Introduction to Blockchain Layers 0, 1, and 2 Security
What Are Blockchains Layers 0, 1, and 2?
A blockchain is a complex, multi-layered system. Bitcoin, the original blockchain, maintained a distributed and decentralized digital...
How Crypto’s Biggest Hacker was Found but Never Identified
The $611M Poly Network exploit is the largest crypto hack to date in terms of mark-to-market value and all the stolen funds were returned,...
How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security. Check out the first two...
Blockchain Security
Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi)...
How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...
This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical...
What You Need to Know about the $460M MtGox Hack of...
The full story behind the first major crypto hack and how much really was lost.
MtGox was one of the very first platforms on which...
Security Threats to Blockchain Networks – 3 – Smart Contracts
Smart Contract Risk and How to Mitigate It: A Deep-dive
The strengths of smart contracts are also the source of its weaknesses, and will always...
The $160M Wintermute Hack: Inside Job or Profanity Bug?
Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance.
In order to understand...
Security Threats to Blockchain Networks – 4 – Network Attacks
Network Attacks: A Deep-dive
Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....
How a $1B Flash Loan Led to the $182M Beanstalk Farms...
Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack
The only way to understand how the Beanstalk Farms decentralized...
$3.3M Hack of Profanity’s Vanity Ethereum Addresses
Ethereum custom addresses created via the Profanity tool have been hacked. Almost $3.3 million stolen from several custom ETH addresses. Attackers took advantage of...
How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...
Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...
How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the...
Transit Swap Hacker Returned 70% of the Money
A hacker that stole $23 million from the decentralized exchange (DEX) Transit Swap today returned $16M, or about 70% of the stolen Ethereum and...
Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy
Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy
Market attacks
Rely on the mass-manipulation of investors...
















