About
Who we are
Who trusts us
Brand
Services
Security advisory-as-a-service
Advanced penetration testing
Smart contract audit
DevOps + automation
Sans Training
Resources
Careers
Blog
Contact
// Blog
Web3 Security News & More
Browse by Category
Featured
08.23.2022
Web3 Security Firm Halborn Raises $90M Series A Led by Summit Partners
Videos
02.21.2023
02.16.2023
02.15.2023
02.15.2023
02.10.2023
02.09.2023
01.27.2023
01.26.2023
01.19.2023
01.18.2023
01.17.2023
01.12.2023
01.05.2023
12.23.2022
12.19.2022
12.16.2022
12.08.2022
12.01.2022
11.22.2022
11.18.2022
11.14.2022
11.10.2022
11.07.2022
11.04.2022
10.31.2022
10.27.2022
10.26.2022
10.20.2022
10.13.2022
10.07.2022
10.06.2022
09.29.2022
09.22.2022
09.19.2022
09.15.2022
09.13.2022
09.08.2022
09.05.2022
09.01.2022
08.31.2022
08.29.2022
08.25.2022
08.19.2022
08.12.2022
08.09.2022
08.04.2022
07.12.2022
06.27.2022
Articles
11.07.2022
Explained: Hacks
Explained: The Team Finance Hack (October 2022)
11.03.2022
Web3
Blockchain’s Storage Problem Is Growing. Are There Any Solutions?
11.03.2022
Month in Review
Biggest DeFi Hacks in October 2022
11.01.2022
Explained: Hacks
Explained: The RTFKT Phishing Campaign (October 2022)
11.01.2022
Blockchain Security
What Is a BIP39?
10.28.2022
Blockchain Security
Top 5 Security Threats of Hardware Wallets
10.27.2022
Explained: Hacks
Explained: The OlympusDAO Hack (October 2022)
10.26.2022
Blockchain Security
DeFi Security Part 3: Smart Contract Vulnerabilities
10.21.2022
Explained: Hacks
Explained: The BNB Chain Hack (October 2022)
10.21.2022
Explained: Hacks
Explained: The BitKeep Hack (October 2022)
10.20.2022
Web3
Blockchain Consensus Mechanisms Compared
10.18.2022
Explained: Hacks
Explained: The Sovryn Hack (October 2022)
10.17.2022
Blockchain Security
DeFi Security Part 2: Consensus Vulnerabilities
10.13.2022
Blockchain Security
Don’t “Panic”: How Improper Error-Handling Can Lead to Blockchain Hacks
10.13.2022
Explained: Hacks
A “Hat Trick” of DeFi Hacks Underscores the Importance of DeFi Security
10.12.2022
Explained: Hacks
Explained: The 0xbad MEV Bot Hack (September 2022)
10.11.2022
Explained: Hacks
Explained: The Transit Swap Hack (October 2022)
10.05.2022
Web3
Bitcoin vs Ethereum: How Do They Compare?
10.03.2022
Blockchain Security
DeFi Security Part 1: Data Security Vulnerabilities
10.03.2022
Blockchain Security
Top 4 Smart Contract Use Cases
09.29.2022
Explained: Hacks
Explained: The Boy X Highspeed (BXH) Rug Pull (September 2022)
09.27.2022
Blockchain Security
How to Protect On-Chain Data on Public Blockchains
09.26.2022
Explained: Hacks
Explained: The Wintermute Hack (September 2022)
09.22.2022
Cybersecurity
What Is Network Segmentation?
09.20.2022
Explained: Hacks
Explained: The Profanity Address Generator Hack (September 2022)
09.20.2022
Explained: Hacks
Explained: The New Free DAO Hack (September 2022)
09.15.2022
Blockchain Security
The Role of Ethical Hacking in Blockchain Security
09.12.2022
Blockchain Security
What Is Timestamp Dependence?
09.08.2022
Explained: Hacks
Explained: The Kyber Network Hack (September 2022)
09.06.2022
Blockchain Protocols
What Is Solana?
09.02.2022
Explained: Hacks
Explained: The OptiFi Glitch (August 2022)
09.01.2022
Cybersecurity
What Is a Random Number Generator Attack?
1
2
3
4
5
6
7
8
9