February 21, 2025
Bybit: $1.5B Loss Forensic Report
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_newDecentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.
Total Value Lost (2026)
Documented Incidents
All-Time Losses Tracked
Deep-dive structural analysis of landmark vulnerabilities.
February 21, 2025
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_new
March 13, 2023
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_new
August 2, 2022
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_newReal-time ledger of verified exploits and security anomalies.
| Date | Protocol | Chain | Amount | Type |
|---|---|---|---|---|
| Mar 27, 2026 | EST Token | BNB Chain | Undisclosed | Business Logic Flaw |
| Mar 15, 2026 | Venus THE | BNB Chain | Undisclosed | Donation Attack |
| Mar 10, 2026 | AlkemiEarn | — | Undisclosed | Business Logic Flaw |
| Mar 2, 2026 | Curve LlamaLend | — | Undisclosed | Price Manipulation |
| Feb 22, 2026 | LAXO Token | — | Undisclosed | Other |
| Feb 15, 2026 | Moonwell | — | $1.78M | Oracle Manipulation |
Editorial
Long-form analysis, market research, and security commentary.
Blog
The Intelligence and National Security Alliance (INSA) is a nonpartisan, nonprofit trade association that connects private-sector companies, academic…
Read Article arrow_forward
Blog
A security and intelligence degree is an interdisciplinary academic credential that combines national security policy, intelligence analysis methodology,…
Read Article arrow_forward
Blog
The use of artificial intelligence in cyber security spans more domains than threat detection and incident response —…
Read Article arrow_forward
Blog
Artificial intelligence is now central to both sides of the cybersecurity equation — applied by defenders to detect…
Read Article arrow_forward
Blog
The Artificial Intelligence Safety and Security Board was a 22-member public-private advisory board established by the Department of…
Read Article arrow_forward
Blog
Security information and event management — SIEM — is the platform category that sits at the center of…
Read Article arrow_forwardAccess our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.
Predicting stock trends by analyzing sentiments from text corpuses like news feeds or tweets.
Misleading the classifier to make incorrect predictions.
Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.
Read Methodology