• Home
  • SECURITY AUDIT
    • DApp Audit
    • DeFi Audit
    • Token Audit
    • NFT Audit
  • SMART CONTRACT AUDIT
    • Celo Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • Arbitrum Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Solana Audit
    • Aurora Audit
    • Optimism Audit
    • Near Audit
    • BSC Audit
  • Request Quote
  • Blog
  • Contact Us
ImmuneBytes
keep your memories alive
  • Crypto Hacks DirectoryWeb3 Security

    List of Crypto Hacks in the Month of October

    by ImmuneBytes October 1, 2023
    by ImmuneBytes October 1, 2023

    Oct 6 😈On Oct 6, 2022, the $RES Token on the Binance Smart Chain suffered a flash loan attack, leading to a theft of roughly $290,000. The attacker exploited a …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsNewsWeb3 Security

    South Korean Crypto Exchange, Upbit Exploited for an Undisclosed Sum

    by ImmuneBytes September 25, 2023
    by ImmuneBytes September 25, 2023

    On Sep 24, Upbit, recognized as the largest cryptocurrency exchange in South Korea was exploited due to a technical glitch in the Upbit’s system. The incident in question pertains to …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsNewsWeb3 Security

    Another DeFi Exploited: Mixin Network Suffers a $200M Security Breach

    by ImmuneBytes September 25, 2023
    by ImmuneBytes September 25, 2023

    The Hack Mixin Network has been hit bit a massive security breach on Sep 23, 2023. The losses due to the breach is said to be around $200M. The breach …

    0 FacebookTwitterPinterestEmail
  • Smart Contract AuditWeb3 Security

    Solidity Security Vulnerability: Unchecked Return Values

    by ImmuneBytes September 20, 2023
    by ImmuneBytes September 20, 2023

    The Underlying Issue In Solidity, developers can perform external calls using various methods, like send(), call(), and transfer(). However, each of these has a different behavior when it comes to …

    0 FacebookTwitterPinterestEmail
  • CryptoNFTWeb3 Security

    Airdrop Exploits in NFTs

    by ImmuneBytes September 16, 2023
    by ImmuneBytes September 16, 2023

    Introduction Airdrops, a mechanism to reward community members with tokens or NFTs, have become a popular strategy for NFT projects to sustain engagement. However, the process is not without vulnerabilities. …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsWeb3 Security

    Remitano Crypto Exchange Lost $2.7 Millions in an Alleged Exploit

    by ImmuneBytes September 15, 2023
    by ImmuneBytes September 15, 2023

    On Sept 14, Remitano exchange detected suspicious transactions across Ethereum and TRON blockchains, resulting in a $2.7 million loss. Swiftly, Tether froze the alleged attacker’s addresses, potentially saving 2.7 million …

    0 FacebookTwitterPinterestEmail
  • BlockchainSmart Contract AuditWeb3 Security

    What is Mining Pool Manipulation in Blockchain Network?

    by ImmuneBytes September 15, 2023
    by ImmuneBytes September 15, 2023

    Overview Mining pool manipulation, also known as “pool manipulation,” refers to a scenario in the context of cryptocurrency mining, particularly for proof-of-work (PoW) blockchains like Bitcoin. In PoW-based cryptocurrencies, miners …

    0 FacebookTwitterPinterestEmail
  • Smart Contract AuditWeb3 Security

    Solidity Vulnerability: Short Address Attack in EVM

    by ImmuneBytes September 14, 2023
    by ImmuneBytes September 14, 2023

    Overview Short Address Attack is a vulnerability where attackers exploit the characteristic of address encoding algorithms to ignore the trailing characters of the encoded string. By constructing a specific encoded …

    0 FacebookTwitterPinterestEmail
  • Smart Contract AuditWeb3 Security

    Solidity Security Vulnerability: Function Default Visibilities

    by ImmuneBytes September 13, 2023
    by ImmuneBytes September 13, 2023

    Introduction Solidity offers four visibility specifiers for functions: public, internal, private, and external. Incorrect use or neglect of these visibilities can lead to devastating vulnerabilities in smart contracts. By default, …

    0 FacebookTwitterPinterestEmail
  • Crypto Hacks & ExploitsWeb3 Security

    Conic Finance-Detailed Hack Analysis – July 21, 2023

    by ImmuneBytes September 13, 2023
    by ImmuneBytes September 13, 2023

    On July 21, Defi Conic Finance suffered two significant exploits due to vulnerabilities in its smart contracts. These vulnerabilities led to a total loss of approximately $4.2M from its ETH …

    0 FacebookTwitterPinterestEmail
    1. «
    2. 1
    3. ...
    4. 5
    5. 6
    6. 7
    7. 8
    8. 9
    9. 10
    10. 11
    11. ...
    12. 41
    13. »
Newer Posts
Older Posts

Categories

  • Blockchain
  • Crypto
  • Crypto Hacks & Exploits
  • Crypto Hacks Directory
  • Crypto Regulations
  • DeFi
  • News
  • NFT
  • Penetration Testing
  • Smart Contract Audit
  • Tools
  • Web3 Security
  • SMART CONTRACT AUDIT
    • DeFi Audit
    • Token Audit
    • DApp Audit
    • NFT Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Arbitrum Audit
    • Solana Audit
    • Aurora Audit
    • Celo Audit
    • Near Audit
    • BSC Audit
    • Optimism Audit
    • Solidity Audit
    • Rust Audit
    • Teal Audit
    • Haskell Audit
  • Privacy Policy
  • Disclaimer
  • Help
  • SERVICES
  • SMART CONTRACT AUDIT
  • BLOCKCHAIN SECURITY SERVICES
  • PENETRATION TESTING
  • WEB3 SECURITY CONSULTING
  • DIGITAL ASSET SECURITY
  • Facebook
  • Twitter

@2021 - All Right Reserved. Designed and Developed by PenciDesign


Back To Top
ImmuneBytes
  • Home
  • SECURITY AUDIT
    • DApp Audit
    • DeFi Audit
    • Token Audit
    • NFT Audit
  • SMART CONTRACT AUDIT
    • Celo Audit
    • Algorand Audit
    • Avalanche Audit
    • Ethereum Audit
    • Cardano Audit
    • Fantom Audit
    • Arbitrum Audit
    • zkSync Era Audit
    • Polkadot Audit
    • Polygon Audit
    • Solana Audit
    • Aurora Audit
    • Optimism Audit
    • Near Audit
    • BSC Audit
  • Request Quote
  • Blog
  • Contact Us