CRITICAL UPDATE Re: DAO Vulnerability

An attack has been found and exploited in the DAO, and the attacker is currently in the process of draining the ether contained in the DAO into a child DAO….

Read More »

Fusaka $2,000,000 Audit Contest!

Today, we are excited to announce the start of the Fusaka audit contest, co-sponsored by Gnosis and Lido, hosted on Sherlock, and running for four weeks from September 15th. The…

Read More »

Fusaka $2,000,000 Audit Contest!

Today, we are excited to announce the start of the Fusaka audit contest, co-sponsored by Gnosis and Lido, hosted on Sherlock, and running for four weeks from September 15th. The…

Read More »

Secured no. 1

Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and…

Read More »

Secured no. 1

Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and…

Read More »

Recent Twitter Hack Proves the Vulnerability of Centralized Platforms

As the community was astounded by the bold hack of prominent Twitter accounts, it revealed the general vulnerability of centralised social media, where all information is kept at one place….

Read More »