The newly discovered Telegram vulnerability can be avoided by disabling the automatic downloading of media files on Telegram Desktop. Read more »
A third-party project audit reportedly claimed that Orb devices do not record users’ iris codes onto persistent memory and only transmit codes through end-to-end encrypted messaging. Read more »
DeFi protocol Balancer was exploited just a few days after disclosing a vulnerability affecting its boosted pools. Read more »
The smart contract auditor found that operator verification could have let operators into the system without a verified ID or even being a company. Read more »
A vulnerability in the Vyper programming language widely used by DeFi protocols like Curve Finance led to exploit of multiple Curve liquidity pools on Sunday. Read more »