February 21, 2025
Bybit: $1.5B Loss Forensic Report
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_newDecentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.
Total Value Lost (2026)
Documented Incidents
All-Time Losses Tracked
Deep-dive structural analysis of landmark vulnerabilities.
February 21, 2025
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_new
March 13, 2023
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_new
August 2, 2022
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_newReal-time ledger of verified exploits and security anomalies.
| Date | Protocol | Chain | Amount | Type |
|---|---|---|---|---|
| Mar 27, 2026 | EST Token | BNB Chain | Undisclosed | Business Logic Flaw |
| Mar 15, 2026 | Venus THE | BNB Chain | Undisclosed | Donation Attack |
| Mar 10, 2026 | AlkemiEarn | — | Undisclosed | Business Logic Flaw |
| Mar 2, 2026 | Curve LlamaLend | — | Undisclosed | Price Manipulation |
| Feb 22, 2026 | LAXO Token | — | Undisclosed | Other |
| Feb 15, 2026 | Moonwell | — | $1.78M | Oracle Manipulation |
Editorial
Long-form analysis, market research, and security commentary.
Blog
Big data analytics for security intelligence is the discipline of applying data engineering and machine learning pipelines to…
Read Article arrow_forward
Blog
Security artificial intelligence is the application of machine learning, behavioral analytics, and AI-driven automation to detect threats, investigate…
Read Article arrow_forward
Blog
The AI cybersecurity market is one of the fastest-growing technology segments in the world right now, and the…
Read Article arrow_forward
Blog
Two different searches land on "Canadian Security Intelligence Service." Some are looking for basic information about what CSIS…
Read Article arrow_forward
Blog
Large enterprises now ingest more than 10 terabytes of log data every day — endpoints, cloud services, SaaS…
Read Article arrow_forward
Blog
What the Intelligence and National Security journal publishes on AI, plus what the 2026 DNI Annual Threat Assessment says: China's AI ambitions, North Korea's $2B cryptocurrency theft, and the readiness gap.
Read Article arrow_forwardAccess our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.
Availability, credibility, and strategic anchorage.
The study uses an ordinary least squares (OLS) regression model to assess the relationship between cryptocurrency holdings and company performance.
Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.
Read Methodology