Crypto & Blockchain Security

The Quantum Computing Threat

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...

Introduction to Blockchain Layers 0, 1, and 2 Security

What Are Blockchains Layers 0, 1, and 2? A blockchain is a complex, multi-layered system.  Bitcoin, the original blockchain, maintained a distributed and decentralized digital...

BNB Chain Halted After Suspected Hack, $536M Compromised

BNB Chain has been halted after one of the biggest BNB holders started displaying erratic on-chain behavior, suggesting a hack. At around 17:30 UTC the...

How a $1B Flash Loan Led to the $182M Beanstalk Farms...

Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack The only way to understand how the Beanstalk Farms decentralized...

How the Nomad Bridge Hack can Help Us Explore the Potential...

One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing. Decentralization is a hot-button topic in...

How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...

Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...

Trying to Solve the Mysterious $200M BitMart Hack

A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing. When a high-profile cyber attack takes place and hundreds of...

How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...

This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security.  Check out the first two...

What the Biggest Blockchain Game’s Hack Reveals about the Future of...

Axie Infinity’s Ronin Bridge Hack for $551M worth of crypto assets could paradoxically lead to higher rates of blockchain adoption by showing that it’s...

Tracing Private Cryptocurrencies

Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case. Are popular cryptocurrencies like Bitcoin and Ethereum private? Absolutely...

Security Threats to Blockchain Networks – 6 – Wallet Attacks

Wallet Attacks: A Deep-dive Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While...

Cybersecurity of Blockchain & Blockchain for Cybersecurity

You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker,...

The 5 Most Common Crypto Scams and How to Avoid Them

The DeFi revolution presents new risks and challenges for innovators, regulators, cybersecurity experts and early adopters of the powerful technology. These are the top...

Binance Has a $1B Hack Insurance

Binance Has a $1B War Chest for Hack Protection. Amid a flurry of multi-million dollar cryptocurrency exchange hacks, Binance has allocated $1 billion to...

How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...

This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical...