February 21, 2025
Bybit: $1.5B Loss Forensic Report
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_newDecentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.
Total Value Lost (2026)
Documented Incidents
All-Time Losses Tracked
Deep-dive structural analysis of landmark vulnerabilities.
February 21, 2025
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_new
March 13, 2023
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_new
August 2, 2022
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_newReal-time ledger of verified exploits and security anomalies.
| Date | Protocol | Chain | Amount | Type |
|---|---|---|---|---|
| Mar 27, 2026 | EST Token | BNB Chain | Undisclosed | Business Logic Flaw |
| Mar 15, 2026 | Venus THE | BNB Chain | Undisclosed | Donation Attack |
| Mar 10, 2026 | AlkemiEarn | — | Undisclosed | Business Logic Flaw |
| Mar 2, 2026 | Curve LlamaLend | — | Undisclosed | Price Manipulation |
| Feb 22, 2026 | LAXO Token | — | Undisclosed | Other |
| Feb 15, 2026 | Moonwell | — | $1.78M | Oracle Manipulation |
Editorial
Long-form analysis, market research, and security commentary.
Blog
The use of artificial intelligence in cyber security spans more domains than threat detection and incident response —…
Read Article arrow_forward
Blog
Artificial intelligence is now central to both sides of the cybersecurity equation — applied by defenders to detect…
Read Article arrow_forward
Blog
The Artificial Intelligence Safety and Security Board was a 22-member public-private advisory board established by the Department of…
Read Article arrow_forward
Blog
Security information and event management — SIEM — is the platform category that sits at the center of…
Read Article arrow_forward
Blog
Security intelligence solutions is the category name for the platforms that collect, correlate, enrich, and act on security…
Read Article arrow_forward
Blog
Physical security threat intelligence is the application of intelligence analysis methods to threats that affect people, facilities, and…
Read Article arrow_forwardAccess our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.
EIP-1559 introduces a mechanism to make transaction fees more predictable by automatically adjusting a base fee according to network congestion.
To identify sustainable practices implemented by large corporations listed on the Corporate Sustainability Index in Brazil.
Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.
Read Methodology