Skip to content
April 10, 2026
☍ CyberNoz
  • Home
Home›Mix›Bypass parsing of transaction data, users on the phishing site will transfer/approve ERC20 tokens without being alerted
Mix

Bypass parsing of transaction data, users on the phishing site will transfer/approve ERC20 tokens without being alerted

Cybernoz
April 11, 2023 1 min read
Share X / Twitter LinkedIn Reddit WhatsApp Email



MetaMask disclosed a bug submitted by ronnyx2017: https://hackerone.com/reports/1651429 – Bounty: $1000



Source link

Share X / Twitter LinkedIn Reddit WhatsApp Email
« Previous
How to Hack MFA (Multi-Factor Authentication)
Next »
The iceberg of web app exploits

Related Articles

All Mix →
An analysis of logic flaws in web of trust services Mix

An analysis of logic flaws in web-of-trust services

Table of Contents Abstract The Technology Behind WOT Services Attack Vector One – Distribution Of Content On Timelines Attack Vector Two – Namespace attacks Attack…

April 9, 2023 Cybernoz 5 min read
Security by the People Announcing HackerOnes FedRAMP Authorization Mix

Improving Public Bug Bounty Programs with Signal Requirements

HackerOne has added two improvements that increase vulnerability report quality for public disclosure and bug bounty programs: Signal Requirements and an updated Rate Limiter. Signal…

May 31, 2023 Cybernoz 3 min read
AWS Outage: Lessons Learned — Mix

AWS Outage: Lessons Learned —

Table of Contents What Happened? Root Cause: A Single-Region Control Plane Lessons Learned for Infrastructure Architects Security Edge: Lessons Learned Applied The Broader Pattern What’s…

October 22, 2025 Cybernoz 5 min read
The Resonance Of Understanding | Daniel Miessler Mix

The Resonance Of Understanding | Daniel Miessler

Resonance has intruiged me since I learned about the concept in high school. For those unfamiliar, it’s “the tendency of a system to oscillate at…

April 5, 2025 Cybernoz 2 min read
Seven Essential Components Of A Top Tier Attack Surface Management Program Mix

Seven Essential Components Of A Top-Tier Attack Surface Management Program

Table of Contents   1. Discover and Import  2. Add Context 3. Enrich 4. Risk Rank and Prioritize 5. Test 6. Remediate and Retest 7.…

June 7, 2023 Cybernoz 4 min read
The Connected Web: Why It’s Time For Strong Authentication Mix

The Connected Web: Why It’s Time For Strong Authentication

Table of Contents Security Authentication Strength: More Important Than Ever Strong Authentication Alternatives Conclusion Links It’s getting exciting in the world of cross-network authentication. Let’s…

April 13, 2025 Cybernoz 3 min read

Latest Posts

  • Storm-2755 Uses AiTM Hijacking to Divert Employee Salaries
  • Cyber Risk Metrics That Make Sense to Executives
  • UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign
  • Cybercrime Is An Industrialized Economy
  • ClickFix campaign delivers Mac malware via fake Apple page
  • Agbi
  • ArsTechnica
  • AttackDefense
  • Australiancybersecuritymagazine
  • Bankinfosecurity
  • Bleeping Computer
  • CISOOnline
  • CloudSecurity
  • ComputerWeekly
  • Crowdstrike
  • Cyber Security Ventures
  • CyberDefenseMagazine
  • CyberNews
  • Cyberscoop
  • CyberSecurity-Insiders
  • CyberSecurityDive
  • CyberSecurityNews
  • CyberWire
  • DarkReading
  • ExploitOne
  • GBHackers
  • Genel
  • HackerCombat
  • HackRead
  • HelpnetSecurity
  • IndustrialCyber
  • InfoSecurity
  • ITnews
  • ITSecurityGuru
  • Krebson
  • MalwareBytes
  • Mix
  • OTSecurity
  • PortSwigger
  • Rapid7
  • SCMP
  • securelist
  • Securityaffairs
  • SecurityWeek
  • techcrunch
  • TheCyberExpress
  • TheHackerNews
  • ThreatIntelligence-IncidentResponse
  • Tldrsec
  • Unit42
  • VendorResearch
  • welivesecurity
  • Wired
  • Zerosalarium
☍ CyberNoz

Cybersecurity News

  • Agbi
  • ArsTechnica
  • AttackDefense
  • Australiancybersecuritymagazine
  • Bankinfosecurity
  • Bleeping Computer
  • CISOOnline
  • CloudSecurity
  • ComputerWeekly
  • Crowdstrike
  • Cyber Security Ventures
  • CyberDefenseMagazine
  • CyberNews
  • Cyberscoop
  • CyberSecurity-Insiders
  • CyberSecurityDive
  • CyberSecurityNews
  • CyberWire
  • DarkReading
  • ExploitOne
  • GBHackers
  • Genel
  • HackerCombat
  • HackRead
  • HelpnetSecurity
  • IndustrialCyber
  • InfoSecurity
  • ITnews
  • ITSecurityGuru
  • Krebson
  • MalwareBytes
  • Mix
  • OTSecurity
  • PortSwigger
  • Rapid7
  • SCMP
  • securelist
  • Securityaffairs
  • SecurityWeek
  • techcrunch
  • TheCyberExpress
  • TheHackerNews
  • ThreatIntelligence-IncidentResponse
  • Tldrsec
  • Unit42
  • VendorResearch
  • welivesecurity
  • Wired
  • Zerosalarium
Archive
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
© 2026 Cybernoz. All rights reserved.