Binance Square
#securityalert

securityalert

485,672 views
901 Discussing
Fibonacci Flow
·
--
Hyperbridge exploit jolts $BROCCOLI714 ⚠️ A major breach on Hyperbridge has triggered a sudden liquidity shock, with an attacker minting 1 billion bridged $DOT on Ethereum and extracting about $237,000 before the situation was flagged. CertiK says the incident is still under active investigation, and that uncertainty is exactly what can keep spreads wide and whipsaws sharp while the market digests the damage. Not financial advice. Manage your risk and protect your capital. #Crypto #DeFi #SecurityAlert #Ethereum #DOT 🛡️ {future}(DOTUSDT) {future}(BROCCOLI714USDT)
Hyperbridge exploit jolts $BROCCOLI714 ⚠️

A major breach on Hyperbridge has triggered a sudden liquidity shock, with an attacker minting 1 billion bridged $DOT on Ethereum and extracting about $237,000 before the situation was flagged. CertiK says the incident is still under active investigation, and that uncertainty is exactly what can keep spreads wide and whipsaws sharp while the market digests the damage.

Not financial advice. Manage your risk and protect your capital.

#Crypto #DeFi #SecurityAlert #Ethereum #DOT

🛡️
$BROCCOLI714 catches a liquidity shock after the Hyperbridge exploit ⚡ A bridge breach minted 1 billion bridged DOT on Ethereum and pulled roughly $237,000 before CertiK confirmed the incident is under active investigation. The market is now breathing faster, with liquidity thinning and sharp volatility likely as traders price in bridge risk and whale-sized opportunistic flows. Not financial advice. Manage your risk and protect your capital. #Crypto #DeFi #SecurityAlert #DOT #Blockchain ✦ {future}(BROCCOLI714USDT)
$BROCCOLI714 catches a liquidity shock after the Hyperbridge exploit ⚡

A bridge breach minted 1 billion bridged DOT on Ethereum and pulled roughly $237,000 before CertiK confirmed the incident is under active investigation. The market is now breathing faster, with liquidity thinning and sharp volatility likely as traders price in bridge risk and whale-sized opportunistic flows.

Not financial advice. Manage your risk and protect your capital.
#Crypto #DeFi #SecurityAlert #DOT #Blockchain
🆘SECURITY ALERT: 108 Chrome extensions identified as Trojans. 🥹🚨 $ZAMA The Socket team has just uncovered a massive campaign. The goal? Steal your Google and Telegram sessions without even needing your passwords or your 2FA. 🥹🤔 $OG 🔹 Identity theft: 54 extensions are siphoning your Google data via OAuth2. 🔹 Telegram heist: The "Telegram Multi-account" extension siphons your sessions every 15 seconds. If you have it, they are already "you". 🔹 Backdoor: 45 of them can open any URL on your browser without your knowledge. MY ADVICE: 🛡️ Clean up IMMEDIATELY. Go to your Chrome settings, remove all extensions you are not 100% sure about. A "free tool" is never worth the sacrifice of your security. In this digital chaos, your vigilance is your first shield. Don't let a small plugin destroy years of discipline. Soldiers, when did you last check your extensions? Do it now and let me know in the comments if you found any suspicious stuff! $ENJ #DrYo242 : Your Shield in Volatility. #SecurityAlert #SAFU🙏
🆘SECURITY ALERT: 108 Chrome extensions identified as Trojans. 🥹🚨 $ZAMA

The Socket team has just uncovered a massive campaign. The goal?

Steal your Google and Telegram sessions without even needing your passwords or your 2FA. 🥹🤔 $OG

🔹 Identity theft: 54 extensions are siphoning your Google data via OAuth2.

🔹 Telegram heist: The "Telegram Multi-account" extension siphons your sessions every 15 seconds. If you have it, they are already "you".

🔹 Backdoor: 45 of them can open any URL on your browser without your knowledge.

MY ADVICE: 🛡️
Clean up IMMEDIATELY. Go to your Chrome settings, remove all extensions you are not 100% sure about. A "free tool" is never worth the sacrifice of your security.

In this digital chaos, your vigilance is your first shield. Don't let a small plugin destroy years of discipline.

Soldiers, when did you last check your extensions?

Do it now and let me know in the comments if you found any suspicious stuff! $ENJ

#DrYo242 : Your Shield in Volatility.
#SecurityAlert #SAFU🙏
Article
⚡️ Emergency dump of DOT: Bridge Hyperbridge hack and issuance of 1 billion tokensToday Polkadot ($DOT ) is under severe pressure. The price hit a daily minimum at $1,148 following news of a critical exploit of the Hyperbridge cross-chain bridge. 🛠 What is known at this moment? The attacker exploited a technical loophole (parameter challengePeriod = 0), which allowed him to instantly gain administrator rights.

⚡️ Emergency dump of DOT: Bridge Hyperbridge hack and issuance of 1 billion tokens

Today Polkadot ($DOT ) is under severe pressure. The price hit a daily minimum at $1,148 following news of a critical exploit of the Hyperbridge cross-chain bridge.
🛠 What is known at this moment?
The attacker exploited a technical loophole (parameter challengePeriod = 0), which allowed him to instantly gain administrator rights.
And-lex:
Уточнюйте, що основна мережа DOT не постраждала, лише сторонній проект і токени в менежі Ethereum, а то чуєте дзвін, а не знаєте де він
Deepfake Musk Streams Draining Millions! 🛑 Scammers are using AI deepfakes to create realistic YouTube/X livestreams of Elon Musk and Vitalik Buterin promising "1 BTC for 2 BTC" giveaways. One recent stream collected over $5M in 20 minutes before being taken down. If you send crypto to "verify" your wallet, you lose it instantly. There is NO matching giveaway. #DeepfakeScam #SecurityAlert #ElonMusk
Deepfake Musk Streams Draining Millions! 🛑

Scammers are using AI deepfakes to create realistic YouTube/X livestreams of Elon Musk and Vitalik Buterin promising "1 BTC for 2 BTC" giveaways.

One recent stream collected over $5M in 20 minutes before being taken down.

If you send crypto to "verify" your wallet, you lose it instantly. There is NO matching giveaway.

#DeepfakeScam #SecurityAlert #ElonMusk
🚨 Security Alert: AethirOFTAdapter Exploited 🚨 A major security breach has shaken the crypto space as AethirOFTAdapter suffered an exploit resulting in losses exceeding $400,000. 🔍 What Happened? Attackers identified a vulnerability in the adapter contract and executed a targeted exploit, siphoning funds quickly before detection. 💸 Fund Movement The stolen assets were swiftly bridged to the TRON network, making tracking and recovery more challenging. ⚠️ Market Impact Raises concerns over cross-chain bridge security Highlights ongoing risks in DeFi infrastructure Investors urged to stay cautious with new protocols 🛡️ Key Takeaway Always verify smart contract audits and security measures before investing. In DeFi, security is everything. 📊 Stay alert. Stay informed. #CryptoNews #DeFi #SecurityAlert #TRON #Blockchain #CryptoSafety #Binance #Web3 🚀
🚨 Security Alert: AethirOFTAdapter Exploited 🚨
A major security breach has shaken the crypto space as AethirOFTAdapter suffered an exploit resulting in losses exceeding $400,000.
🔍 What Happened?
Attackers identified a vulnerability in the adapter contract and executed a targeted exploit, siphoning funds quickly before detection.
💸 Fund Movement
The stolen assets were swiftly bridged to the TRON network, making tracking and recovery more challenging.
⚠️ Market Impact
Raises concerns over cross-chain bridge security
Highlights ongoing risks in DeFi infrastructure
Investors urged to stay cautious with new protocols
🛡️ Key Takeaway
Always verify smart contract audits and security measures before investing. In DeFi, security is everything.
📊 Stay alert. Stay informed.
#CryptoNews #DeFi #SecurityAlert #TRON #Blockchain #CryptoSafety #Binance #Web3 🚀
STOP SCAMS: Beware of Fake Support! 🛡️ ATTENTION COMMUNITY! ⚠️ Scammers are using fake Binance profiles to deceive in P2P. As your Crypto Teacher, I bring you these Quick Safety Tips to protect your funds: OFFICIAL CHAT ONLY: Real support only operates within the official App. Binance will never message you on WhatsApp or Telegram! 🚫 NEVER SHARE CODES: Never give your 2FA codes or passwords. Binance never asks for your password. 🔑 DON'T RELEASE UNDER PRESSURE: If they threaten to block your account for not releasing, it’s a SCAM! Stay calm and appeal. BE SMART, STAY SAFE. 🚀 Educating yourself is protecting yourself. Have you ever been contacted privately? I’m reading your comments! 👇 $POL $TLM $BTC #P2P #SecurityAlert #BinanceSquare #venezuela
STOP SCAMS: Beware of Fake Support! 🛡️

ATTENTION COMMUNITY! ⚠️ Scammers are using fake Binance profiles to deceive in P2P. As your Crypto Teacher, I bring you these Quick Safety Tips to protect your funds:

OFFICIAL CHAT ONLY: Real support only operates within the official App. Binance will never message you on WhatsApp or Telegram! 🚫
NEVER SHARE CODES: Never give your 2FA codes or passwords. Binance never asks for your password. 🔑
DON'T RELEASE UNDER PRESSURE: If they threaten to block your account for not releasing, it’s a SCAM! Stay calm and appeal.

BE SMART, STAY SAFE. 🚀 Educating yourself is protecting yourself. Have you ever been contacted privately? I’m reading your comments! 👇
$POL $TLM $BTC
#P2P #SecurityAlert #BinanceSquare #venezuela
🚨 Is Binance banning without reason? What they DON’T tell you to protect your account. ​ ​I have seen many complaints about blocked accounts and sudden bans. It's not bad luck, it's the new security algorithm. 🛡️ ​3 Reasons why your account is at risk today: ​Irresponsible P2P: Receiving payments from third parties or accounts that do not match the account holder. If the name doesn't match, CANCEL! ​Comment Abuse: The Square algorithm now detects "spam" from bots. If you just comment the same thing everywhere, you will be marked as a ghost account. ​Expired Verification: Many ignore updates to their identification documents. ​My advice: Do not trade with fear, trade with information. I prefer that you lose a trade than lose your Binance account. ​💬 Has anyone here had their account blocked or experienced problems with P2P recently? Tell us your case to help you. 👇 #BinanceSquare #P2P #SecurityAlert #CryptoSafety #BinanceSupport
🚨 Is Binance banning without reason? What they DON’T tell you to protect your account.

​I have seen many complaints about blocked accounts and sudden bans. It's not bad luck, it's the new security algorithm. 🛡️
​3 Reasons why your account is at risk today:
​Irresponsible P2P: Receiving payments from third parties or accounts that do not match the account holder. If the name doesn't match, CANCEL!
​Comment Abuse: The Square algorithm now detects "spam" from bots. If you just comment the same thing everywhere, you will be marked as a ghost account.
​Expired Verification: Many ignore updates to their identification documents.
​My advice: Do not trade with fear, trade with information. I prefer that you lose a trade than lose your Binance account.

​💬 Has anyone here had their account blocked or experienced problems with P2P recently? Tell us your case to help you. 👇
#BinanceSquare #P2P #SecurityAlert #CryptoSafety #BinanceSupport
Pancho 53:
dónde se ve la verificación al día ??
STOP SCAMS: Beware of Fake Support! 🛡️ ATTENTION COMMUNITY! ⚠️ Scammers are using fake Binance profiles to deceive in P2P. As your Crypto Teacher, I bring you these Quick Safety Tips to protect your funds: OFFICIAL CHAT ONLY: Real support only operates within the official App. Binance will never contact you via WhatsApp or Telegram! 🚫 NEVER SHARE CODES: Never give your 2FA codes or passwords. Binance never asks for your password. 🔑 DON'T RELEASE UNDER PRESSURE: If they threaten to lock your account for not releasing, it’s a SCAM! Stay calm and appeal. BE SMART, STAY SAFE. 🚀 Educating yourself is protecting yourself. Have you ever been contacted privately? I await your comments! 👇 #P2P #SecurityAlert #CandelariaWilham #BinanceSquare #venezuela
STOP SCAMS: Beware of Fake Support! 🛡️

ATTENTION COMMUNITY! ⚠️ Scammers are using fake Binance profiles to deceive in P2P. As your Crypto Teacher, I bring you these Quick Safety Tips to protect your funds:

OFFICIAL CHAT ONLY: Real support only operates within the official App. Binance will never contact you via WhatsApp or Telegram! 🚫
NEVER SHARE CODES: Never give your 2FA codes or passwords. Binance never asks for your password. 🔑
DON'T RELEASE UNDER PRESSURE: If they threaten to lock your account for not releasing, it’s a SCAM! Stay calm and appeal.

BE SMART, STAY SAFE. 🚀 Educating yourself is protecting yourself. Have you ever been contacted privately? I await your comments! 👇

#P2P #SecurityAlert #CandelariaWilham #BinanceSquare #venezuela
Article
EXCLUSIVE: One Computer Key. $285 Million. That's All It Took.The Exploit That Changes Everything Just 72 hours ago, Solana's largest lending protocol, Drift, was gutted. $285 million gone. Not by complex code. Not by a flash loan genius. By a single compromised admin key. Here's what Binance users need to know right now — because the same vulnerability exists in dozens of protocols you might be using. How One Key Broke DeFi's Back The attacker didn't hack smart contracts. They hacked permissions. Step-by-step breakdown: 1. Attacker obtained Drift's admin key (method still unknown — internal leak? phishing? malware?) 2. Listed a fake token called "CarbonVote Token" (CVT) on Drift 3. Manipulated CVT's price on Raydium from $0.0001 to $1 4. Deposited worthless CVT as collateral 5. Raised withdrawal limits using the same admin key 6. Drained $285M in USDC, SOL, and other real assets No exploit code. No smart contract bug. Just one key with too much power. The Part Nobody Is Talking About Circle refused to freeze the stolen USDC during U.S. business hours. The exploit happened Thursday evening (Asia time). By Friday morning in New York, funds were already mixed through bridges. Circle's official response: "We follow lawful process, not market panic." Translation: $285M is gone forever. Binance's Internal Alert — Leaked to Us A Binance security memo (shared with our team on condition of anonymity) now warns all listing reviewers to: "Flag any protocol using single-admin key architecture or lacking timelocks. Add to high-risk watchlist immediately." This is the first time Binance has publicly acknowledged admin key risk as a listing criterion. Expect faster delistings for protocols without multi-sig or timelock protections. The Human Cost — One Trader's Story "I lost my entire position. $40,000. Not even a warning from Drift." — @SOLwhale_4, a Binance user since 2022 Drift had passed an audit by ClawSecure just six weeks ago. The audit reviewed smart contracts — not admin permissions. A distinction that cost real people their savings. Your 3-Step Protection Plan (Right Now) Before you trade or lend on any DeFi protocol connected to Binance: 1. Check admin keys — Look for "multi-sig" or "timelock" in docs. Single key = single point of failure. 2. Verify recent audit scope — Did they audit permissions or just code? Ask before depositing. 3. Set withdrawal limits manually — If protocol allows, cap daily withdrawals. It won't stop a hack, but it slows the bleed. What Happens Next · DRIFT token — Down 67% from pre-hack levels. Liquidity is vanishing. · Solana TVL — Dropped $900M in three days. Fear is spreading. · Binance action — Expect an official statement within 48 hours. Some Solana projects may face accelerated delisting reviews. Finally: The Drift hack wasn't a failure of code. It was a failure of trust. Until protocols prove they can't be drained by a single compromised laptop, treat every deposit like it could vanish overnight. Stay sharp. Stay paranoid. And never assume "audited" means "safe." #DriftProtocol #Solana #DeFiHack #SecurityAlert #BinanceAlert

EXCLUSIVE: One Computer Key. $285 Million. That's All It Took.

The Exploit That Changes Everything
Just 72 hours ago, Solana's largest lending protocol, Drift, was gutted. $285 million gone.
Not by complex code.
Not by a flash loan genius.
By a single compromised admin key.
Here's what Binance users need to know right now — because the same vulnerability exists in dozens of protocols you might be using.
How One Key Broke DeFi's Back
The attacker didn't hack smart contracts. They hacked permissions.
Step-by-step breakdown:
1. Attacker obtained Drift's admin key (method still unknown — internal leak? phishing? malware?)
2. Listed a fake token called "CarbonVote Token" (CVT) on Drift
3. Manipulated CVT's price on Raydium from $0.0001 to $1
4. Deposited worthless CVT as collateral
5. Raised withdrawal limits using the same admin key
6. Drained $285M in USDC, SOL, and other real assets
No exploit code. No smart contract bug. Just one key with too much power.
The Part Nobody Is Talking About
Circle refused to freeze the stolen USDC during U.S. business hours.
The exploit happened Thursday evening (Asia time). By Friday morning in New York, funds were already mixed through bridges. Circle's official response: "We follow lawful process, not market panic."
Translation: $285M is gone forever.
Binance's Internal Alert — Leaked to Us
A Binance security memo (shared with our team on condition of anonymity) now warns all listing reviewers to:
"Flag any protocol using single-admin key architecture or lacking timelocks. Add to high-risk watchlist immediately."
This is the first time Binance has publicly acknowledged admin key risk as a listing criterion. Expect faster delistings for protocols without multi-sig or timelock protections.
The Human Cost — One Trader's Story
"I lost my entire position. $40,000. Not even a warning from Drift."
— @SOLwhale_4, a Binance user since 2022
Drift had passed an audit by ClawSecure just six weeks ago. The audit reviewed smart contracts — not admin permissions. A distinction that cost real people their savings.
Your 3-Step Protection Plan (Right Now)
Before you trade or lend on any DeFi protocol connected to Binance:
1. Check admin keys — Look for "multi-sig" or "timelock" in docs. Single key = single point of failure.
2. Verify recent audit scope — Did they audit permissions or just code? Ask before depositing.
3. Set withdrawal limits manually — If protocol allows, cap daily withdrawals. It won't stop a hack, but it slows the bleed.
What Happens Next
· DRIFT token — Down 67% from pre-hack levels. Liquidity is vanishing.
· Solana TVL — Dropped $900M in three days. Fear is spreading.
· Binance action — Expect an official statement within 48 hours. Some Solana projects may face accelerated delisting reviews.
Finally:
The Drift hack wasn't a failure of code.
It was a failure of trust.
Until protocols prove they can't be drained by a single compromised laptop, treat every deposit like it could vanish overnight.
Stay sharp. Stay paranoid. And never assume "audited" means "safe."
#DriftProtocol #Solana #DeFiHack #SecurityAlert #BinanceAlert
Article
🚨Solana Tests Quantum Resistant security🚨 SOLANA TESTS QUANTUM-RESISTANT SECURITY 🚨 🔐 Solana ($SOL ) teams up with Project Eleven ⚡ WHAT’S HAPPENING? • Testing next-gen quantum-safe signatures • Aim: protect against future quantum computer threats 📊 EARLY RESULTS: • 📈 Signatures up to 40× larger • 🐢 Network becomes ~90% slower 🧠 WHAT IT MEANS: • 🟢 Strong future security upgrade • 🔴 Major performance trade-offs for now 🚀 BOTTOM LINE: • Long-term = BULLISH (future-proof tech) • Short-term = challenging (speed & efficiency issues) #quantumcomputers #SecurityAlert #bullish

🚨Solana Tests Quantum Resistant security

🚨 SOLANA TESTS QUANTUM-RESISTANT SECURITY 🚨
🔐 Solana ($SOL ) teams up with Project Eleven
⚡ WHAT’S HAPPENING?
• Testing next-gen quantum-safe signatures
• Aim: protect against future quantum computer threats
📊 EARLY RESULTS:
• 📈 Signatures up to 40× larger
• 🐢 Network becomes ~90% slower
🧠 WHAT IT MEANS:
• 🟢 Strong future security upgrade
• 🔴 Major performance trade-offs for now
🚀 BOTTOM LINE:
• Long-term = BULLISH (future-proof tech)
• Short-term = challenging (speed & efficiency issues) #quantumcomputers #SecurityAlert #bullish
ATTENTION! LET'S TAKE CARE OF EACH OTHER! Chinese printer manufacturer may be spreading malware that steals bitcoins The Chinese printer manufacturer Procolored may be spreading clipboard hijacking malware through its official drivers in a supply chain attack that resulted in over $950,000 in stolen funds. The Chinese printer manufacturer Procolored distributed malware that steals Bitcoin along with its official drivers, according to local media reports. #BinancePizza #SecurityAlert #SecureYourTokens #BinanceSquareFamily #BitcoinSecurity
ATTENTION!
LET'S TAKE CARE OF EACH OTHER!

Chinese printer manufacturer may be spreading malware that steals bitcoins

The Chinese printer manufacturer Procolored may be spreading clipboard hijacking malware through its official drivers in a supply chain attack that resulted in over $950,000 in stolen funds.

The Chinese printer manufacturer Procolored distributed malware that steals Bitcoin along with its official drivers, according to local media reports.

#BinancePizza
#SecurityAlert
#SecureYourTokens
#BinanceSquareFamily
#BitcoinSecurity
The future of money is here and it is decentralized, secure, and global! 🌍 Dive into the universe of Bitcoin, the financial revolution that is changing the way we interact with value. With each digital coin, a world of possibilities opens up: borderless transactions, unbreakable security, and a system empowered by the people, not by institutions. Don't get left behind. Discover how Bitcoin connects you to a fairer and more efficient global economy. #bitcoin #FutureTarding #Descentralización #SecurityAlert #Global
The future of money is here and it is decentralized, secure, and global! 🌍
Dive into the universe of Bitcoin, the financial revolution that is changing the way we interact with value. With each digital coin, a world of possibilities opens up: borderless transactions, unbreakable security, and a system empowered by the people, not by institutions.
Don't get left behind. Discover how Bitcoin connects you to a fairer and more efficient global economy.
#bitcoin #FutureTarding #Descentralización #SecurityAlert #Global
🚨 Security Alert: x402 Cross-Chain Protocol Breach According to PANews, the GoPlus Chinese community has issued a security alert regarding a potential theft involving the x402 cross-chain protocol (@402bridge). The contract owner transferred control to another address, which then used contract functions to withdraw 17,693 USDC from over 200 user wallets. The stolen funds were later converted to ETH and moved to Arbitrum through cross-chain transactions. 🔒 User Advisory: Immediately revoke related authorizations. Always verify official contract addresses. Avoid unlimited authorizations and review permissions regularly to protect your assets.#SecurityAlert #x402
🚨 Security Alert: x402 Cross-Chain Protocol Breach

According to PANews, the GoPlus Chinese community has issued a security alert regarding a potential theft involving the x402 cross-chain protocol (@402bridge).

The contract owner transferred control to another address, which then used contract functions to withdraw 17,693 USDC from over 200 user wallets. The stolen funds were later converted to ETH and moved to Arbitrum through cross-chain transactions.

🔒 User Advisory:

Immediately revoke related authorizations.

Always verify official contract addresses.

Avoid unlimited authorizations and review permissions regularly to protect your assets.#SecurityAlert #x402
🇺🇸 U.S. starts talks to invest in quantum computing companies and compete with China 🔬 The government seeks to strategically invest in quantum technology to protect national security and maintain a technological edge over its global rivals. #SecurityAlert
🇺🇸 U.S. starts talks to invest in quantum computing companies and compete with China
🔬 The government seeks to strategically invest in quantum technology to protect national security and maintain a technological edge over its global rivals.
#SecurityAlert
·
--
Bullish
🎣 Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds. Security isn’t just about smart contracts. It’s about not clicking like it’s 2010. #ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
🎣 Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds.

Security isn’t just about smart contracts. It’s about not clicking like it’s 2010.
#ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
The outage of Cloudflare affected access to ChatGPT and the social media platform X According to PANews, outages in the network of the cybersecurity company Cloudflare on Tuesday led to access issues for some users of ChatGPT and the social media platform 'X'. Cloudflare announced on its website that it is investigating a problem that may affect several clients. The company's customer support portal also experienced interruptions, coinciding with scheduled maintenance in certain regions earlier that day. At one point, Cloudflare's own status page was unavailable. Cloudflare's security software is used by hundreds of thousands of companies worldwide, and the system has experienced outages in the past. #Write2Earn #SecurityAlert $BNB {spot}(BNBUSDT)
The outage of Cloudflare affected access to ChatGPT and the social media platform X
According to PANews, outages in the network of the cybersecurity company Cloudflare on Tuesday led to access issues for some users of ChatGPT and the social media platform 'X'. Cloudflare announced on its website that it is investigating a problem that may affect several clients. The company's customer support portal also experienced interruptions, coinciding with scheduled maintenance in certain regions earlier that day. At one point, Cloudflare's own status page was unavailable. Cloudflare's security software is used by hundreds of thousands of companies worldwide, and the system has experienced outages in the past.
#Write2Earn
#SecurityAlert
$BNB
183 Million Gmail passwords data leak --- What Really Happened About 183 million email+password combinations were added to the Have I Been Pwned (HIBP) database. The data comes not from a Google server breach, but from infostealer malware — malicious software that infects devices and steals login details locally. The leak includes plaintext passwords, along with the website URL, email address, and the password. In a sample of ~94,000 records, 92% of them were already known from prior leaks. But around 16.4 million credentials in the dataset are new — they haven’t appeared in public breaches before. Some users confirmed that the exposed passwords still worked for their Gmail accounts. --- What Google Says Google denies a “Gmail breach”: they say their infrastructure wasn’t hacked. According to Google, the leak comes from malware-infected devices — not from Google’s own servers. Google recommends: 1. Turn on 2-Step Verification (2FA) 2. Use passkeys instead of passwords for stronger security. 3. Reset your password if it appears in large leaked credential dumps. --- Why This Matters Because many people reuse passwords, attackers could use these leaked credentials in credential stuffing attacks (trying the same password on many sites). Infostealer malware is especially dangerous: it bypasses traditional organizational defenses by stealing directly from user devices. Even if most credentials are “old,” the newly leaked ones (16.4M) represent fresh risk. Long-term threat: these credentials can be exploited for a long time, especially if users don’t improve their security practices. --- ✅ What You Should Do (If You're a Gmail User) 1. Check Have I Been Pwned (HIBP) to see if your email appears in the leak. 2. If your credentials are exposed, change your password, especially if you’re reusing it on other sites. 3. Enable 2-Factor Authentication (2FA) — this adds a crucial extra layer of protection. 4. Use a password manager to generate and store strong, unique passwords. 5. Keep your device clean: use antivirus / anti-malware, avoid installing suspicious software, and update your system regularly. --- Bottom Line This is not a Gmail server hack — but a massive credential dump collected via malware from users’ devices. The scale is worrying (183M!), but most of the data is recycled. Still, the newly exposed credentials are a real threat. The incident highlights how important good password hygiene and strong authentication (2FA / passkeys) are in today’s threat landscape. #GoogleDocsMagic #SecurityAlert

183 Million Gmail passwords data leak




---
What Really Happened

About 183 million email+password combinations were added to the Have I Been Pwned (HIBP) database.

The data comes not from a Google server breach, but from infostealer malware — malicious software that infects devices and steals login details locally.

The leak includes plaintext passwords, along with the website URL, email address, and the password.

In a sample of ~94,000 records, 92% of them were already known from prior leaks.

But around 16.4 million credentials in the dataset are new — they haven’t appeared in public breaches before.

Some users confirmed that the exposed passwords still worked for their Gmail accounts.



---

What Google Says

Google denies a “Gmail breach”: they say their infrastructure wasn’t hacked.

According to Google, the leak comes from malware-infected devices — not from Google’s own servers.

Google recommends:

1. Turn on 2-Step Verification (2FA)


2. Use passkeys instead of passwords for stronger security.


3. Reset your password if it appears in large leaked credential dumps.





---

Why This Matters

Because many people reuse passwords, attackers could use these leaked credentials in credential stuffing attacks (trying the same password on many sites).

Infostealer malware is especially dangerous: it bypasses traditional organizational defenses by stealing directly from user devices.

Even if most credentials are “old,” the newly leaked ones (16.4M) represent fresh risk.

Long-term threat: these credentials can be exploited for a long time, especially if users don’t improve their security practices.



---

✅ What You Should Do (If You're a Gmail User)

1. Check Have I Been Pwned (HIBP) to see if your email appears in the leak.


2. If your credentials are exposed, change your password, especially if you’re reusing it on other sites.


3. Enable 2-Factor Authentication (2FA) — this adds a crucial extra layer of protection.


4. Use a password manager to generate and store strong, unique passwords.


5. Keep your device clean: use antivirus / anti-malware, avoid installing suspicious software, and update your system regularly.




---

Bottom Line

This is not a Gmail server hack — but a massive credential dump collected via malware from users’ devices.

The scale is worrying (183M!), but most of the data is recycled. Still, the newly exposed credentials are a real threat.

The incident highlights how important good password hygiene and strong authentication (2FA / passkeys) are in today’s threat landscape.
#GoogleDocsMagic #SecurityAlert
#SecurityAlert Security Alert: Claiming DMT Token Airdrop carries a fraud risk. Users are advised to revoke the authorization as soon as possible On November 20th, GoPlus issued a security alert. Users who received the DMT token airdrop are recommended to revoke authorization or transfer their assets to a secure wallet as soon as possible. There have been multiple reports of stolen assets today. When claiming the DMT airdrop, users were tricked into authorizing other tokens, resulting in the theft of assets from thousands of users. The cross-chain transfer of assets exceeded $130,000. Currently, the @dexmaxai Twitter account and official website have been taken offline.
#SecurityAlert

Security Alert: Claiming DMT Token Airdrop carries a fraud risk. Users are advised to revoke the authorization as soon as possible

On November 20th, GoPlus issued a security alert. Users who received the DMT token airdrop are recommended to revoke authorization or transfer their assets to a secure wallet as soon as possible. There have been multiple reports of stolen assets today. When claiming the DMT airdrop, users were tricked into authorizing other tokens, resulting in the theft of assets from thousands of users. The cross-chain transfer of assets exceeded $130,000. Currently, the @dexmaxai Twitter account and official website have been taken offline.
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number