Nomad releases bridge relaunch guide after patching contract vulnerability
The Nomad protocol will allow users to bridge back madAssets and access a pro-rata share of recovered funds.
Auto Added by WPeMatico
The Nomad protocol will allow users to bridge back madAssets and access a pro-rata share of recovered funds.
Microsoft and cybersecurity firm Volexity have traced a new version of AppleJeus malware to the hackers behind the Ronin exploit and numerous other online heists.
Top-100 DeFi tokens saw a bullish wave with the start of the new month, but many DEX platforms are still haunted by FTX contagion.
Decentralized Web3 infrastructure provider Ankr has become the latest victim of a hacking attack targeting the defi space. The perpetrators who hit the platform were able to mint and steal…
On-chain activity suggests that the hacker has sent at least 225 BTC (4.5 million) to OKX so far.
The last week of November remained turbulent for the crypto market as majority of the DeFi tokens struggled with the market volatility.
The FTX wallet drainer address has been meticulously swapping assets and using bridges to launder stolen funds.
Blockchain detective ZachXBT has provided evidence refuting recent speculation about the identity of the FTX hacker and their supposed memecoin activity.
In the long run, the industry needs to come together and step up its cybersecurity game in a big way rather than seek out such temporary fixes.
Billionaire entrepreneur Elon Musk, who recently purchased Twitter in hopes of unleashing the platform’s full potential, acknowledged Twitter’s contribution in tracking down the FTX developments in real time.