February 21, 2025
Bybit: $1.5B Loss Forensic Report
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_newDecentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.
Total Value Lost (2026)
Documented Incidents
All-Time Losses Tracked
Deep-dive structural analysis of landmark vulnerabilities.
February 21, 2025
Users are tricked into signing malicious transactions or approvals that transfer assets to the attacker.
Read Forensic Report open_in_new
March 13, 2023
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_new
August 2, 2022
A business-logic bug in the contract — such as an incorrect formula or missing state update — lets the attacker withdraw more than their share.
Read Forensic Report open_in_newReal-time ledger of verified exploits and security anomalies.
| Date | Protocol | Chain | Amount | Type |
|---|---|---|---|---|
| Mar 27, 2026 | EST Token | BNB Chain | Undisclosed | Business Logic Flaw |
| Mar 15, 2026 | Venus THE | BNB Chain | Undisclosed | Donation Attack |
| Mar 10, 2026 | AlkemiEarn | — | Undisclosed | Business Logic Flaw |
| Mar 2, 2026 | Curve LlamaLend | — | Undisclosed | Price Manipulation |
| Feb 22, 2026 | LAXO Token | — | Undisclosed | Other |
| Feb 15, 2026 | Moonwell | — | $1.78M | Oracle Manipulation |
Editorial
Long-form analysis, market research, and security commentary.
Blog
The security intelligence company landscape split in two directions in 2024: platform consolidation at the top of the…
Read Article arrow_forward
Blog
Security intelligence and analytics are two distinct functions that produce their strongest outcomes when they operate as an…
Read Article arrow_forward
Blog
Security intelligence analytics is the data analysis layer that converts raw security telemetry into detections, behavioral baselines, and…
Read Article arrow_forward
Blog
The security intelligence market encompasses SIEM platforms, threat intelligence products, SOAR solutions, and the AI-augmented analytics layer that…
Read Article arrow_forward
Blog
Open source intelligence (OSINT) in cybersecurity is the systematic collection and analysis of publicly available information to produce…
Read Article arrow_forward
Blog
Intelligence and security — as distinct disciplines that increasingly share methods, personnel, and operational objectives — represent two…
Read Article arrow_forwardAccess our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.
To explore application business opportunities and study the laws of supply and demand in the market economy.
Environmental, Social, and Governance (ESG).
Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.
Read Methodology