Security Threats to Blockchain Networks – 5 – Consensus Attacks

Consensus Attacks: A Deep-dive Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...

Diving into the $320M Wormhole Bridge Hack

The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana. Early February of 2022 was...

Quantum Computing Risks to Cryptocurrencies – Bitcoin, Ethereum, and Beyond

Introduction Cryptocurrencies like Bitcoin and Ethereum derive their security from cryptographic algorithms – mathematical puzzles that are practically impossible for classical computers to solve in...

Blockchain and Crypto Security Training – Free

I’ve been providing blockchain security and crypto compliance training awareness sessions since 2013. I’m sharing my latest blockchain security training material under the Creative Commons...

$320M DeFi Hack

Wormhole, one of the largest bridges between Solana and other blockchains, has been hacked 120k wETH, or about $320M — making it the second...

$30M Stolen From Grim Finance

DeFi protocol Grim Finance said about $30 million was stolen by hackers exploiting a reentrancy vulnerability in their platform. A security flaw in the...

Gleaming Wisdom from the Strange $170M BitGrail Hack

Around $170M worth of cryptocurrency was allegedly stolen from an obscure Italian crypto exchange called BitGrail in 2018; it’s still unclear exactly how or...

How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...

This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical...

Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy

Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy Market attacks Rely on the mass-manipulation of investors...

Binance Has a $1B Hack Insurance

Binance Has a $1B War Chest for Hack Protection. Amid a flurry of multi-million dollar cryptocurrency exchange hacks, Binance has allocated $1 billion to...

Cybercrime in China – a Growing Threat for the Chinese Economy

Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...

How KuCoin Survived a Massive Hack of $285M Worth of Crypto...

When attacked, some crypto projects and exchanges buckle and fold under pressure; KuCoin set the standard in 2020 for how to react to crypto...

Proof of Reserve vs. Proof of Liability vs. Proof of Solvency

Recent events like the FTX meltdown have sparked interest and conversations about how the incident could have been prevented.  In the case of FTX,...

The Other Side of NFT – The Scams and the Threats

In November 2021, a popular Twitter user and cryptocurrency enthusiast @Oxflim tweeted about a particularly nasty incident that happened to him. He lost his...

Tracing Private Cryptocurrencies

Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case. Are popular cryptocurrencies like Bitcoin and Ethereum private? Absolutely...