Cryptopolitan on MSN
Crypto protocol CrossCurve suffers $3M exploit
CrossCurve announced that its cross-chain bridge was attacked, resulting in a loss of about $3 million across multiple networks.
Truebit, an Ethereum-based verification protocol, has been left reeling after a hacker stole $26 million from the protocol’s reserves. The hacker targeted a bug in the protocol’s code, tricking it ...
Cryptopolitan on MSN
Lending protocols top DeFi hack targets with 67 historical exploits
Lending protocols are some of the most active DeFi apps. Due to the heavy usage of smart contracts, they are also the most at risk for hacks and exploits. Lending protocols logged the biggest number ...
Decentralized finance (DeFi) protocol Blueberry has managed to pause its protocol after a mad dash to limit potential damage from an “ongoing exploit” on Friday. In a Feb. 23 post on X, the Blueberry ...
A crypto wallet suspected to be tied to the exploit has gained over $1 million in SOL and UDSC since the attack. On Aug. 7, Cypher alerted its 13,500 followers on X (formerly known as Twitter) that it ...
Unleash Protocol, an intellectual property finance platform built on the Story ecosystem, lost about $3.9 million in a security breach, according to blockchain security firm PeckShield. The attacker ...
Multi-chain liquid staking protocol Meta Pool suffered a smart contract exploit on Tuesday, resulting in the loss of $27 million. Blockchain security firm PeckShield reported that a bug in the ...
The attacker currently holds $1.8M worth of crypto including 32.5 million NXRA tokens. Nexera has paused the smart contract and trading on decentralized exchanges; the token fell 40%. The attacker is ...
The CrossCurve cross-chain bridge exploit caused losses of about $3 million amid a recent wave of crypto thefts in 2026.
(MENAFN- Crypto Breaking) CrossCurve, a cross-chain liquidity bridge, has halted interactions with its protocol as it probes a smart contract breach that security researchers describe as exploiting a ...
Nemo Protocol released a comprehensive post-mortem blaming a rogue developer for deploying unaudited code containing critical vulnerabilities that enabled a $2.59 million exploit on September 7. The ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results