$30M Stolen From Grim Finance
DeFi protocol Grim Finance said about $30 million was stolen by hackers exploiting a reentrancy vulnerability in their platform. A security flaw in the...
Introduction to Zero-Knowledge Proofs
Proving knowledge of a secret is the basis of password-based authentication systems. The assumption is that only you know your password. If this is...
Blockchain and Crypto Security Training – Free
I’ve been providing blockchain security and crypto compliance training awareness sessions since 2013.
I’m sharing my latest blockchain security training material under the Creative Commons...
Trying to Solve the Mysterious $200M BitMart Hack
A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing.
When a high-profile cyber attack takes place and hundreds of...
The Quantum Computing Threat
Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...
What the $534M Coincheck Hack Taught Us All About Safe Storage...
The biggest crypto heist in history at the time it occurred in 2018 was an eye-opener for many reasons, not least of which for...
The 5 Most Common Crypto Scams and How to Avoid Them
The DeFi revolution presents new risks and challenges for innovators, regulators, cybersecurity experts and early adopters of the powerful technology. These are the top...
Blockchain Security
Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi)...
Cybercrime in China – a Growing Threat for the Chinese Economy
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...
Crypto.com lost $35M in a Hack
Crypto.com, one of the biggest and best known cryptocurrency exchanges in the world announced that 483 of its users were hit in a hack...
Security Threats to Blockchain Networks – 4 – Network Attacks
Network Attacks: A Deep-dive
Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....
Security Threats to Blockchain Networks – 5 – Consensus Attacks
Consensus Attacks: A Deep-dive
Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...
Introduction to Blockchain Layers 0, 1, and 2 Security
What Are Blockchains Layers 0, 1, and 2?
A blockchain is a complex, multi-layered system. Bitcoin, the original blockchain, maintained a distributed and decentralized digital...
$3.3M Hack of Profanity’s Vanity Ethereum Addresses
Ethereum custom addresses created via the Profanity tool have been hacked. Almost $3.3 million stolen from several custom ETH addresses. Attackers took advantage of...
How the Nomad Bridge Hack can Help Us Explore the Potential...
One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing.
Decentralization is a hot-button topic in...