A hacker took advantage of a weakness in Nomad’s code on August one by crafting a message that tricked the cross-chain protocol into sending stored tokens without having good authorization.Use Powerful Passwords: Build sophisticated passwords that include a mix of letters, numbers, and symbols. Stay clear of effortlessly guessable data like birth