Update 2 – Preparing for Devconnect Events

Last week, we posted an advisory update on recent events and potential travel considerations related to Devconnect. Safety is our first and primary consideration now, and we are closely monitoring…

Read More »

Update 2 – Preparing for Devconnect Events

Last week, we posted an advisory update on recent events and potential travel considerations related to Devconnect. Safety is our first and primary consideration now, and we are closely monitoring…

Read More »

Jutta’s update on bug bounty program and security audit

Hi, Jutta writing again – I initially introduced myself when we started the bounty program earlier this year and I’m happy to provide you with an update on what’s happening…

Read More »

Secured #2: Public Vulnerability Disclosures

Today, we disclosed the first set of vulnerabilities from the Ethereum Foundation’s Bug Bounty Programs. These vulnerabilities were previously discovered and reported directly to the Ethereum Foundation or client teams…

Read More »

Security Alert – Mist can be vulnerable when navigating to malicious DApps

Mist leaks some low level APIs, which Dapps could use to gain access to the computer’s file system and read/delete files. This would only affect you if you navigate to…

Read More »

The History of Casper – Chapter 2

This chapter describes the game theory and economic security modelling we were doing in the Fall of 2014. It recounts how the “bribing attacker model” led our research directly to…

Read More »

‘Biggest cyber risk is complacency, not hackers’ – UK Information Commissioner issues warning as construction company fined £4.4 million

The UK Information Commissioner has warned that companies are leaving themselves open to cyber attack by ignoring crucial measures like updating software and training staff.

Read More »

Secured no. 1

Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and…

Read More »

Secured #2: Public Vulnerability Disclosures

Today, we disclosed the first set of vulnerabilities from the Ethereum Foundation’s Bug Bounty Programs. These vulnerabilities were previously discovered and reported directly to the Ethereum Foundation or client teams…

Read More »

Trend Micro calls out vulnerabilities in metaverse security development

“Illegal or criminal activities are likely to flourish in the darkverse since it will be difficult to track and monitor,” Trend Micro said.

Read More »