Decentralized Protocols Are Soft Targets for North Korean Hackers

3 hours ago

Oak Security has conducted much than 600 audits crossed large crypto systems. It consistently sees this vulnerability gap: teams put heavy successful astute declaration audits but disregard basal operational security, says Dr. Jan Philipp Fritsche.

Updated Jun 20, 2025, 4:00 p.m. Published Jun 20, 2025, 3:49 p.m.

View source