$320M DeFi Hack
Wormhole, one of the largest bridges between Solana and other blockchains, has been hacked 120k wETH, or about $320M — making it the second...
Blockchain Security
Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi)...
Gleaming Wisdom from the Strange $170M BitGrail Hack
Around $170M worth of cryptocurrency was allegedly stolen from an obscure Italian crypto exchange called BitGrail in 2018; it’s still unclear exactly how or...
$3.3M Hack of Profanity’s Vanity Ethereum Addresses
Ethereum custom addresses created via the Profanity tool have been hacked. Almost $3.3 million stolen from several custom ETH addresses. Attackers took advantage of...
Cybersecurity of Blockchain & Blockchain for Cybersecurity
You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker,...
Diving into the $320M Wormhole Bridge Hack
The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana.
Early February of 2022 was...
How the Nomad Bridge Hack can Help Us Explore the Potential...
One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing.
Decentralization is a hot-button topic in...
What You Need to Know about the $460M MtGox Hack of...
The full story behind the first major crypto hack and how much really was lost.
MtGox was one of the very first platforms on which...
How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the...
Binance Has a $1B Hack Insurance
Binance Has a $1B War Chest for Hack Protection. Amid a flurry of multi-million dollar cryptocurrency exchange hacks, Binance has allocated $1 billion to...
How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security. Check out the first two...
Security Threats to Blockchain Networks – 3 – Smart Contracts
Smart Contract Risk and How to Mitigate It: A Deep-dive
The strengths of smart contracts are also the source of its weaknesses, and will always...
Cybercrime in China – a Growing Threat for the Chinese Economy
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...
Introduction to Blockchain Layers 0, 1, and 2 Security
What Are Blockchains Layers 0, 1, and 2?
A blockchain is a complex, multi-layered system. Bitcoin, the original blockchain, maintained a distributed and decentralized digital...
Trying to Solve the Mysterious $200M BitMart Hack
A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing.
When a high-profile cyber attack takes place and hundreds of...
















