Immunefi’s Guide to Crypto Phishing Attacks (and the Hackers Who Plot Them)
When it comes to crypto hacks and heists, blackhat hackers favor phishing attacks as their main intrusion vector. This trend is unsurprising
When it comes to crypto hacks and heists, blackhat hackers favor phishing attacks as their main intrusion vector. This trend is unsurprising
Introduction In April 2021, Yuga Labs launched The Bored Apes project. BAYC is considered the most valuable NFT project launched in 2021 in
Summary In part 2 of this tutorial (see part 1 here), we are going to see what a Proof of Concept (PoC) for a real-world vulnerability look
Summary: On May 27th, whitehat pwning.eth submitted a missing call check critical vulnerability to the Moonbeam network via Immunefi, demon
On May 14th, ChainSecurity employee @k_besic reported a vulnerability classified as “Medium” in Balancer protocol. The vulnerability consist
At the ‘Off the Chain’ Web3 security conference in San Francisco in June, Unciphered–a cryptocurrency asset recovery company–unveiled three