Published inCoinmonksThe State of Web3 Security in 2024Challenges, innovations, and the path forward1d ago1d ago
Published inCoinmonksHow to Identify and Prevent Address Poisoning AttacksUncovering the Address Poisoning Incident and Preventing Cryptocurrency Losses Before It’s Too Late.May 20, 2024May 20, 2024
Published inInfoSec Write-upsEffortless Android Pen Testing on Macbook M1 and M2 (2024)Unlock the power of Android pen testing on Macbooks M1 and M2 with our comprehensive, step-by-step setup guide for practical success.Feb 8, 20242Feb 8, 20242
Published inInfoSec Write-upsDecrypting the $197 Million Euler Finance ExploitDissecting Euler Finance Examining the $197 Million Fraud Behind the Flash Loan AttackJan 23, 20241Jan 23, 20241
Published inCoinmonksA Guide on Crafting Robust Invariants with EchidnaMaster the art of crafting and testing robust invariants with Echidna — an essential guide for smart contract security.Jan 3, 2024Jan 3, 2024
Published inInfoSec Write-upsFuzzing Strategies Every Solidity Developer Should KnowExplore advanced smart contract security with Echidna — your go-to tool for automated vulnerability detection in Solidity, ensuring robust…Dec 10, 2023Dec 10, 2023
Published inInfoSec Write-ups22.6k+ GitHub Stars Note-Taking App Hit by XSS VulnerabilityCVE-2023–3067: Stored Cross Site Scripting Vulnerability on renowned note-taking thick client app TrilliumSep 17, 2023Sep 17, 2023
Published inInfoSec Write-upsSmart Contract Vulnerabilities Audit Checklist 2023List of Smart Contract Security Vulnerabilities for AuditingJul 11, 2023Jul 11, 2023
Published inInfoSec Write-upsSmart Contract Best PracticeTop 20 Smart Contract Security Best Practices ChecklistJun 23, 2023Jun 23, 2023
Published inInfoSec Write-upsSmart Contract Security Overview 2023Detailed Analysis of Projects & Blockchain CompromisedJun 14, 2023Jun 14, 2023