Crypto & Blockchain Security

What the $534M Coincheck Hack Taught Us All About Safe Storage...

The biggest crypto heist in history at the time it occurred in 2018 was an eye-opener for many reasons, not least of which for...

Security Threats to Blockchain Networks – 6 – Wallet Attacks

Wallet Attacks: A Deep-dive Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While...

Introduction to Zero-Knowledge Proofs

Proving knowledge of a secret is the basis of password-based authentication systems.  The assumption is that only you know your password.  If this is...

Why DevSecOps is Essential for the Blockchain Ecosystem

In recent years, many organizations have adopted more modern development practices, including Agile, Scrum, and DevOps.  The goal of these new processes is to...

Cybercrime in China – a Growing Threat for the Chinese Economy

Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...

$31 Million Hack of Meerkat Finance

On March 4, 2021 Binance Smart Chain-based yield farming protocol Meerkat Finance lost $31 million in user funds - just one day after launching...

How a $1B Flash Loan Led to the $182M Beanstalk Farms...

Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack The only way to understand how the Beanstalk Farms decentralized...

How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...

This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security.  Check out the...

Introduction to Blockchain Layers 0, 1, and 2 Security

What Are Blockchains Layers 0, 1, and 2? A blockchain is a complex, multi-layered system.  Bitcoin, the original blockchain, maintained a distributed and decentralized digital...

The Quantum Computing Threat

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...

How the Big Binance Bridge Hack Will Change the way People...

$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most...

$3.3M Hack of Profanity’s Vanity Ethereum Addresses

Ethereum custom addresses created via the Profanity tool have been hacked. Almost $3.3 million stolen from several custom ETH addresses. Attackers took advantage of...

Security Threats to Blockchain Networks – 3 – Smart Contracts

Smart Contract Risk and How to Mitigate It: A Deep-dive The strengths of smart contracts are also the source of its weaknesses, and will always...

Security Threats to Blockchain Networks – 2 – A Holistic Overview

The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a...

How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...

Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...