-
-
慢雾科技 · 2 days ago
UNODC releases fraud report in Southeast Asia: Cryptocurrency becomes a tool for crime, and all parties need to strengthen international cooperationThis article will analyze the following four dimensions: Southeast Asia’s criminal ecosystem, global expansion beyond Southeast Asia, emerging illegal network markets and money laundering services, and transnational criminal networks and global law enforcement collaboration.
2 days ago -
慢雾科技 · 05-07 10:00
Interpreting the FBI’s 2024 Cryptocurrency Fraud ReportThis article will interpret the core content of the "2024 Cryptocurrency Fraud Report" to help readers quickly grasp trend changes and improve their understanding and prevention capabilities of complex network security threats.
05-07 10:00 -
慢雾科技 · 04-29 18:00
Starting from actual combat: hidden poisoning and manipulation in the MCP systemThe MCP (Model Context Protocol) system is still in its early stages of development. The overall environment is relatively chaotic, and various potential attack methods emerge in an endless stream. It is difficult to defend against the current design of protocols and tools.
04-29 18:00 -
慢雾科技 · 04-24 09:00
First aid guide: Don’t panic if your BTC is stolen, leave a message on the chain firstOn-chain messages, as a special way of communication in the blockchain world, have been frequently used in various security incidents in recent years.
04-24 09:00 -
慢雾科技 · 04-18 19:00
Web3 Security Beginner's Guide to Avoiding Pitfalls: How to Ensure Clipboard Security?This issue will focus on clipboard security, and will help you understand its principles, attack methods, and the prevention suggestions we have summarized in practice, to help users build a more solid asset protection awareness.
04-18 19:00 -
慢雾科技 · 04-01 09:00
Deadly Remains: A $300,000 On-Chain Heist Triggered by Transient StorageThe root cause of this hack is that the value of transient storage in tstore is not cleared after the function call ends, which allows attackers to use this feature to construct specific malicious addresses to bypass permission checks and transfer tokens.
04-01 09:00 -
慢雾科技 · 03-31 16:00
Hacker teaches you how to get CZ for free with 0.01 BNBWe discovered a vulnerability in ReachMe.io that allows you to Say Hi to any user at a low cost, so we immediately contacted the project team and provided details of the vulnerability verification.
03-31 16:00 -
慢雾科技 · 03-27 18:00
Ethereum is about to usher in the Pectra upgrade: a deep discussion of EIP-7702 and best practicesThis article will deeply analyze the implementation mechanism of EIP-7702, explore the opportunities and challenges it may bring, and provide practical operation guidelines for different participants.
03-27 18:00 -
慢雾科技 · 03-13 16:00
Another risk incident with Google plug-ins: SwitchyOmega was exposed to steal private keys. How to prevent plug-ins from being tampered with?This article will analyze the situation of SwitchyOmega plug-in tampering and explore how to prevent plug-in tampering and deal with malicious plug-ins.
03-13 16:00 -
慢雾科技 · 03-06 15:00
The browser encryption wallet is suddenly damaged. How to avoid the risk of asset loss?Crypto wallet extensions usually store private keys. If not handled properly, it may lead to loss of wallet data or even inability to recover assets.
03-06 15:00 -
慢雾科技 · 02-27 13:00
In-depth analysis of the Safe dilemma: Can Guard reconstruct the contractual Babel?On-chain analysis shows that the attacker obtained multi-signature permissions through sophisticated social engineering attacks, implanted malicious logic using the delegatecall function of the Safe contract, and ultimately bypassed the multi-signature verification mechanism to transfer funds to an anonymous address.
02-27 13:00 -
慢雾科技 · 02-23 15:03
SlowMist: Analyzing the hacker methods and questions behind the theft of nearly $1.5 billion from BybitHacker groups, especially nation-state hackers like the Lazarus Group, are continuing to upgrade their attack methods.
02-23 15:03 -
慢雾科技 · 2024-12-27 16:00
Analysis of fake Zoom conference phishing scams that cost more than $1 millionThis article will analyze fake Zoom conference phishing incidents and attack methods, and track the flow of hackers' funds.
2024-12-27 16:00 -
慢雾科技 · 2024-10-30 13:00
The unknown dark side: Uncovering market manipulation in Web 3.0This article will explore common manipulation methods in the Web3.0 market and analyze how these behaviors affect the entire industry. It is hoped that investors can better understand and identify market manipulation behaviors and protect their assets.
2024-10-30 13:00
-