cybersecurity

Smart contract security Audit 101
  • Discover
  • cybersecurity
  • +2

Smart contract security Audit 101

As blockchain is revolutionizing industries, hacks and other security breaches threaten to derail it before it can really take off. To put it more specifically, blockchain itself is secure in most cases, but the apps that run it are not. Blockchain interacts with the apps via smart contracts, but it is still vulnerable to specific

9 Sep 2019

Microsoft to reward up to $40,000 on Azure Bug Bounty Program
  • Industry News
  • bug bounty
  • +3

Microsoft to reward up to $40,000 on Azure Bug Bounty Program

Infrastructure As A Service (IaaS) attacks is an IT department’s worst nightmare. Imagine a cybercriminal planting a backdoor inside your server, at which point they can consistently use to discreetly steal data. Furthermore, this does not only affect the bare-metal server as this backdoor will remain intact as the cloud infrastructure goes from one customer

20 Aug 2019

New Report: Unknown Data Scraper Breach
  • Insights
  • cybersecurity
  • +3

New Report: Unknown Data Scraper Breach

We have previously published reports on several data breaches that exposed personal data. One of the cases featured a MongoDB database that contained a large amount of scraped LinkedIn data, first identified as open to public access on October 5th.As of today, the number of records related to that breach has increased as more similar

19 Aug 2019

Mobile Application Penetration Testing Methodology
  • Discover
  • cybersecurity
  • +3

Mobile Application Penetration Testing Methodology

Introduction The Mobile Application Penetration Testing Methodology is a form of security testing used to analyze security from inside of a mobile environment. That built on OWASP mobile application security verification standard. The mobile application penetration testing methodology concentrates on client-side safety, file system, hardware, and network security. By conducting penetration tests, the company can

15 Aug 2019

90+ Cryptocurrency Exchanges are in Danger Because of the Outdated Library
  • Industry News
  • crypto exchange
  • +4

90+ Cryptocurrency Exchanges are in Danger Because of the Outdated Library

# Intro Crypto exchanges are the banks of the future, accumulating and operating with large amounts of clients’ funds and, due to the KYC process, are responsible for handling a considerable amount of sensitive data. Therefore, security is a serious issue that should be addressed in advance. We’ve decided to make a research regarding vulnerability

15 May 2019

DATA: The Path to a Mature Crypto Industry
  • Industry News
  • CER
  • +9

DATA: The Path to a Mature Crypto Industry

It is no secret that the crypto industry is still in its infancy. Lack of governmental regulation and industry rules has created a space for unfair players to use unethical and sometimes fraudulent techniques to gain an advantageous market position. One of the areas of major concern is trading volume numbers that are reported by

13 May 2019

AirAsia Partners with Hacken to Ensure the Highest Level of Data Security
  • Network
  • case study
  • +5

AirAsia Partners with Hacken to Ensure the Highest Level of Data Security

March 14. AirAsia, Asia’s largest low-cost carrier by passengers, has partnered with Estonian cybersecurity consultancy company Hacken to complement their security strategy to ensure the best user experience for their passengers. Under the agreement, Hacken will perform an advanced secure code review of AirAsia applications to support the company with PCI DSS compliance requirements. The

26 Mar 2019

Case study: Hacken performed a security analysis of CODEX
  • Case Studies
  • case study
  • +4

Case study: Hacken performed a security analysis of CODEX

Company name: CODEXCompany description: CODEX is a licensed trading platform for cryptocurrencies & digital assets, built on vanguard security infrastructure and revolutionary reward system.Service: Web application security assessment. “Any financial business includes risk and security management, which is especially important when it comes to the means of our users. Those who do not spend a

22 Mar 2019

Hacken performed security analysis of Ambrosus
  • Case Studies
  • case study
  • +4

Hacken performed security analysis of Ambrosus

Company name: AmbrosusCompany description: Ambrosus is a Blockchain and IoT Ecosystem, built for industrial data management.Service: Blockchain security review and penetration testing“We appreciated the quality of work done by the Hacken team. They were professional, and thorough in their audit, and allowed us to get a third party perspective on the security of AMB-NET and

27 Feb 2019

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo