Post The Hack This Is How Crypto Coms On Chain Prospects Look Like

Last updated: June 9, 2025, 07:00

Post The Hack This Is How Crypto Coms On Chain Prospects Look Like

In a report earlier this

CertiK - Wormhole Bridge Exploit Incident Analysis

DeFi, Cross-Chain Bridge Attacks Drive Record Haul from

In a report earlier this week assessing the security vulnerabilities of cross-chain bridges, Chainalysis estimate that this type of hack accounts for 69% of all stolen crypto

Wormhole

Chainalysis Estimates $2B Stolen From Cross-Chain Bridge

Wormhole, a popular multichain bridge was recently exploited for 120,000 wETH, approximately $320 million. This is the 2nd largest hack in the last year, where Poly

Post the hack, this is how Crypto.com’s on-chain prospects look like

Keep reading to learn more

Hacks on DeFi targets and cross-chain bridges have driven a record-setting year for hacking activity in the cryptocurrency ecosystem, with over $3.6 billion in stolen funds through

Keep reading to learn more about crypto hacking trends in 2025, the DPRK’s activities, and Hexagate’s use of machine learning models to proactively detect suspicious

FTX hacker still draining exchange wallets? Analyst calls

Crypto has a cross

Crypto has a cross-chain payments problemand it needs to solve it, fast. That was made clear on June 23, when yet another so-called bridge protocol was hacked, with

The $100M Hack and Crypto’s Cross-Chain Payments Problem

Crypto.com has been in the news over the past day owing to its recent $15 million hack. Such events usually tend to have a negative implication on the underlying asset's

$2.2 Billion Stolen in Crypto in 2025 but Hacked Volumes Stagnate

Wormhole Hack: Lessons From The Wormhole Exploit

The Wormhole hack. What Is The Future Of Cross-Chain Bridges?