News & Resources

Here you will get updated, fine and OG - articles, papers, studies and reports.

15 October, 2024

The Rise of Phishing Attacks in Web3 Security

Phishing, a form of social engineering attack, tricks individuals into revealing sensitive information such as private keys or passwords by impersonating legitimate entities.

Read More

19 October, 2024

Q3 2024 Blockchain Hack Report

Phishing, a form of social engineering attack, tricks individuals into revealing sensitive information such as private keys or passwords by impersonating legitimate entities.

Read More

11 November, 2024

October 2024 Hack Report

October 2024 was marked by significant security breaches, with crypto asset losses totaling $126.93 million. The incidents targeted both centralized exchanges and decentralized platforms

Read More

23 November, 2024

Protecting Web3 from Human Exploits: Top Social Engineering Tactics

As Web3 grows, attackers exploit human psychology through social engineering tactics like phishing, baiting, and impersonation to gain access to sensitive data.

Read More

28 November, 2024

What is Liquid Staking? How does it work?

Liquid staking enables users to stake ETH without locking funds or running nodes. Platforms like Lido offer liquid staking tokens (LSTs) to represent staked assets and rewards.

Read More

29 November, 2024

Blockchain Security Review: August 2024

August 2024 saw over $313.86M in losses due to phishing scams, cross-chain vulnerabilities, and protocol-specific exploits, highlighting the urgent need for stronger blockchain security.

Read More

03 December, 2024

7 Game-Changing Crypto Wallet Security Tips for 2024-25

Protect your cryptocurrency wallet with these essential tips for 2024-25. Learn how to use cold storage, prevent phishing scams, secure seed phrases, and more to safeguard your digital assets.

Read More

04 December, 2024

Smart Contract Security: Common Vulnerabilities and Their Lasting Presence

Smart contracts have revolutionized blockchain transactions but are still prone to vulnerabilities. Learn about common risks like reentrancy attacks, authentication issues, and phishing threats.

Read More