A flaw in ResupplyFi’s contract allowed an attacker to manipulate token prices and drain $9.6 million from its wstUSR market.
Security News

Blockchain and cryptocurrency security is essential. After all, an autonomous monetary system can only go so far if it can be easily exploited by hackers, rendered inoperable through a mere software bug, or shut down by the powers that be.
Bitcoin’s unique security model is possible through a clever alignment of incentives between the network’s stakeholders — miners, developers, merchants and users. Any attempt to capture the network or reorganize the chain would result in the value of the currency plummeting and thus render any intended benefit completely worthless. The cost of being a bad actor significantly outweighs any possible reward.
Thus, it is in every participant’s best interest to simply play by the rules and collectively work toward the maturation and adoption of the Bitcoin (BTC) ecosystem.
Since its launch in January 2009, the Bitcoin network has never been compromised at the base layer and has had virtually 0% downtime, making it one of the most secure computer systems on the planet.
Cryptocurrency wallets, applications and exchanges that build products and services atop Bitcoin and other crypto networks, however, have frequently been the target of hacks and scams, highlighting the ongoing need to establish best practices around cybersecurity and operational security.
- News2135
- Explained
Zero-knowledge proofs are a game-changing innovation with profound implications for how users transact business, but can they replace the conventional contract?
- News
Fuzzland says a former employee used insider access and malware to exploit Bedrock’s UniBTC protocol, resulting in $2 million in losses.
29218 - Analysis
Honeypot scams lure crypto investors into buying tokens they can’t sell, locking their funds through smart contract tricks.
97255 - News
Trezor warned of ongoing phishing attempts exploiting its support contact form.
4209 - Defined
How do crypto scammers exploit trust, greed and sophisticated techniques to drain assets? And what measures can be taken to strengthen defenses in the digital asset space?
25783 - News
A leak of 16 billion passwords from services including Apple, Google and Facebook poses serious risks for crypto holders.
24995 - News
Hackers behind the $100 million Nobitex exploit have released the exchange’s full source code, escalating tensions amid the Israel-Iran conflict.
5837 - News
The former global head of institutional markets for Blockchain.com and a partner at a Washington, DC-based law firm will be the latest additions to SEC staff.
8064 - Explained
Supply chain attacks in crypto exploit trusted dependencies, emerging as a major threat to crypto projects, which now have to stay vigilant on such threats.
- News
According to the Ethereum Foundation, “a significant burden of security” still falls on users of digital assets.
4964 - Explained
Cybercriminals hijack or impersonate trusted X accounts to post phishing links that lead users to fake sites or malicious smart contracts designed to steal crypto.
- News
A new report from Bitget, SlowMist and Elliptic highlights the severity of deepfake scams, urging both individuals and organizations to adopt more stringent preventive measures.
4775 - Explained
A crypto investor lost $2.6 million in hours, falling victim to a zero-value transfer scam, a type of address poisoning scam.
- News
A multi-agency investigation traced illicit funds to a suspected $123 million crypto laundering operation hiding behind a security company.
34218