B57

Pure Crypto. Nothing Else.

white hat hackers

Bringing Back the Bling: Nomad Bridge Hackers Offered NFTs for Redemption

Nomad Bridge incentivizes hackers to return stolen funds with exclusive NFTs. A unique twist in the crypto world!

Gala Games Sues pNetwork: The Battle of the Blockchain After a $25 Million Breach

Gala Games sues pNetwork for $27.7 million after a $4.5 million breach. Discover the legal twists behind this blockchain drama.

XCarnival Hack: How a DAO Lost Millions and Offered Bounties

Discover the unexpected saga of the XCarnival hack, where bounty offers met blockchain security loopholes.

Crypto’s Bizarre Bug-Bounty Dilemma: Hackers Return Funds for a Slice of the Pie

In crypto, hackers are returning stolen funds for bounties. Learn about this trend and what it means for the future of DeFi security!

How a White Hat Hacker Saved Coinbase from a Potential Market Crisis

Discover how a vigilant hacker prevented a potential market crisis for Coinbase by exposing a critical security flaw just before the Super Bowl.

Multichain Hack: The Tale of 322 Ether Returned and a Bounty Kept

A hacker returns 322 ETH to Multichain amidst a massive exploit, keeping 62 ETH as a bounty. Learn about this thrilling tale of theft and recovery.

Immunefi Secures $24M to Tackle Blockchain Bugs and Boost Security

Immunefi closes a $24 million Series A funding round to scale operations in blockchain security and bug bounty services.

News

Bridge Over Troubled Waters: The Nomad Token Exploit Exposed

Explore the Nomad token bridge hack, its impact on the crypto industry, and the ongoing attempts to recover the stolen funds.

How a White Hat Hacker Rescued $1.59 Million from Tender.fi

A white hat hacker rescues $1.59 million from Tender.fi, showcasing the dynamic world of decentralized finance and ethical hacking.

Massive Discovery: White Hat Hacker Reveals $400 Million Exploit Between Ethereum and Arbitrum Nitro

Discover how a white hat hacker found a bridge exploit worth millions and bagged a 400 ETH bounty from Arbitrum. Explore the vulnerabilities within.