program launch

Europe’s Top CEX–WhiteBIT–Trusts Hacken For Security
  • Case Studies
  • bug bounty
  • +3

Europe’s Top CEX–WhiteBIT–Trusts Hacken For Security

WhiteBIT has requested several blockchain security services. We explore their case and provide an exclusive interview with their CTO.

20 Mar 2023

Coinmetro Crypto Exchange: Deep Security Approach
  • Case Studies
  • bug bounty
  • +2

Coinmetro Crypto Exchange: Deep Security Approach

Coinmetro is Hacken’s long-time client, and we want to highlight the exchange’s unquestionable approach to security. Coinmetro exchange brief review Coinmetro is a centralized cryptocurrency exchange founded in 2018. The Estonia-based exchange is among the largest European custodians, with an average daily trade volume of around $1 million. Deep security approach Security has been the

16 Feb 2023

Hacken & KuCoin: pentests and bug bounties as CEXs’ keys to users’ trust
  • Case Studies
  • bug bounty
  • +2

Hacken & KuCoin: pentests and bug bounties as CEXs’ keys to users’ trust

In May 2021, KuCoin reached Hacken to order Penetration Testing, later they ordered Bug Bounty

21 Nov 2022

Full-house cybersecurity for Jungle NFT Marketplace
  • Case Studies
  • bug bounty
  • +3

Full-house cybersecurity for Jungle NFT Marketplace

The Best Cybersecurity Approach to NFT Marketplaces The case of Jungle confirms Hacken’s deep expertise in dealing with NFT projects. Our cybersecurity approach to NFT projects originates from their distinct needs and business context. Most NFT marketplaces have the following key business requirements: We know what NFT businesses need. We know the most common and

10 Nov 2022

Securing Crypto Exchange Against Vulnerabilities – Gate.io Success Story
  • Case Studies
  • bug bounty
  • +1

Securing Crypto Exchange Against Vulnerabilities – Gate.io Success Story

Gate.io Security Challenge Gate.io is listed among the top 10 crypto exchanges according to CoinMarketCap. Since its founding in 2013, the company has remained committed to making the safety and security of its users its top priority, which requires strong safety measures to protect its traders from hackers and fraudsters. To do this, Gate.io published

1 Jun 2022

Openware is partnering with Hacken to secure its Yellow Network
  • Network
  • bug bounty
  • +1

Openware is partnering with Hacken to secure its Yellow Network

Hacken team would like to share with you details about our new partnership. Openware, Blockchain B2B SaaS provider, has decided to partner with Hacken. Our company will perform the security assessment of Openware’s Yellow Network. The purpose of this partnership is to guarantee the security of assets belonging to the users of Yellow Network. Yellow

21 Dec 2021

Bug Bounty for Crypto Exchanges
  • Insights
  • analitycal assessment
  • +8

Bug Bounty for Crypto Exchanges

Table of Contents The merger of crypto and crypto hacks: A Short History Crypto exchange hacks Statistics Advantages of BB Can a researcher blackmail me? Afterword The merger of crypto and crypto hacks: A Short History 2009 — the bitcoin network was born when Satoshi Nakamoto mined the first block of the chain, known as

15 Jan 2019

Hacken will Help TTC Protocol to Protect Customer Data
  • Case Studies
  • bug bounty
  • +8

Hacken will Help TTC Protocol to Protect Customer Data

Company: TTC ProtocolCompany description: Social networking ecosystem on the blockchainService: Smart contract audit, penetration testing, and bug bounty

24 Sep 2018

What is Bug Bounty?
  • Discover
  • bug bounty
  • +3

What is Bug Bounty?

In our first post, we’ve made a brief introduction into HackenProof and explained why Bug Bounty is the cutting edge of cybersecurity services. The short argument is that Bug Bounty Platforms have access to a much greater talent base than traditional cybersecurity companies. In this post, we’d like to dig a bit deeper into what that

17 Jul 2018

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo