hack

Ethical Hacking In Action: How To Steal $1.1M From A DeFi Smart Contract
  • Case Studies
  • cybersecurity

Ethical Hacking In Action: How To Steal $1.1M From A DeFi Smart Contract

A case study of ethical hacking detailing how Hacken’s L1 Researcher and Auditor, Bartosz Barwikowski, uncovered a deeply hidden bug in Weft Finance’s smart contract, exploited it to extract $1.1 million in assets (on a mainnet ledger copy) and ultimately helped secure the platform, leading him to confidently stake his own assets there.

6 Sep 2024

Securing Merkle Tree in OpenZeppelin’s MerkleProof.sol Library
  • Insights
  • cybersecurity

Securing Merkle Tree in OpenZeppelin’s MerkleProof.sol Library

**Role of a Merkle Tree**

A Merkle Tree is a data structure used in blockchain to ensure data integrity and efficient verification. Read how Hacken auditors joined the effort to secure OpenZeppelin’s MerkleProof.sol library.

3 Jul 2024

Best Practices For Secure MetaMask Snaps Development
  • Discover
  • cybersecurity

Best Practices For Secure MetaMask Snaps Development

In this guide, Hacken auditors will share best practices for secure MetaMask Snaps development to safeguard users’ assets and privacy.

5 Apr 2024

  • Discover
  • cybersecurity
  • +1

Curve Finance Liquidity Pools Hack Explained

What went wrong in July’s 2023 Curve Finance liquidity pools hack worth $69M. Hacken experts are here to explain.

11 Sep 2023

Wallet Security: Best Practices For Keeping Your Crypto Safe
  • Discover
  • cybersecurity
  • +2

Wallet Security: Best Practices For Keeping Your Crypto Safe

A crypto wallet can be a physical device or online platform that keeps your private and public keys so you can carry out transactions.

21 Mar 2023

Biggest Crypto Hacks & Their Causes
  • Discover
  • cybersecurity
  • +1

Biggest Crypto Hacks & Their Causes

What are the most influential crypto hacks, their causes and consequences. How to protect your Web3 project from similar hacks?

24 Feb 2023

Sybil Attack in Blockchain: Examples & Prevention
  • Insights
  • cybersecurity
  • +1

Sybil Attack in Blockchain: Examples & Prevention

A comprehensive guide on Sybil Attack, a security violation where an entity has numerous fake identities on a blockchain.  

16 Feb 2023

NFT Smart Contract Audit: Ultimate Guide
  • Discover
  • cybersecurity
  • +2

NFT Smart Contract Audit: Ultimate Guide

Smart contract vulnerabilities in NFTs lead to security issues. Regular NFT smart contract audits migitate the risks of hacks.

3 Feb 2023

Cross-Chain Bridge Security
  • Discover
  • crypto bridge
  • +1

Cross-Chain Bridge Security

Hacks of bridges account for more than 50% of in total value lost in DeFI. How to protect cross-chain bridges?

24 Jan 2023

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon