The threat actor manipulated the platform by using Thena tokens to bypass the maximum supply cap and borrow several different digital assets.
Just another WordPress site
The threat actor manipulated the platform by using Thena tokens to bypass the maximum supply cap and borrow several different digital assets.