HypernativeLabs

1.5K posts

HypernativeLabs banner
HypernativeLabs

HypernativeLabs

@HypernativeLabs

Detect and neutralize Web3 threats in real time. 200+ dApps, chains, wallets, and financial institutions rely on Hypernative to prevent hacks, exploits & fraud.

参加日 Ekim 2022
133 フォロー中14.1K フォロワー
固定されたツイート
HypernativeLabs
HypernativeLabs@HypernativeLabs·
.@Bitwise is expanding deeper into DeFi. With $15B+ in AUM, they’re launching new vault infrastructure on @Morpho and increasing direct onchain participation across allocation strategies, collaterals, and protocol interactions. To support that shift, Bitwise has selected Hypernative to integrate real-time exploit detection and automated response into their DeFi operations. As asset managers move from passive exposure to actively operating vaults, risk management must operate at the same speed as the market. We’re proud to support Bitwise as they scale institutional-grade DeFi strategies with built-in capital protection. Read the full announcement: buff.ly/DO1EUC6
HypernativeLabs tweet media
English
16
6
42
23K
HypernativeLabs
HypernativeLabs@HypernativeLabs·
Here is Gal Sagie, CEO of Hypernative, on what the @OxusFinance announcement represents for Latin America's stablecoin payments market. Read more: buff.ly/H7kO8KR
HypernativeLabs tweet media
English
0
0
0
175
HypernativeLabs
HypernativeLabs@HypernativeLabs·
Wallets, exchanges, and payment providers are where users interact with crypto. They're also where attackers are increasingly focused. Our latest blog draws from The Ultimate Guide to Web3 Security to break down the security controls that user-facing platforms need across the full transaction lifecycle: from pre-signing transaction clarity to real-time counterparty screening and automated response. buff.ly/Tfe4MPm
HypernativeLabs tweet media
English
0
1
2
242
HypernativeLabs
HypernativeLabs@HypernativeLabs·
Appreciate the shoutout 🫡
Alea Research@AleaResearch

On this Market Cap episode, our Director of Institutional Services @stefanosanabria speaks with @i0xmark, Business Development Lead at @Dialectic_Group. Dialectic is a crypto asset manager running a traditional quant fund alongside actively managed, risk-aware onchain vault strategies. They are increasingly focusing on flexible vault infrastructure and sourcing yield from real-world assets as crypto market inefficiencies compress. On Market Cap we feature firms and funds to explore the thinking that guides them, the patterns they observe, and other forces moving the markets. Chapters 1:25 RWAs Need Better Packaging To Work On DeFi Rails 2:40 “Everyone’s Unemployed” Means Consolidation 6:00 Institutions Were Here Since Coinbase Days 13:30 How Dialectic Actually Generates Returns 18:30 Mapping Hidden Risk To Avoid Another Blow Up 24:30 Trust Me Bro NAV and Hard Set Parameters 36:30 Six Month Social Engineering Attack Broke Drift 41:40 Why 3% On Aave Makes No Sense Vs T-Bills 57:00 FINMA License And What It Unlocks For Dialectic

English
0
1
1
1.1K
HypernativeLabs
HypernativeLabs@HypernativeLabs·
The Drift drain happened in 12 minutes. The setup took more than a week, and most of it was visible onchain the entire time. 4 signals a monitoring layer would have caught: 1️⃣ A governance monitoring rule would have flagged the Security Council migration on March 27: near-total signer turnover, 0-second timelock, all in a single transaction. Not proof of an attack, but exactly the kind of governance degradation that warrants immediate human review. 2️⃣ Five days later, the first admin authority change on Drift in an extended period targeted an address with no prior interaction history with the protocol. Combined with the earlier governance alert, the signal becomes unambiguous. 3️⃣ Then Spot Market #63, created for a token with no meaningful liquidity history, parameters outside the range of every existing market, and an unrecognized oracle source. Protocol-specific monitoring would have flagged this as an outlier across multiple dimensions at once. 4️⃣ Finally, 31 withdrawals draining $285M in under 12 minutes. A monitoring rule tracking withdrawal rate, size, and concentration would have triggered within the first two or three transactions. The monitoring layer doesn't replace policy enforcement. It closes the gap between observable staging and execution. Read the full breakdown: buff.ly/OTwAGDI
HypernativeLabs tweet media
English
3
1
1
346
HypernativeLabs
HypernativeLabs@HypernativeLabs·
DolaSavings lenders lost $240K on March 2. @AlchemixFi lost nothing. Early detection during the attacker's preparation phase, combined with pre-configured automated response, made the difference. The response was faster than the attack. Read the full case study: buff.ly/G67QuDp
HypernativeLabs tweet media
English
0
2
2
466
HypernativeLabs
HypernativeLabs@HypernativeLabs·
Haseeb is right to call this a watershed moment. But here's the thing: whether an exploit was designed by a human researcher over weeks or generated by an AI model in hours, Hypernative's detection is indifferent to origin. What matters is the onchain behavioral signature, and that signature is observable regardless of how the attack was constructed. The panic is understandable. The response should be architectural. hypernative.io/blog/from-evmb…
Haseeb >|<@hosseeb

This is terrifying. @AnthropicAI 's new unreleased Mythos model is so good at hacking, it found bugs in "every major operating system and web browser." 83.1% were exploited on first attempt. This thing is like COVID but for software. Actually apocalyptic in the wrong hands.

English
1
1
1
572
HypernativeLabs
HypernativeLabs@HypernativeLabs·
Some of the biggest crypto losses haven’t been hacks. They’ve been mistakes. The Bithumb incident is a perfect example: a massive transfer triggered by a manual error. In a financial system that runs 24/7 and moves billions instantly, manual verification cannot scale. Automation and independent verification layers are becoming essential guardrails. Hypernative's CRO Ulisse Dell'Orto went on @CNBCArabia's Crypto Weekly to explain why removing human error from critical workflows is one of the most important steps for institutional crypto security. Watch the full interview here: buff.ly/BCexbs4
English
0
1
2
1.8K
HypernativeLabs
HypernativeLabs@HypernativeLabs·
We are heading to Paris Blockchain Week on April 15-16 to meet the teams building the next phase of digital asset infrastructure. We’ll be talking about what it takes to operate safely onchain: real-time threat detection, transaction security, fraud prevention, and risk controls that work at institutional scale. If you’ll be in Paris, let’s meet.
HypernativeLabs tweet media
English
0
2
8
419
HypernativeLabs
HypernativeLabs@HypernativeLabs·
Whitelists amplify good processes. They amplify bad processes too. We covered this in detail during our recent @safe x Hypernative webinar. ▶️ Full recording: buff.ly/1VskLLr
English
0
3
10
5.6K
HypernativeLabs
HypernativeLabs@HypernativeLabs·
Always on the job. 24/7/365 🫡
Tori Finance@tori_finance

Tori runs 24/7 threat monitoring through @HypernativeLabs. The system detects exploit signatures, suspicious patterns, and unusual transactions, and can trigger an emergency pause in seconds. Off-chain security follows the same standard. Every account requires 2FA. No single person has unilateral access to funds. The Resolv attacker walked in through a stale AWS credential tied to one person's access. Even if someone got that far here, on-chain constraints mean the key alone can't mint a single unbacked token.

English
1
1
6
1.2K
HypernativeLabs
HypernativeLabs@HypernativeLabs·
When the DolaSavings exploit hit, @AlchemixFi didn't know exactly what was under attack. Alerts were firing on alUSD/DOLA Curve pools. The threat could have been DOLA, alUSD, or Curve itself. In an active exploit situation, that ambiguity is the problem. Pre-configured automation on the Hypernative platform paused the protocol before the attack fully unfolded. The team could focus on figuring out what was happening instead of racing to contain damage. Read the full case study: buff.ly/MtlE4xP
HypernativeLabs tweet media
English
0
3
5
998
HypernativeLabs がリツイート
Magma Devs
Magma Devs@magmadevs·
.@HypernativeLabs is integrating Smart Router to strengthen real-time onchain monitoring As they scale across 75+ chains, RPC reliability becomes critical. Smart Router ensures data consistency and reduces dependency on single providers Reliable data = better threat detection
Magma Devs tweet media
English
2
3
7
555
HypernativeLabs
HypernativeLabs@HypernativeLabs·
MiCA's full enforcement deadline is July 2026. Most digital asset firms are still running compliance tools built to look backward. AML infrastructure designed for the Bank Secrecy Act era was built for forensics: ingest, analyze, report. On a blockchain, by the time a retroactive tool flags a sanctioned address, the exposure is already on your books. Real-time compliance means screening before settlement, verifying every transaction before execution, and monitoring continuously with automated response. That's the standard regulators are moving toward, and what MiCA now requires. What that gap looks like, and what closing it actually requires: buff.ly/r1LiKiF
HypernativeLabs tweet media
English
0
2
4
546
HypernativeLabs
HypernativeLabs@HypernativeLabs·
A top-5 crypto exchange benchmarked three fraud vendors on the same dataset. One flagged $1.8M in at-risk funds before transactions cleared. The other two combined for $175,000. We're going live in two hours to walk through what separates the tools and how to build a fraud defense that stops losses before they happen. Register now: buff.ly/2Og42lH
HypernativeLabs tweet media
English
0
1
3
488
HypernativeLabs がリツイート
Noa
Noa@SeedsPuntoEth·
El 83% de los hackeos de DeFi en 2025 se debieron a fallos en el control de acceso. José Cardoso (@HypernativeLabs), @Pybast (@Corkprotocol) y @buda_kyiv sobre cómo se ve realmente la respuesta a incidentes en tiempo real, y lo que el hackeo de Cork por $12M le enseñó a la industria sobre las salas de guerra.
Español
0
3
8
545
HypernativeLabs
HypernativeLabs@HypernativeLabs·
In 2021, a Telegram marketplace you have never heard of became the largest illicit online marketplace in history. It processed over $28B(‼️) in illicit transaction volume before enforcement arrived in 2025. That four-year gap is what investigation-first fraud defense looks like in practice. Tonight we're breaking down why the model is failing and what a prevention-first approach actually requires. Join us tomorrow at 9 AM EST / 1 PM UTC: buff.ly/hssZIGI
HypernativeLabs tweet media
English
0
1
4
597
HypernativeLabs
HypernativeLabs@HypernativeLabs·
Every step of the Drift exploit passed through a gap where a hard control could have stopped the sequence. A few examples of what those controls would have looked like in practice: 1️⃣ New collateral markets required to meet objective standards before enablement. This blocks a token backed by $500 in wash-traded liquidity from becoming full collateral. 2️⃣ Authority changes required to target addresses on a pre-registered allowlist for at least 48 hours. This creates a cooling-off period before a newly migrated multisig can execute an admin transfer. 3️⃣ Blast radius limits preventing any single transaction from raising withdrawal ceilings across multiple markets simultaneously. This stops a sequence that removed every withdrawal safeguard at once. These aren't process suggestions. They're hard limits on what privileged operations are allowed to do. Read the full breakdown: buff.ly/eNR7Rvy
HypernativeLabs tweet media
English
0
0
2
546
HypernativeLabs
HypernativeLabs@HypernativeLabs·
A top-5 crypto exchange ran a head-to-head benchmark of three fraud detection vendors on the same dataset. Hypernative flagged $1.8M in at-risk funds before transactions cleared. The other two vendors combined for $175,000. 96% scam address detection in real time. Competitors detected less than half that and issued alerts a month after the fact. The gap between vendors isn't a feature difference. It's the difference between stopping fraud and documenting it. Read the full breakdown: buff.ly/A686J09
HypernativeLabs tweet media
English
0
0
1
507