Workflow
Security Vulnerability
icon
Search documents
X @BSCN
BSCN· 2025-11-04 09:38
COMMENT: Initial findings suggest the attackers exploited a flaw in Balancer V2’s Composable Stable Pools, allowing them to turn fake fee credits into real tokens.BSCN (@BSCNews):THE $128M BALANCER EXPLOIT: WHAT WE KNOW SO FAR- DeFi protocol @Balancer has suffered a major exploit that drained $128.6 million in assets across multiple chains.- Security firm @PeckShieldAlert first detected the breach after spotting large withdrawals of WETH, osETH, and https://t.co/OQKUKzRL01 ...
X @Forbes
Forbes· 2025-11-03 01:08
‘Massive Security Vulnerability’—Do You Need To Stop Using WhatsApp? https://t.co/i4PhH7aMBJ ...
X @The Economist
The Economist· 2025-09-26 23:00
Large language models do not separate data from instructions. If they are given a command, they will attempt to follow it. This oversight can become a security vulnerability https://t.co/m9LSYhXo5q ...
X @The Economist
The Economist· 2025-09-25 12:00
Large language models do not separate data from instructions. If they are given a command, they will attempt to follow it. This oversight can become a security vulnerability https://t.co/mBceL0vBEw ...
X @Bloomberg
Bloomberg· 2025-07-24 08:34
Security Breach - Several South African entities have been compromised due to hackers exploiting a Microsoft SharePoint server security vulnerability [1] - Eye Security reported the security breach [1]