Tracing Private Cryptocurrencies
Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case.
Are popular cryptocurrencies like Bitcoin and Ethereum private?
Absolutely...
How the Nomad Bridge Hack can Help Us Explore the Potential...
One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing.
Decentralization is a hot-button topic in...
How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security. Check out the first two...
Crypto.com lost $35M in a Hack
Crypto.com, one of the biggest and best known cryptocurrency exchanges in the world announced that 483 of its users were hit in a hack...
Qubit Finance Hacked for $80 Million
Qubit Finance, a major decentralized digital finance platform, was hacked for $80 million in cryptocurrency. The largest crypto-hack so far this year was initially...
The $160M Wintermute Hack: Inside Job or Profanity Bug?
Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance.
In order to understand...
Diving into the $320M Wormhole Bridge Hack
The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana.
Early February of 2022 was...
How the Big Binance Bridge Hack Will Change the way People...
$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most...
Security Threats to Blockchain Networks – 5 – Consensus Attacks
Consensus Attacks: A Deep-dive
Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...
Why DevSecOps is Essential for the Blockchain Ecosystem
In recent years, many organizations have adopted more modern development practices, including Agile, Scrum, and DevOps. The goal of these new processes is to...
Proof of Reserve vs. Proof of Liability vs. Proof of Solvency
Recent events like the FTX meltdown have sparked interest and conversations about how the incident could have been prevented. In the case of FTX,...
$320M DeFi Hack
Wormhole, one of the largest bridges between Solana and other blockchains, has been hacked 120k wETH, or about $320M — making it the second...
Binance Has a $1B Hack Insurance
Binance Has a $1B War Chest for Hack Protection. Amid a flurry of multi-million dollar cryptocurrency exchange hacks, Binance has allocated $1 billion to...
Introduction to Zero-Knowledge Proofs
Proving knowledge of a secret is the basis of password-based authentication systems. The assumption is that only you know your password. If this is...
How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the...
















