How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the...
Cybersecurity of Blockchain & Blockchain for Cybersecurity
You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker,...
The 12 Biggest Hacking Incidents in the History of Crypto
The most comprehensive ranked list of the biggest crypto hacks in history (Up until November 1, 2022. I suspect a larger one is just...
Crypto.com lost $35M in a Hack
Crypto.com, one of the biggest and best known cryptocurrency exchanges in the world announced that 483 of its users were hit in a hack...
Trying to Solve the Mysterious $200M BitMart Hack
A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing.
When a high-profile cyber attack takes place and hundreds of...
Cybercrime in China – a Growing Threat for the Chinese Economy
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...
What You Need to Know about the $460M MtGox Hack of...
The full story behind the first major crypto hack and how much really was lost.
MtGox was one of the very first platforms on which...
Security Threats to Blockchain Networks – 5 – Consensus Attacks
Consensus Attacks: A Deep-dive
Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...
Diving into the $320M Wormhole Bridge Hack
The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana.
Early February of 2022 was...
Tracing Private Cryptocurrencies
Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case.
Are popular cryptocurrencies like Bitcoin and Ethereum private?
Absolutely...
How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...
Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...
The $160M Wintermute Hack: Inside Job or Profanity Bug?
Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance.
In order to understand...
$31 Million Hack of Meerkat Finance
On March 4, 2021 Binance Smart Chain-based yield farming protocol Meerkat Finance lost $31 million in user funds - just one day after launching...
The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts
Code reuse is considered best practice in software engineering. Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...
The Other Side of NFT – The Scams and the Threats
In November 2021, a popular Twitter user and cryptocurrency enthusiast @Oxflim tweeted about a particularly nasty incident that happened to him. He lost his...