Security Threats to Blockchain Networks – 5 – Consensus Attacks
Consensus Attacks: A Deep-dive
Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...
The Other Side of NFT – The Scams and the Threats
In November 2021, a popular Twitter user and cryptocurrency enthusiast @Oxflim tweeted about a particularly nasty incident that happened to him. He lost his...
Security Threats to Blockchain Networks – 6 – Wallet Attacks
Wallet Attacks: A Deep-dive
Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While...
Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy
Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy
Market attacks
Rely on the mass-manipulation of investors...
Security Threats to Blockchain Networks – 2 – A Holistic Overview
The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a...
Blockchain and Crypto Security Training – Free
I’ve been providing blockchain security and crypto compliance training awareness sessions since 2013.
I’m sharing my latest blockchain security training material under the Creative Commons...
How Crypto’s Biggest Hacker was Found but Never Identified
The $611M Poly Network exploit is the largest crypto hack to date in terms of mark-to-market value and all the stolen funds were returned,...
Blockchain Security
Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi)...
What You Need to Know about the $460M MtGox Hack of...
The full story behind the first major crypto hack and how much really was lost.
MtGox was one of the very first platforms on which...
The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts
Code reuse is considered best practice in software engineering. Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...
What the Biggest Blockchain Game’s Hack Reveals about the Future of...
Axie Infinity’s Ronin Bridge Hack for $551M worth of crypto assets could paradoxically lead to higher rates of blockchain adoption by showing that it’s...
Why DevSecOps is Essential for the Blockchain Ecosystem
In recent years, many organizations have adopted more modern development practices, including Agile, Scrum, and DevOps. The goal of these new processes is to...
$30M Stolen From Grim Finance
DeFi protocol Grim Finance said about $30 million was stolen by hackers exploiting a reentrancy vulnerability in their platform. A security flaw in the...
Qubit Finance Hacked for $80 Million
Qubit Finance, a major decentralized digital finance platform, was hacked for $80 million in cryptocurrency. The largest crypto-hack so far this year was initially...
How KuCoin Survived a Massive Hack of $285M Worth of Crypto...
When attacked, some crypto projects and exchanges buckle and fold under pressure; KuCoin set the standard in 2020 for how to react to crypto...