Summary An anonymous attacker used a verification problem in the Wormhole program and 80000 wETH were pulled out of the Wormhole contract. The problem was
Category: Hacking
The Poly Network Hack Explained
Intro Unless you’re living under a rock, you might have read that last Tuesday the largest “crypto hack” in history targeted Cross-chain decentralized finance (DeFi) platform Poly Network, and allowed an undisclosed
Power (Analysis) to the People
Power analysis is a specific kind of side-channel analysis performed on the power consumption of a target device. This technique can be applied for various
Introducing FumbleChain – A Purposefully Vulnerable Blockchain
Hello everyone, today we are happy to announce FumbleChain, a purposefully vulnerable blockchain implementation. This project has been a labor of love for the Research
Ph0wn 2018 – Flag digger
Introduction Ph0wn is a CTF (Capture The Flag) competition focused on IoT and embedded devices happening in Sophia Antipolis, France. We were asked by the
Kudelski Security Black Hat Crypto Challenge 2018
Welcome to the 2018 Kudelski Security Black Hat Crypto Challenge. Test your skills and win some hardware wallets along with some cryptocurrency. Building on the