Crypto & Blockchain Security

What the $534M Coincheck Hack Taught Us All About Safe Storage...

The biggest crypto heist in history at the time it occurred in 2018 was an eye-opener for many reasons, not least of which for...

Security Threats to Blockchain Networks – 6 – Wallet Attacks

Wallet Attacks: A Deep-dive Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While...

What the Biggest Blockchain Game’s Hack Reveals about the Future of...

Axie Infinity’s Ronin Bridge Hack for $551M worth of crypto assets could paradoxically lead to higher rates of blockchain adoption by showing that it’s...

Security Threats to Blockchain Networks – 5 – Consensus Attacks

Consensus Attacks: A Deep-dive Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...

Security Threats to Blockchain Networks – 4 – Network Attacks

Network Attacks: A Deep-dive Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....

Security Threats to Blockchain Networks – 3 – Smart Contracts

Smart Contract Risk and How to Mitigate It: A Deep-dive The strengths of smart contracts are also the source of its weaknesses, and will always...

Diving into the $320M Wormhole Bridge Hack

The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana. Early February of 2022 was...

Security Threats to Blockchain Networks – 2 – A Holistic Overview

The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a...

Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy

Cyber-Attack Strategies in the Blockchain Era - A Framework for Categorizing the Emerging Threats to the Crypto Economy Market attacks Rely on the mass-manipulation of investors...

Tracing Private Cryptocurrencies

Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case. Are popular cryptocurrencies like Bitcoin and Ethereum private? Absolutely...

The 5 Most Common Crypto Scams and How to Avoid Them

The DeFi revolution presents new risks and challenges for innovators, regulators, cybersecurity experts and early adopters of the powerful technology. These are the top...

The Other Side of NFT – The Scams and the Threats

In November 2021, a popular Twitter user and cryptocurrency enthusiast @Oxflim tweeted about a particularly nasty incident that happened to him. He lost his...

How KuCoin Survived a Massive Hack of $285M Worth of Crypto...

When attacked, some crypto projects and exchanges buckle and fold under pressure; KuCoin set the standard in 2020 for how to react to crypto...

What You Need to Know about the $460M MtGox Hack of...

The full story behind the first major crypto hack and how much really was lost. MtGox was one of the very first platforms on which...

The Quantum Computing Threat

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...