The meltdown of the JELLY token on Hyperliquid is the latest DeFi exploit in a year already riddled with hacks.
Security News

Blockchain and cryptocurrency security is essential. After all, an autonomous monetary system can only go so far if it can be easily exploited by hackers, rendered inoperable through a mere software bug, or shut down by the powers that be.
Bitcoin’s unique security model is possible through a clever alignment of incentives between the network’s stakeholders — miners, developers, merchants and users. Any attempt to capture the network or reorganize the chain would result in the value of the currency plummeting and thus render any intended benefit completely worthless. The cost of being a bad actor significantly outweighs any possible reward.
Thus, it is in every participant’s best interest to simply play by the rules and collectively work toward the maturation and adoption of the Bitcoin (BTC) ecosystem.
Since its launch in January 2009, the Bitcoin network has never been compromised at the base layer and has had virtually 0% downtime, making it one of the most secure computer systems on the planet.
Cryptocurrency wallets, applications and exchanges that build products and services atop Bitcoin and other crypto networks, however, have frequently been the target of hacks and scams, highlighting the ongoing need to establish best practices around cybersecurity and operational security.
- Analysis742
- News
Bitget Wallet’s latest report found that 37% see security concerns as the biggest obstacle to crypto payment adoption.
6417 - News
Trump Media has inked a non-binding agreement with crypto exchange Crypto.com to launch a series of ETFs that will comprise of digital assets and securities.
5463 - News
The former commissioner will face a Republican-controlled Senate Banking Committee hearing on March 27 where he is likely to face questions regarding crypto regulation.
3422 - Explained
Microsoft researchers have discovered StilachiRAT malware, designed to evade detection and steal credentials stored in Google Chrome.
- How to
Address poisoning attacks involve tracking, misusing or compromising cryptocurrency addresses.
11773 - News
As long as victims keep falling for handing over their 24-word seed phrase, bad actors will keep going for the easiest payday, says a crypto executive.
6183 - News
Zoth suffered an $8.4 million exploit after admin privileges were compromised. The team promised to publish a full incident report post-investigation.
19674 - News
The endorsement suggests that Ethereum may play an important role in the US’s permissioned security token ecosystem.
3214 - News
The securities regulator has clarified its stance on so-called “Covered Crypto Assets” and “Protocol Mining” involving public, permissionless PoW networks.
6025 - Explained
California’s DFPI crypto scam tracker lets users identify scams early and helps safeguard crypto assets from fraudulent activities.
- News
Bybit has already paid out $2.2 million for “bounty hunters” who can provide valuable information on the Lazarus Group’s transaction patterns related to the stolen funds.
6006 - News
The SEC’s dismissal of its years-long case against Ripple Labs marks a “new chapter” for crypto, the CEO said.
9875 - News
Pre-transaction verification solutions may stop a significant amount of phishing attacks, according to the CEO of Cyvers blockchain security firm.
7300 - News
An attacker has compromised the dashboard of an AI-powered crypto bot and prompted it to transfer $106,200 worth of Ether out of its wallet.
3586