weblogs

Heard about the XYZ hacks yet? Losses in millions but couldn't find what actually happened? We have you covered, read out the revealing, intricate and statistical intelligence about blockchain security and cybersecurity.

    featured weblog

    How Can a VPN Protect You From Spying?

    VPN uses a private network that helps users mask their surfing history on the internet, hackers even advertisers can’t steal the data and use it for their means. 

    More Weblogs

    Pickle Finance Hack Analysis & PoC

    On 21sth November 2021, Pickle finance was hacked, where an attacker was able to drain $19M DAI from the pDai jar. The attack exploited multiple inconsistencies & flaws in the logic of the pickle jar contract.

    Blockchain Trilemma: The Three Fighting Factors

    Blockchain Trilemma - coined by Vitalik Buterin himself, is a condition in which the blockchain undergoes a compromising stage. It is truly believed that a fully decentralized network can never be scalable and secured at the same time.

    Social Engineering: Classification & Prevention

    Social Engineering is an art, where an attacker manipulates people to extract confidential information. That information could be used in various ways by criminals. Individuals are targeted to install malicious software that could give cybercriminals access to their operating systems,

    Red, Blue & Purple Team: Attacker, Defender & Facilitator

    Building an effective & secure platform is critical! In this era of rising technologies, it is becoming more and more complex to manage security. Conducting a red team vs blue team exercise could be an eye-opener for companies who seek optimum level protection against their network and systems.

    Rari Capital Hack Analysis & POC

    Rari capital got hacked for around $79M through a classic re-entrancy attack. Rari is a fork of compound finance which had this bug fixed earlier. It is not the first time Rari has been a victim of a hack.

    Beanstalk Hack Analysis & POC

    Beanstalk protocol got hacked for around $74M through exploiting the governance mechanism & stealing all the BEANS & Curve LP tokens stored in the Beanstalk protocol.

    The Rise and Fall of Proof of Work: Is Proof Of Stake The Inevitable Solution?

    Consensus algorithms are undoubtedly a major building block of blockchain technology. By definition, no single party can control the operation of a blockchain network, so consensus algorithms are relied on to achieve a common agreement.

    The DAO Dichotomy: Public Interest Or Personal Gain?

    DAOs can be seen as the next step in achieving this vision, eliminating the use of intermediaries in corporate governance. Functioning via an interconnected network of smart contracts, these Decentralized Autonomous Organizations are essentially communities that are fully managed and owned by their members.

    Achieving Security In Blockchain Part One: Outlining The Problem

    A major pillar of blockchain technology is transparency. This means that any system built on blockchain is by definition public- a fact that introduces an entirely new set of vulnerabilities and threats. As a result, cleverly orchestrated hacks on blockchain solutions are not an uncommon feat. Even the biggest names in the field continue to suffer from attacks, resulting in losses equating to millions of dollars. 

    Designed & Developed by: 
    All rights reserved. Copyright 2020-21