Crypto & Blockchain Security

Security Threats to Blockchain Networks – 3 – Smart Contracts

Smart Contract Risk and How to Mitigate It: A Deep-dive The strengths of smart contracts are also the source of its weaknesses, and will always...

Security Threats to Blockchain Networks – 4 – Network Attacks

Network Attacks: A Deep-dive Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....

Security Threats to Blockchain Networks – 5 – Consensus Attacks

Consensus Attacks: A Deep-dive Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...

Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy

Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy Market attacks Rely on the mass-manipulation of investors...

Security Threats to Blockchain Networks – 2 – A Holistic Overview

The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a...

How a $1B Flash Loan Led to the $182M Beanstalk Farms...

Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack The only way to understand how the Beanstalk Farms decentralized...

How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...

This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security.  Check out the first two...

Tracing Private Cryptocurrencies

Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case. Are popular cryptocurrencies like Bitcoin and Ethereum private? Absolutely...

Trying to Solve the Mysterious $200M BitMart Hack

A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing. When a high-profile cyber attack takes place and hundreds of...

How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security...

This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical...

The 5 Most Common Crypto Scams and How to Avoid Them

The DeFi revolution presents new risks and challenges for innovators, regulators, cybersecurity experts and early adopters of the powerful technology. These are the top...

Diving into the $320M Wormhole Bridge Hack

The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana. Early February of 2022 was...

Introduction to Blockchain Layers 0, 1, and 2 Security

What Are Blockchains Layers 0, 1, and 2? A blockchain is a complex, multi-layered system.  Bitcoin, the original blockchain, maintained a distributed and decentralized digital...

Introduction to Zero-Knowledge Proofs

Proving knowledge of a secret is the basis of password-based authentication systems.  The assumption is that only you know your password.  If this is...

How the Big Binance Bridge Hack Will Change the way People...

$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most...