The $160M Wintermute Hack: Inside Job or Profanity Bug?
Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance.
In order to understand...
How the Big Binance Bridge Hack Will Change the way People...
$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most...
The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts
Code reuse is considered best practice in software engineering. Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...
The Quantum Computing Threat
Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...
Security Threats to Blockchain Networks – 4 – Network Attacks
Network Attacks: A Deep-dive
Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....
Cybercrime in China – a Growing Threat for the Chinese Economy
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much...
Security Threats to Blockchain Networks – 2 – A Holistic Overview
The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a...
What You Need to Know about the $460M MtGox Hack of...
The full story behind the first major crypto hack and how much really was lost.
MtGox was one of the very first platforms on which...
How the Nomad Bridge Hack can Help Us Explore the Potential...
One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing.
Decentralization is a hot-button topic in...
Security Threats to Blockchain Networks – 6 – Wallet Attacks
Wallet Attacks: A Deep-dive
Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While...
The 5 Most Common Crypto Scams and How to Avoid Them
The DeFi revolution presents new risks and challenges for innovators, regulators, cybersecurity experts and early adopters of the powerful technology. These are the top...
The Other Side of NFT – The Scams and the Threats
In November 2021, a popular Twitter user and cryptocurrency enthusiast @Oxflim tweeted about a particularly nasty incident that happened to him. He lost his...
Proof of Reserve vs. Proof of Liability vs. Proof of Solvency
Recent events like the FTX meltdown have sparked interest and conversations about how the incident could have been prevented. In the case of FTX,...
Trying to Solve the Mysterious $200M BitMart Hack
A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing.
When a high-profile cyber attack takes place and hundreds of...
SWIFT Publishes a Study on Central Bank Digital Currency Network
The Society for Worldwide Interbank Financial Telecommunications (SWIFT), a messaging network that fosters functional communication amongst banks has unveiled its blueprint for a Central...