Summary An anonymous attacker used a verification problem in the Wormhole program and 80000 wETH were pulled out of the Wormhole contract. The problem was
Tag: hacker
The Poly Network Hack Explained
Intro Unless you’re living under a rock, you might have read that last Tuesday the largest “crypto hack” in history targeted Cross-chain decentralized finance (DeFi) platform Poly Network, and allowed an undisclosed
SWD Bonus – MEM-AP security
Disclaimer : Since this vulnerability has been made public, here is a small blog post explaining the methodology we used to find and exploit the
5 Common CFP Submission Mistakes for Security Conferences
Throughout my years on the review board for Black Hat, I’ve seen quite a few mistakes in submissions. Many of these mistakes are ones I’ve
Power (Analysis) to the People
Power analysis is a specific kind of side-channel analysis performed on the power consumption of a target device. This technique can be applied for various
SWD – ARM’s alternative to JTAG
For embedded developers and hardware hackers, JTAG is the de facto standard for debugging and accessing microprocessor registers. This protocol has been in use for