Let's Talk

Blog

Explained: The BadgerDAO Hack (December 2021)

12/08/2021

What Is a Multisig Wallet and How Do I Create One?

12/03/2021

Explained: The Lever Hack (November 2021)

12/02/2021

Explained: The Zenon Network Hack (November 2021)

11/29/2021

Explained: The Synapse and Nerve Bridge Hacks (November 2021)

11/25/2021

Can Hardware Wallets Be Hacked?

11/22/2021

Hot Wallets vs Cold Wallets: What's the Difference?

11/16/2021

Explained: The Mochi Inu Governance Hack (November 2021)

11/16/2021

Explained: The bZx Hack (November 2021)

11/10/2021

Encrypted Email 101: How to Encrypt Your Emails and Protect Your Company Data

11/09/2021

Explained: The BXH Exchange Hack (October 2021)

11/03/2021

What Is SSO and Can It Make My Business More Secure?

11/02/2021

Explained: The CREAM Finance Hack (October 2021)

10/29/2021

Why Does Your Company Need a Penetration Test?

10/27/2021

Explained: The AVATerra Hack (October 2021)

10/22/2021

How Blockchain DDoS Attacks Work

10/19/2021

Explained: The OpenSea Wallet Takeover Vulnerability

10/14/2021

Ransomware 101: What Is Ransomware and How to Spot It on Your Network

10/12/2021

Explained: The Evolved Apes Rug Pull (September 2021)

10/06/2021

How to Choose a Password Manager

10/05/2021

Explained: The pNetwork Hack (September 2021)

10/04/2021

Explained: The Vee Finance Hack (September 2021)

09/27/2021

Password Management 101: How to Keep Your Passwords Safe

09/27/2021

What Is InfoSec?

09/21/2021

Explained: The Zabu Finance Hack (September 2021)

09/20/2021

Explained: The NowSwap Protocol Hack (September 2021)

09/17/2021

What Is a Flash Loan Attack?

09/14/2021

What Is Fuzz Testing (Fuzzing)?

09/10/2021

Crypto Hacks: Why They Happen and Why Some May Be a Good Thing

09/08/2021

Explained: The CREAM Finance Hack (August 2021)

09/03/2021

How Safe Is 2FA SMS?

09/02/2021

Explained: The xToken Hack (August 2021)

08/31/2021

Top DeFi and Blockchain Security Issues

08/30/2021

What Is Phishing: Attack Techniques and Examples

08/24/2021

3 Types of DNS Vulnerabilities and How to Prevent Them

08/23/2021

Explained: The Neko Network Hack (August 2021)

08/18/2021

How To Secure Wireless Devices In Public Settings: As Told by the NSA

08/17/2021

Explained: The Punk Protocol Hack (August 2021)

08/13/2021

Halborn Brings In Its Red Team To Fortify Sifchain’s Security

08/12/2021

Explained: The Poly Network Hack (August 2021)

08/11/2021

Explained: The Popsicle Finance Hack (August 2021)

08/10/2021

What Is Miner Extractable Value (MEV)?

08/05/2021

5 Phases of Ethical Hacking

07/30/2021

How Hackers Can Exploit Weak ECDSA Signatures

07/26/2021

How to Protect Your Site Against a DDoS Attack

07/21/2021

Explained: The THORChain Hack (July 2021)

07/20/2021

Explained: The Bondly Finance Hack (July 2021)

07/19/2021

What Is an Ethical Hacker?

07/16/2021

Explained: The ChainSwap Hack (July 2021)

07/12/2021

Exploring the Security of Algorand

07/07/2021

Explained: The StableMagnet Rugpull (June 2021)

07/03/2021

The Algorand Blockchain Explained

06/29/2021

Explained: The Africrypt “Hack”

06/23/2021

Explained: The Alchemix “Reverse Rug Pull” (June 2021)

06/21/2021

Explained: The Fake Ledger Wallet Scam (June 2021)

06/18/2021

5 Benefits of Using Blockchain for Cybersecurity

06/14/2021

What Is a Penetration Test?

06/07/2021

Explained: The Belt Finance Hack (May 2021)

06/03/2021

Explained: The BurgerSwap Hack (May 2021)

06/02/2021

Smart Contract Audits: 5 Reasons Your Blockchain Project Needs One

05/28/2021

What Is a Rug Pull in Crypto?

05/25/2021

Explained: The PancakeBunny Protocol Hack (May 2021)

05/21/2021

4 Ways to Protect Your Cryptocurrency Wallet From Hacks

05/19/2021

What Is Cryptojacking?

05/14/2021

Explained: The Rari Capital Hack (May 2021)

05/11/2021

What Is a Front-Running Attack?

05/07/2021

Explained: The Spartan Protocol Hack (May 2021)

05/05/2021

Explained: The Uranium Finance Hack (April 2021)

05/04/2021

5 Common Types of Blockchain Hacks

04/30/2021

How Security Differs By Blockchain Types

04/27/2021

Explained: The EasyFi Hack (April 2021)

04/22/2021

What Is Code Exploitation?

04/16/2021

Stolen Keys: 3 Ways You Can Keep Your Private Keys Safe

04/15/2021

Explained: The Fei Protocol Bug (April 2021)

04/08/2021

Understanding Error Handling Vulnerabilities in Solidity

04/05/2021

Explained: The ForceDAO Hack (April 2021)

04/05/2021

What Is a Sybil Attack?

04/02/2021

What Is a 51% Attack?

03/31/2021

How Polkadot's Parachain Model Reimagines Blockchain Security

03/29/2021

Blockchain vs Web Hacks: How Blockchain and Web Security Differ

03/23/2021

What is DNS Hijacking?

03/17/2021

How NFT Security Is Impacted by Blockchain Security

03/15/2021

Explained: The DODO DEX Hack (March 2021)

03/12/2021

What Is an Exit Scam?

03/12/2021

Explained: The PAID Network Hack (March 2021)

03/09/2021

Double-Spends vs. Blockchain Reorganizations

03/05/2021

What Is a Smart Contract?

03/04/2021

Explained: The Furucombo Evil Contract Hack (Feb 2021)

03/01/2021

Explained: The Alpha Homora DeFi Hack (Feb 2021)

02/28/2021

Blockchain Isn’t Unhackable: Here’s Why

02/25/2021

Explained: Inside the Tendermint DoS Vulnerabilities

02/17/2021

Explained: The Blockfolio Hack (Feb 2021)

02/09/2021

Is Your DEX Vulnerable to a Cyber Attack?

02/08/2021

Explained: Inside the Yearn v1 yDAI Hack (Feb 2021)

02/05/2021

The Risk of Insider Threats in Cryptocurrency

02/03/2021

Explained: Nexus Mutual CEO Hacked for $8 Million in Cryptocurrency (Dec 2020)

12/14/2020

Explained: The DeFi Protocol Pickle Finance Hack (Nov 2020)

12/10/2020

Smart Contract Audits are Only Step One for dApp Security

10/15/2020

DeFi “Test in Production” Narrative is a Worrisome Trend

10/15/2020

Decentralized Finance is Creating a New Type of Blockchain Hacker

10/14/2020
crossmenuchevron-down