You're scrolling through your favourite social media platforms like Twitter, Discord, and Telegram. You stumble upon DeTaSECURE, your trusted cybersecurity partner. You've been following their updates and benefiting from their insights for a while now. But today, something exciting catches your eye – the "Engage and Earn" contest! You can't help
Given that DeFi is heading towards mainstream adoption and the magnitude of recent attacks, security becomes a critical issue. As such, knowing DeFi hacks and exploits, what causes them, and how to prevent them is quintessential for those who wish to navigate the DeFi universe safely. DeFi has come a
If you are a developer or interested in building decentralised applications (dApps) on the blockchain, you may have heard the terms "web3 security auditor" and "web3 developer". While both roles are crucial to the success and security of dApps, they are vastly different in terms of responsibilities and skill sets.
Greetings, hackers! Have you recently started delving into the world of reviewing smart contracts? Are you among those who have just begun participating in the Code4rena challenges? Do you find yourself struggling to develop a proof of concept for your findings? If you answered yes to any of these questions,
Welcome to the first in our monthly Product Review Series. For the month of Jan 2023, we are going to focus on Kloudle, which is a Software-as-a-Service (SaaS) product for cloud security. Kloudle allows organizations to detect and fix misconfigurations within their cloud environments. The product has a clean, user-friendly
The Medibank hack began with the theft of credentials belonging to an individual with privileged access to Medibank’s internal systems. These credentials were sold and purchased on the dark web by an unconfirmed buyer who used them to gain access to Medibank’s internal system. Once inside, the threat
Let’s get into WHY? 51 % in the number of ransomware attacks across multiple sectors including critical infrastructure in 2022, said a report by CERT-IN. The recent cyberattack on the All India Institute of Medical Sciences (AIIMS) has once again put the spotlight on cybersecurity practices at government and critical
In the world of blockchain, tokens are considered assets. These assets have to be secured. It is the auditor’s responsibility to test a smart contract for vulnerabilities after the developers have completed creating it. Tokens are developed using smart contracts with the ERC-20 standard. So how to do it?
The Deribit Hack On the 1st of November 2022, the Deribit Cryptoccurrency exchange lost approximately US$ 28M in funds from their hot wallets. The attacker withdrew the funds using BTC, ETH, and USDC cryptocurrencies. According to reports, stolen keys were the cause of the attack. While the hacker did get