Home Crypto, Blockchain and DeFi Security

Crypto, Blockchain and DeFi Security

Blockchain User Security
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security.  Check out the first two...
Smart Contract Security Differences
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security.  Check out the...
Proof of Solvency
Recent events like the FTX meltdown have sparked interest and conversations about how the incident could have been prevented.  In the case of FTX,...
Blockchain Security Traditional Cybersecurity
Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...
12 Largest Crypto Hacks
The most comprehensive ranked list of the biggest crypto hacks in history (Up until November 1, 2022. I suspect a larger one is just...
Binance Bridge Hack
$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most...
Beanstalk Farms
Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack The only way to understand how the Beanstalk Farms decentralized...
Smart Contract Risks
Code reuse is considered best practice in software engineering.  Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...
Nomad Bridge Hack
One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing. Decentralization is a hot-button topic in...
ZKP Zero Knowledge Proofs
Proving knowledge of a secret is the basis of password-based authentication systems.  The assumption is that only you know your password.  If this is...
Poly Network Hack
The $611M Poly Network exploit is the largest crypto hack to date in terms of mark-to-market value and all the stolen funds were returned,...
Wintermute Hack
Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance.  In order to understand...
Blockchain Layers Security
What Are Blockchains Layers 0, 1, and 2? A blockchain is a complex, multi-layered system.  Bitcoin, the original blockchain, maintained a distributed and decentralized digital...
BitMart Hack
A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing. When a high-profile cyber attack takes place and hundreds of...
DevSecOps Blockchain
In recent years, many organizations have adopted more modern development practices, including Agile, Scrum, and DevOps.  The goal of these new processes is to...