• Home
  • SECURITY AUDIT
    • DApp Audit
    • DeFi Audit
    • Token Audit
    • NFT Audit
  • SMART CONTRACT AUDIT
    • Celo Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • Arbitrum Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Solana Audit
    • Aurora Audit
    • Optimism Audit
    • Near Audit
    • BSC Audit
  • Request Quote
  • Blog
  • Contact Us
ImmuneBytes
keep your memories alive
  • Crypto Hacks DirectoryWeb3 Security

    List of Crypto Hacks in the Month of November

    by ImmuneBytes November 1, 2023
    by ImmuneBytes November 1, 2023

    Nov 1 😈On Nov 1, 2023, a fake Fake Celestia (TIA) Token On ETH was rugged for ~$208.1K, where the deployer swapped over 19,453,820,462,357.507 TIA tokens for 115.321 WETH. The …

    0 FacebookTwitterPinterestEmail
  • Smart Contract AuditWeb3 Security

    Precision Loss Vulnerability in Solidity: A Deep Technical Dive

    by ImmuneBytes October 31, 2023
    by ImmuneBytes October 31, 2023

    Solidity, as the cornerstone of Ethereum’s smart contract landscape, has its strengths, but it’s not without its vulnerabilities. Among these vulnerabilities is the risk of precision loss—a subtle but significant …

    0 FacebookTwitterPinterestEmail
  • Web3 Security

    Role of Bots in NFT Market Manipulation

    by ImmuneBytes October 31, 2023
    by ImmuneBytes October 31, 2023

    Introduction The digital realm of NFTs, while promising, is not without its vulnerabilities. Bots, which have long plagued online auctions, have now found a new playground in the NFT marketplaces, …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsWeb3 Security

    Safereum Exit Scam-Oct 23, 2023-Detailed Analysis

    by ImmuneBytes October 25, 2023
    by ImmuneBytes October 25, 2023

    Introduction On October 23, 2023, Safereum experienced a severe rug pull, resulting in a loss of approximately $1.3 million in an exit scam. The externally owned address (EOA) associated with …

    0 FacebookTwitterPinterestEmail
  • BlockchainWeb3 Security

    Logic Bombs in Blockchain Networks

    by ImmuneBytes October 25, 2023
    by ImmuneBytes October 25, 2023

    Overview A logic bomb is a malicious piece of code or software that is designed to execute a specific set of actions when certain conditions are met. In the context …

    0 FacebookTwitterPinterestEmail
  • BlockchainWeb3 Security

    Selfish Mining in PoW Systems

    by ImmuneBytes October 15, 2023
    by ImmuneBytes October 15, 2023

    Overview Selfish mining is a strategic attack or mining technique that can be employed by a group of miners in a blockchain network, particularly in those using Proof of Work …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsNewsWeb3 Security

    FriendTech Wallet Compromised For 22 ETH In A Phishing Scam

    by ImmuneBytes October 10, 2023
    by ImmuneBytes October 10, 2023

    A FriendTech user, @yyctrader1, has reportedly lost 22 ETH due to a phishing exploit on his FriendTech wallet. The perpetrator has successfully moved the stolen assets from #Base to #Ethereum …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsWeb3 Security

    Stars Arena Hack—Oct 7, 2023—Detailed Analysis

    by ImmuneBytes October 9, 2023
    by ImmuneBytes October 9, 2023

    Overview Stars Arena, a project on the Avalanche blockchain, experienced a significant security breach on October 7, 2023. The hack resulted in a substantial loss, approximately $2,974,530, equivalent to 266,103 …

    0 FacebookTwitterPinterestEmail
  • BlockchainWeb3 Security

    The PoS “Timebomb” in Blockchain Networks

    by ImmuneBytes October 5, 2023
    by ImmuneBytes October 5, 2023

    Overview The term “PoS timebomb” typically refers to a potential issue or challenge in blockchain networks that use a Proof of Stake (PoS) consensus mechanism. PoS is an alternative to …

    0 FacebookTwitterPinterestEmail
  • BlockchainWeb3 Security

    Finney Attacks in Cryptocurrency

    by ImmuneBytes October 3, 2023
    by ImmuneBytes October 3, 2023

    Overview A Finney attack is a type of blockchain attack named after its creator, Hal Finney, one of the early contributors to Bitcoin. This attack is specific to blockchain networks …

    0 FacebookTwitterPinterestEmail
    1. «
    2. 1
    3. 2
    4. 3
    5. 4
    6. 5
    7. 6
    8. 7
    9. 8
    10. 9
    11. 10
    12. ...
    13. 41
    14. »
Newer Posts
Older Posts

Categories

  • Blockchain
  • Crypto
  • Crypto Hacks & Exploits
  • Crypto Hacks Directory
  • Crypto Regulations
  • DeFi
  • News
  • NFT
  • Penetration Testing
  • Smart Contract Audit
  • Tools
  • Web3 Security
  • SMART CONTRACT AUDIT
    • DeFi Audit
    • Token Audit
    • DApp Audit
    • NFT Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Arbitrum Audit
    • Solana Audit
    • Aurora Audit
    • Celo Audit
    • Near Audit
    • BSC Audit
    • Optimism Audit
    • Solidity Audit
    • Rust Audit
    • Teal Audit
    • Haskell Audit
  • Privacy Policy
  • Disclaimer
  • Help
  • SERVICES
  • SMART CONTRACT AUDIT
  • BLOCKCHAIN SECURITY SERVICES
  • PENETRATION TESTING
  • WEB3 SECURITY CONSULTING
  • DIGITAL ASSET SECURITY
  • Facebook
  • Twitter

@2021 - All Right Reserved. Designed and Developed by PenciDesign


Back To Top
ImmuneBytes
  • Home
  • SECURITY AUDIT
    • DApp Audit
    • DeFi Audit
    • Token Audit
    • NFT Audit
  • SMART CONTRACT AUDIT
    • Celo Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • Arbitrum Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Solana Audit
    • Aurora Audit
    • Optimism Audit
    • Near Audit
    • BSC Audit
  • Request Quote
  • Blog
  • Contact Us