weblogs

Heard about the XYZ hacks yet? Losses in millions but couldn't find what actually happened? We have you covered, read out the revealing, intricate and statistical intelligence about blockchain security and cybersecurity.

    featured weblog

    GameFi: Future of Gaming or Short-lived Gimmick?

    On the surface, the GameFi industry sounds revolutionary. However, digging a little deeper reveals several questions about its legitimacy. What are the risks associated with its play-to-earn model? Are all games which claim to be a part of GameFi credible? And, at the end of the day, is this a viable direction for gaming, or nothing more than a short-lived gimmick?

    More Weblogs

    GameFi: Future of Gaming or Short-lived Gimmick?

    On the surface, the GameFi industry sounds revolutionary. However, digging a little deeper reveals several questions about its legitimacy. What are the risks associated with its play-to-earn model? Are all games which claim to be a part of GameFi credible? And, at the end of the day, is this a viable direction for gaming, or nothing more than a short-lived gimmick?

    Consumer Privacy & Data Breach Part II - Is Web 3.0 The Cure?

    When the dot-com bubble burst, the technology modifications accelerated, and web 1.0 transformed into web 2.0. User-generated content took a boom, that allowed users to interact with the content and share their thoughts. But, the happiness wasn’t long-lived, the people soon realized that their information is being tracked and used for target marketing.

    Harvest Finance Hack Analysis & POC

    Harvest finance got hacked for around $34M due to a flashloan attack which manipulated the price in the Curve pool to retrieve more USDT tokens than originally deposited USDT amount in fUSDT pool.

    Consumer Privacy & Data Breach Part I - Is It a Global Issue?

    About 45% of the world’s population uses social media which makes approximately 3.48 billion people to be interacting with any kind of social media network. These tremendous amounts of connections can lead to various kinds of vulnerabilities if the data is gone into the wrong hands creating pretty damaging consequences.

    The State of Startups Security in Pakistan

    The security team at BlockApex decided to test these applications for vulnerabilities that could compromise their data. We knew that the software industry in Pakistan always keeps security out of their toolkit to reduce the cost of development.

    Pickle Finance Hack Analysis & PoC

    On 21sth November 2021, Pickle finance was hacked, where an attacker was able to drain $19M DAI from the pDai jar. The attack exploited multiple inconsistencies & flaws in the logic of the pickle jar contract.

    Blockchain Trilemma: The Three Fighting Factors

    Blockchain Trilemma - coined by Vitalik Buterin himself, is a condition in which the blockchain undergoes a compromising stage. It is truly believed that a fully decentralized network can never be scalable and secured at the same time.

    Social Engineering: Classification & Prevention

    Social Engineering is an art, where an attacker manipulates people to extract confidential information. That information could be used in various ways by criminals. Individuals are targeted to install malicious software that could give cybercriminals access to their operating systems,

    Red, Blue & Purple Team: Attacker, Defender & Facilitator

    Building an effective & secure platform is critical! In this era of rising technologies, it is becoming more and more complex to manage security. Conducting a red team vs blue team exercise could be an eye-opener for companies who seek optimum level protection against their network and systems.

    1 2 3 4
    All rights reserved. Copyright 2020-21