stop off-chain attacks. Hackers exploit weak points in APIs, wallets ...
Solana has become one of the fastest-growing smart contract blockchain networks since it was first officially launched in March 2020. The total value locked (TVL) on decentralized finance (DeFi) ...