blockchain

Crypto Exchange Security Audit – Full Guide
  • Discover
  • analitycal assessment
  • +4

Crypto Exchange Security Audit – Full Guide

Crypto exchanges are lucrative targets for hackers. Find about vulnerabilities, threats, and ways exchanges protect your assets.

1 Nov 2019

TOP-100 Exchanges By Cybersecurity Score  #2 (July 2019)
  • Insights
  • analitycal assessment
  • +9

TOP-100 Exchanges By Cybersecurity Score #2 (July 2019)

It’s natural for cryptocurrency traders to be concerned about the cybersecurity of their favorite crypto exchanges. The crypto scene’s track record of hacks is particularly alarming, considering the enormous $850 million stolen from exchanges in 2018 and already $219 million hacked in 2019 so far. Recent cybertheft victims include DragonEx ($7 million), CoinBene ($105 million),

8 Jul 2019

Hacken cooperates with EOSPARK & Creates an Awesome EOS Security list
  • Network
  • blockchain
  • +5

Hacken cooperates with EOSPARK & Creates an Awesome EOS Security list

We are continually striving to improve the quality of our auditing services including our EOS Smart Contract Audit. Thus, we have established a new valuable partnership to exchange experience and knowledge. The Hacken team is proud to announce our cooperation with EOSPARK.

24 Jan 2019

TOP 100 Crypto Exchanges According to The CER Cyber Security Score (CSS)
  • Insights
  • analitycal assessment
  • +9

TOP 100 Crypto Exchanges According to The CER Cyber Security Score (CSS)

It isn’t surprising that today, apart from the widely applied trade volume manipulations and an absence of transparency in crypto exchange operations, the cybersecurity is also the issue of the paramount importance (Learn more here). In March 2014, Poloniex lost $64,000; in August 2016, $77 million was stolen from Bitfinex; in half a year, Bithumb

21 Jan 2019

How DOTA Influenced Crypto: SCR Scam
  • Discover
  • analitycal assessment
  • +5

How DOTA Influenced Crypto: SCR Scam

So you wake up one winter morning and notice a friend request with a message «hi! I’m starting a new project, and your friend Sam has recommended you, check the details here : *weird file*». Bet you click it, and bet you won’t notice anything suspicious happening, but meanwhile, your laptop is getting slower and

28 Dec 2018

EOS Smart Contracts Audit Overview
  • Discover
  • blockchain
  • +2

EOS Smart Contracts Audit Overview

What is a smart contract audit and why is it necessary to perform? In general, an audit is performed to highlight any potential problems with a contract. There are, however, other areas where auditing can be used to test systems, networks, and applications in addition to checking smart contracts for bugs, vulnerabilities, and any loopholes.

17 Dec 2018

5 Reasons to Audit Smart Contract
  • Discover
  • blockchain
  • +2

5 Reasons to Audit Smart Contract

Let’s start with the simple question. Is your blockchain project fully protected from potential cyber threats? Before you answer, we want to inform you that a new cyber-attack takes place approximately every 40 seconds. With that in mind are you still confident in the level of security your company has? Of course, blockchain technology has

13 Dec 2018

Top 8 ICO Scams
  • Discover
  • analitycal assessment
  • +5

Top 8 ICO Scams

Even though ICOs are a comparatively recent phenomenon, they are one of the top-priority topics when it comes to the blockchain. Initial Coin Offering is a great fundraising mechanism for new projects; however, today it comes to decay as it has always brought up a hot discussion on whether it is simply a scam, a

14 Nov 2018

Crypto Exchange and Crypto Wallet Pentest Methodology
  • Discover
  • blockchain
  • +3

Crypto Exchange and Crypto Wallet Pentest Methodology

The necessity for a universal manual for testing crypto exchanges and crypto wallets With the amount of money and attention entering the burgeoning cryptocurrency market, it’s no surprise that crypto wallets and exchanges run the risk of being hacked. Theoretically, the problem could be resolved by identifying vulnerabilities and bugs in the application’s logic; however,

28 Sep 2018

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo