Singapore, April 11th, 2024 — Merlin Chain, a trailblazer in Bitcoin-native layer 2 (L2) protocols, has rolled out a comprehensive suite of security measures...
COMMENTARYThe saying "put yourselves in the shoes of a hacker" has long been part of defensive security strategies. Today, in the fast-paced and evolving...
Badger leverages stETH as collateral to generate staking yield for both the eBTC protocol and borrowers.Badger Finance, a Bitcoin-focused DeFi collective, has launched a...
Cybersecurity researchers are winning hundreds of thousands of dollars in cash and prizes in the Pwn2Own competition, discovering previously unknown vulnerabilities in widely used...
Since 2005, the National Vulnerability Database (NVD) has been posting details about the hundreds of daily common vulnerabilities and exposures (CVEs) discovered by security researchers...
Researchers have unearthed over 100 malicious machine learning (ML) models on the Hugging Face AI platform that can enable attackers to inject malicious code...
Euler's TVL crashed to less than $100,000 after suffering a $197M exploit in early 2023.Euler Finance, a DeFi lending protocol wracked by a nine-figure...
Last year, blockchain security was significantly developed, marked by a considerable $50 billion decrease in lost cryptocurrency assets. The decline reflects an evolution toward...
The Tron network is a decentralized blockchain platform that aspires to create an expansive and interconnected global digital content ecosystem. At its core, Tron...