• Home
  • SECURITY AUDIT
    • DApp Audit
    • DeFi Audit
    • Token Audit
    • NFT Audit
  • SMART CONTRACT AUDIT
    • Celo Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • Arbitrum Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Solana Audit
    • Aurora Audit
    • Optimism Audit
    • Near Audit
    • BSC Audit
  • Request Quote
  • Blog
  • Contact Us
ImmuneBytes
keep your memories alive
  • Crypto Hacks & ExploitsWeb3 Security

    Stake.com Exploit—Sep 4, 2023—Detailed Hack Analysis

    by ImmuneBytes September 2, 2023
    by ImmuneBytes September 2, 2023

    Introduction Date of Hack: September 4th, 2023Entities Involved: Stake.com, Potential North Korea-affiliated HackersAmount Lost: $41 MillionKey Vulnerability: Suspected Compromise of Stake’s Hot Wallet Private Keys The following report provides an …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsWeb3 Security

    Mixin Network Security Breach—Sep 23, 2023—Detailed Analysis

    by ImmuneBytes September 1, 2023
    by ImmuneBytes September 1, 2023

    Overview Mixin Network, a blockchain-based peer-to-peer network for digital assets, experienced a significant security breach on September 23, 2023. The hack resulted in a loss of approximately $200 million, with …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks DirectoryWeb3 Security

    List of Crypto Hacks in the Month of September

    by ImmuneBytes September 1, 2023
    by ImmuneBytes September 1, 2023

    Sep 1 On 1 Sept 2022, @KyberNetwork faced a breach, compromising UI due to an ex-employee’s compromised Cloudflare account. Attackers exploited this to display deceptive “Increase Allowance” prompts, affecting two …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsNFTWeb3 Security

    API Exploits: A Common Attack in NFT Marketplaces

    by ImmuneBytes September 1, 2023
    by ImmuneBytes September 1, 2023

    Overview In the context of NFTs, an API is defined as a set of rules and protocols that allow software applications, including websites and mobile apps, to interact with and …

    0 FacebookTwitterPinterestEmail
  • CryptoCrypto Hacks & ExploitsNFTWeb3 Security

    Token ID Spoofing Attack on NFTs

    by ImmuneBytes August 31, 2023
    by ImmuneBytes August 31, 2023

    Introduction Non-fungible tokens (NFTs) have exploded in popularity, offering unique digital ownership on blockchain platforms. While NFTs introduce a revolutionary way of ascertaining digital ownership, they also bring in potential …

    0 FacebookTwitterPinterestEmail
  • Smart Contract AuditWeb3 Security

    Zero-Value Token Transfer Phishing Attack

    by ImmuneBytes August 31, 2023
    by ImmuneBytes August 31, 2023

    Introduction In the evolving landscape of blockchain and cryptocurrency, new attack vectors and scams continue to emerge, targeting unaware users. One of the recent scams is the “Zero-Value Token Transfer …

    0 FacebookTwitterPinterestEmail
  • BlockchainSmart Contract AuditWeb3 Security

    DoS with Unexpected Revert

    by ImmuneBytes August 31, 2023
    by ImmuneBytes August 31, 2023

    Introduction Denial of Service (DoS) attacks are not just limited to conventional web servers; they can also be executed against blockchain smart contracts. One such attack vector in the Solidity …

    0 FacebookTwitterPinterestEmail
  • Smart Contract AuditWeb3 Security

    Time-Dependent Function Manipulation in Solidity Smart Contracts

    by ImmuneBytes August 31, 2023
    by ImmuneBytes August 31, 2023

    The Vulnerability Smart contracts on Ethereum often have time-sensitive logic, whether it’s for auctions, lotteries, or token vesting. These time-sensitive functionalities commonly depend on the block.timestamp for execution. The problem …

    0 FacebookTwitterPinterestEmail
  • BlockchainWeb3 Security

    Time Jacking in Mining Pools

    by ImmuneBytes August 29, 2023
    by ImmuneBytes August 29, 2023

    Overview Time jacking exploits a theoretical vulnerability in Bitcoin timestamp handling. During a time-jacking attack, a hacker alters the network time counter of a node on the blockchain network and …

    0 FacebookTwitterPinterestEmail
  • Smart Contract AuditWeb3 Security

    Arithmetic Issues in Solidity Smart Contracts

    by ImmuneBytes August 29, 2023
    by ImmuneBytes August 29, 2023

    Introduction Arithmetic issues, specifically integer overflow and underflow, are common vulnerabilities in Solidity smart contracts. These issues occur when unsigned integers exceed their maximum value or go below their minimum …

    0 FacebookTwitterPinterestEmail
    1. «
    2. 1
    3. ...
    4. 7
    5. 8
    6. 9
    7. 10
    8. 11
    9. 12
    10. 13
    11. ...
    12. 41
    13. »
Newer Posts
Older Posts

Categories

  • Blockchain
  • Crypto
  • Crypto Hacks & Exploits
  • Crypto Hacks Directory
  • Crypto Regulations
  • DeFi
  • News
  • NFT
  • Penetration Testing
  • Smart Contract Audit
  • Tools
  • Web3 Security
  • SMART CONTRACT AUDIT
    • DeFi Audit
    • Token Audit
    • DApp Audit
    • NFT Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Arbitrum Audit
    • Solana Audit
    • Aurora Audit
    • Celo Audit
    • Near Audit
    • BSC Audit
    • Optimism Audit
    • Solidity Audit
    • Rust Audit
    • Teal Audit
    • Haskell Audit
  • Privacy Policy
  • Disclaimer
  • Help
  • SERVICES
  • SMART CONTRACT AUDIT
  • BLOCKCHAIN SECURITY SERVICES
  • PENETRATION TESTING
  • WEB3 SECURITY CONSULTING
  • DIGITAL ASSET SECURITY
  • Facebook
  • Twitter

@2021 - All Right Reserved. Designed and Developed by PenciDesign


Back To Top
ImmuneBytes
  • Home
  • SECURITY AUDIT
    • DApp Audit
    • DeFi Audit
    • Token Audit
    • NFT Audit
  • SMART CONTRACT AUDIT
    • Celo Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • Arbitrum Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Solana Audit
    • Aurora Audit
    • Optimism Audit
    • Near Audit
    • BSC Audit
  • Request Quote
  • Blog
  • Contact Us