No Result
View All Result
  • Login
Wednesday, May 13, 2026
FeeOnlyNews.com
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
No Result
View All Result
FeeOnlyNews.com
No Result
View All Result
Home Cryptocurrency

OpenAI’s new cybersecurity push has a lesson for crypto: stop waiting for the hack

by FeeOnlyNews.com
20 hours ago
in Cryptocurrency
Reading Time: 6 mins read
A A
0
OpenAI’s new cybersecurity push has a lesson for crypto: stop waiting for the hack
Share on FacebookShare on TwitterShare on LInkedIn


Make CryptoSlate logo CryptoSlate preferred on Google logoGoogle logo

OpenAI introduced a new cybersecurity initiative, Daybreak, on May 11, designed to find, validate, and help fix software vulnerabilities before attackers can exploit them.

The firm describes the approach as making software “resilient by design,” moving security earlier into the build cycle through AI-assisted code review, threat modeling, patch validation, and dependency analysis.

For crypto, where a software failure can result in an immediate capital loss within a single block, the urgency is clear.

The standard pattern in the crypto industry is reactive, going through a pre-launch audit, post-deployment monitoring, response when funds move, a post-mortem on the method, vulnerability patching, reimbursement negotiation, and governance debate.

That model has the weakness that the bug comes to light only once the capital has already moved. The window between deployment and exploit is when risk runs highest, and defenses run thinnest.

TRM Labs’ 2026 Crypto Crime Report showed that illicit actors stole $2.87 billion across nearly 150 hacks and exploits in 2025. Infrastructure attacks via compromised keys, wallet infrastructure, privileged access, front-end surfaces, and control planes drove $2.2 billion of that total.

Code exploits, the category most audits directly address, accounted for $350 million, or 12.1%.

Hacken’s data for the first quarter reinforces that audit-centric security has real limits, since Web3 lost $482 million across 44 incidents in a single quarter. Six of those incidents involved audited protocols, including one that had received 18 separate audits.

A $282 million theft involved no code exploit, with the attacker bypassing the contract layer entirely and compromising the operational and social infrastructure around it.

CertiK’s most recent wrench-attack report noted that 34 verified physical coercion incidents occurred globally between January and April 2026, up 41% from the same period in 2025, with estimated losses of approximately $101 million over those four months.

At that trajectory, CertiK estimates 2026 could close with around 130 incidents. The attack vector is now the person holding the key, the signer in the multisig, and the engineer with cloud console access.

The three datasets together describe a threat that has migrated well above the smart contract.

Breakdown for crypto lossesBreakdown for crypto losses
Infrastructure attacks drove $2.2 billion in crypto losses in 2025, outpacing code exploits at $0.35 billion by a ratio of more than six to one.

What “resilient by design” requires in crypto

Daybreak’s logic, applied to crypto, points toward a security posture that runs continuously through the protocol lifecycle.

OpenAI describes AI that can reason across entire codebases, identify subtle vulnerabilities, validate that fixes actually resolve the underlying issue, and bring that capability into the everyday build-and-deploy workflow as an ongoing function.

For crypto, that translates into specific operational requirements across the full stack where losses are now concentrated.

AI-assisted secure code review running before and throughout deployment would catch logic errors, access-control gaps, and unsafe assumptions before they reach mainnet. Continuous threat modeling across protocol upgrades would assess how each architecture update, oracle dependency, bridge design, or governance mechanism opens new attack surfaces.

Dependency and oracle risk analysis would flag when a third-party integration weakens the security model of the protocol that relies on it.

Patch validation before governance execution would confirm that the proposed fixes close the vulnerability and that the fixes themselves hold under adversarial conditions.

Privileged-access review for multisigs, signers, front-end deployments, and custody systems would run on a regular cadence as part of standard operating procedures. Monitoring that catches abnormal behavior before funds leave would compress the time between detection and response.

Security functionWhat it checksWhy it matters in cryptoAI-assisted secure code reviewContract logic, access controls, unsafe assumptions, upgrade-related bugs before and during deploymentHelps catch exploitable flaws before they reach mainnet, where failure can become immediate capital lossContinuous threat modelingHow protocol upgrades, architecture changes, governance mechanics, oracle links, and bridge designs create new attack surfacesKeeps security aligned with the protocol as it evolves, rather than treating risk as fixed at launchDependency and oracle risk analysisWhether third-party libraries, oracle providers, middleware, or bridge components weaken the protocol’s security modelMany major failures now come from the wider stack around the contract, not the contract alonePatch validation before governance executionWhether a proposed fix actually closes the underlying vulnerability and remains safe under adversarial conditionsPrevents governance from approving patches that look correct but leave the exploit path open or create a new onePrivileged-access reviewMultisigs, signers, custody systems, admin keys, cloud-console access, and front-end deployment permissionsInfrastructure attacks increasingly target the people and systems with authority to move funds or change protocol behaviorMonitoring before funds leaveAbnormal transaction patterns, suspicious signer behavior, unusual front-end changes, or withdrawal anomaliesCompresses the time between detection and response, giving teams a chance to intervene before losses escalate

Crypto protocols with extensive audit records can still have unmonitored front-end deployments or misconfigured multisigs, leaving them in an operational blind spot where 2025’s largest losses occurred.

CryptoSlate Daily Brief

Daily signals, zero noise.

Market-moving headlines and context delivered every morning in one tight read.

5-minute digest 100k+ readers

Free. No spam. Unsubscribe any time.

Whoops, looks like there was a problem. Please try again.

You’re subscribed. Welcome aboard.

OpenAI said bad actors can misuse expanded cyber capability, and Daybreak pairs its defensive tooling with verification, scoped access, safeguards, misuse monitoring, and stronger account controls.

The same AI capabilities that help defenders review code, validate patches, and model threats can help attackers accelerate phishing, generate convincing fake front ends, clone legitimate protocols, analyze dependency chains for exploitable weaknesses, and scale social engineering across custodians, signers, and support channels.

Hacken’s data ranked phishing among the leading attack vectors, and CertiK’s data on physical coercion showed attackers targeting people directly. Both categories involve social and operational manipulation, and AI operates at scale in both.

Two outcomes for crypto security

The bull case is that “resilient by design” becomes a competitive standard.

Protocols begin treating continuous code review, signer-policy audits, dependency checks, front-end integrity monitoring, and governance-execution validation as standard requirements throughout the protocol lifecycle.

In that model, audit certification gives way to the full operational stack of signers, upgrades, dependencies, and access controls proving resilience before execution.

OpenAI’s own approach, coupling more capable tooling with stronger verification and process controls, is an external template for that direction.

According to TRM’s data, if 76% of losses come from infrastructure, that is where the next security standard needs to operate. Protocols that can demonstrate continuous operational resilience would have an easier time making their case with insurers, regulators, and institutional allocators than those that present only a stack of audit certifications.

The bear case is that AI-assisted security stays a marketing layer.

Protocols add AI-powered security language to their documentation, and the underlying operational model stays fixed in pre-launch audits and post-exploit post-mortems.

Attackers use the same tools to scale phishing, clone front ends faster, and compromise support channels more convincingly than defenders improve their workflows.

Two outcomes for crypto securityTwo outcomes for crypto security
A scenario table maps two outcomes for crypto security: continuous AI-assisted defense in the bull case, AI as a marketing layer in the bear case.

Hacken’s finding that one attacker stole $282 million without touching a single line of contract code shows that the attack surface extends beyond the contract layer, and the industry’s current security framework covers only a portion of it.

The crypto industry has focused its security model on post-exploit response and point-in-time review, and the attack surface has moved well beyond that frame.



Source link

Tags: CryptoCybersecurityHackLessonOpenAIspushstopWaiting
ShareTweetShare
Previous Post

Public Storage (PSA): Lager-Gigant vor Big-Picture-Breakout!

Next Post

Gong ARR exceeds $500m calming AI fears

Related Posts

Strategy Estimated to Have Bought 2,110 BTC Today Using STRC Proceeds

Strategy Estimated to Have Bought 2,110 BTC Today Using STRC Proceeds

by FeeOnlyNews.com
May 13, 2026
0

Key TakeawaysStrategy is estimated to have bought 2,110 BTC on May 13, funded by proceeds from its STRC preferred stock...

DeFi App Legend Shuts Down After Missing Growth Targets

DeFi App Legend Shuts Down After Missing Growth Targets

by FeeOnlyNews.com
May 13, 2026
0

Decentralized finance mobile “superapp” Legend has announced it is winding down after about two years of operation, adding to a...

Trump directs USTR Greer to impose more tariffs, raising fresh concerns for crypto miners

Trump directs USTR Greer to impose more tariffs, raising fresh concerns for crypto miners

by FeeOnlyNews.com
May 12, 2026
0

President Trump is pushing for another round of tariffs, directing US Trade Representative Greer to ratchet up trade barriers. The...

FOP Targets Key CLARITY Act Provision, Warning It Could Weaken Crypto Enforcement

FOP Targets Key CLARITY Act Provision, Warning It Could Weaken Crypto Enforcement

by FeeOnlyNews.com
May 12, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure The National Fraternal Order of Police (FOP),...

U.S. Senate Confirms Pro-Crypto Kevin Warsh To Federal Reserve Board

U.S. Senate Confirms Pro-Crypto Kevin Warsh To Federal Reserve Board

by FeeOnlyNews.com
May 12, 2026
0

The U.S. Senate has confirmed Kevin Warsh as a member of the Federal Reserve board, marking a key step towards...

What Is the CLARITY Act? The US Crypto Bill That Could Reshape Digital Asset Regulation This  Week

What Is the CLARITY Act? The US Crypto Bill That Could Reshape Digital Asset Regulation This  Week

by FeeOnlyNews.com
May 12, 2026
0

With the Senate Banking Committee releasing a new 309-page draft of the CLARITY Act this week ahead of Thursday’s markup,...

Next Post
Gong ARR exceeds 0m calming AI fears

Gong ARR exceeds $500m calming AI fears

The ‘King of Comics’ finally gets his due as New York names a Lower East Side street after Jack Kirby

The 'King of Comics' finally gets his due as New York names a Lower East Side street after Jack Kirby

  • Trending
  • Comments
  • Latest
The New Medicare Coding Change Confusing Pharmacies Across Multiple States

The New Medicare Coding Change Confusing Pharmacies Across Multiple States

May 11, 2026
The 27 Largest US Funding Rounds of March 2024 – AlleyWatch

The 27 Largest US Funding Rounds of March 2024 – AlleyWatch

April 17, 2026
Wells Fargo Transfer Partners: What to Know

Wells Fargo Transfer Partners: What to Know

April 16, 2026
Week 14: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

Week 14: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

April 6, 2026
The 16 Largest Global Startup Funding Rounds of March 2026 – AlleyWatch

The 16 Largest Global Startup Funding Rounds of March 2026 – AlleyWatch

April 21, 2026
The Justice Department Indicts the Ministry of Love

The Justice Department Indicts the Ministry of Love

May 2, 2026
Jensen Huang joins Trump’s China trip after the U.S. president called the Nvidia CEO

Jensen Huang joins Trump’s China trip after the U.S. president called the Nvidia CEO

0
Strategy Estimated to Have Bought 2,110 BTC Today Using STRC Proceeds

Strategy Estimated to Have Bought 2,110 BTC Today Using STRC Proceeds

0
Your New Medical Problem: Where Are All These New Diseases Coming From?

Your New Medical Problem: Where Are All These New Diseases Coming From?

0
Healthcare quantum technologies co NVision raises m

Healthcare quantum technologies co NVision raises $55m

0
The Missing Elephant: India’s Silence on the US-Israel-Iran War

The Missing Elephant: India’s Silence on the US-Israel-Iran War

0
Soybeans Gains Holding on Monday’s Midday

Soybeans Gains Holding on Monday’s Midday

0
Strategy Estimated to Have Bought 2,110 BTC Today Using STRC Proceeds

Strategy Estimated to Have Bought 2,110 BTC Today Using STRC Proceeds

May 13, 2026
Healthcare quantum technologies co NVision raises m

Healthcare quantum technologies co NVision raises $55m

May 13, 2026
The Missing Elephant: India’s Silence on the US-Israel-Iran War

The Missing Elephant: India’s Silence on the US-Israel-Iran War

May 13, 2026
Cipla Q4 Results: Profit falls 55% YoY to Rs 555 crore; co declares Rs 13/sh dividend

Cipla Q4 Results: Profit falls 55% YoY to Rs 555 crore; co declares Rs 13/sh dividend

May 13, 2026
India more than doubles bullion import taxes to 15% as trade deficit widens (XAUUSD:CUR:Commodity)

India more than doubles bullion import taxes to 15% as trade deficit widens (XAUUSD:CUR:Commodity)

May 13, 2026
DeFi App Legend Shuts Down After Missing Growth Targets

DeFi App Legend Shuts Down After Missing Growth Targets

May 13, 2026
FeeOnlyNews.com

Get the latest news and follow the coverage of Business & Financial News, Stock Market Updates, Analysis, and more from the trusted sources.

CATEGORIES

  • Business
  • Cryptocurrency
  • Economy
  • Financial Planning
  • Investing
  • Market Analysis
  • Markets
  • Money
  • Personal Finance
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Strategy Estimated to Have Bought 2,110 BTC Today Using STRC Proceeds
  • Healthcare quantum technologies co NVision raises $55m
  • The Missing Elephant: India’s Silence on the US-Israel-Iran War
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclaimers
  • About Us
  • Contact Us

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.