Secured #2: Public Vulnerability Disclosures

Today, we disclosed the first set of vulnerabilities from the Ethereum Foundation’s Bug Bounty Programs. These vulnerabilities were previously discovered and reported directly to the Ethereum Foundation or client teams…

Read More »

Security Alert – Mist can be vulnerable when navigating to malicious DApps

Mist leaks some low level APIs, which Dapps could use to gain access to the computer’s file system and read/delete files. This would only affect you if you navigate to…

Read More »

The History of Casper – Chapter 2

This chapter describes the game theory and economic security modelling we were doing in the Fall of 2014. It recounts how the “bribing attacker model” led our research directly to…

Read More »

‘Biggest cyber risk is complacency, not hackers’ – UK Information Commissioner issues warning as construction company fined £4.4 million

The UK Information Commissioner has warned that companies are leaving themselves open to cyber attack by ignoring crucial measures like updating software and training staff.

Read More »

Secured no. 1

Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and…

Read More »

Secured #2: Public Vulnerability Disclosures

Today, we disclosed the first set of vulnerabilities from the Ethereum Foundation’s Bug Bounty Programs. These vulnerabilities were previously discovered and reported directly to the Ethereum Foundation or client teams…

Read More »

Trend Micro calls out vulnerabilities in metaverse security development

“Illegal or criminal activities are likely to flourish in the darkverse since it will be difficult to track and monitor,” Trend Micro said.

Read More »

Hackers Use Vulnerabilities of DeFi Platforms to Conduct About Half of all Attacks in Cryptocurrency Industry

Despite the series of obvious advantages, the DeFi platforms seem to face cyber attacks over and over again. The latest hack cost an exchange $3.8M. The road in the DeFi…

Read More »

Microsoft Advises Miners and Organizations to Build Their Resilience against Cyberattacks

There are some kinds of cyberattacks that blend in the ordinary network activity, so they are very easy to miss. How should an organization protect oneself against them?

Read More »

Not Unhackable: The Number of Blockchain Cyberattacks is Growing

Blockchain technology is considered to be secure and immutable due to its decentralized nature. But as it becomes more popular with new solutions popping up almost daily, hackers become inventive…

Read More »