February 21, 2025
Bybit: $1.5B Loss Forensic Report
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_newDecentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.
Total Value Lost (2026)
Documented Incidents
All-Time Losses Tracked
Deep-dive structural analysis of landmark vulnerabilities.
February 21, 2025
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_new
March 13, 2023
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_new
August 2, 2022
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_newReal-time ledger of verified exploits and security anomalies.
| Date | Protocol | Chain | Amount | Type |
|---|---|---|---|---|
| Mar 27, 2026 | EST Token | BNB Chain | Undisclosed | Business Logic Flaw |
| Mar 15, 2026 | Venus THE | BNB Chain | Undisclosed | Donation Attack |
| Mar 10, 2026 | AlkemiEarn | — | Undisclosed | Business Logic Flaw |
| Mar 2, 2026 | Curve LlamaLend | — | Undisclosed | Price Manipulation |
| Feb 22, 2026 | LAXO Token | — | Undisclosed | Other |
| Feb 15, 2026 | Moonwell | — | $1.78M | Oracle Manipulation |
Editorial
Long-form analysis, market research, and security commentary.
Blog
Best threat intelligence for security leadership in 2026: CrowdStrike Global Threat Report, IBM X-Force, Verizon DBIR, Recorded Future, and CISA — what each provides for CISOs and security directors.
Read Article arrow_forward
Blog
The AI security tools market reached $44.24 billion in 2026 and is on a trajectory toward $213 billion…
Read Article arrow_forward
Blog
Microsoft releases security intelligence updates for Defender Antivirus multiple times per day, making them one of the most…
Read Article arrow_forward
Blog
Compare the leading AI security certifications in 2026—CompTIA SecAI+, ISACA AAISM, CAISP, and GIAC GAIPS—with verified cost, exam format, prerequisites, and salary premium data.
Read Article arrow_forward
Blog
When the average data breach now costs $4.7 million and attackers can move from initial access to full…
Read Article arrow_forward
Blog
AI detects breaches 108 days faster and cuts costs 43%—but powers 82.6% of phishing attacks. Full 2026 statistics, tools, threats, and market data on AI in cybersecurity.
Read Article arrow_forwardAccess our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.
By automating tasks, providing real-time data, and enhancing security and transparency.
Blockchain improves supply chain management by providing transparency, authenticating products, and reducing fraud.
Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.
Read Methodology