cybersecurity

Smart Contract Bug Bounties: Beginner’s Guide To Web3 Bug Hunting
  • Discover
  • blockchain
  • +2

Smart Contract Bug Bounties: Beginner’s Guide To Web3 Bug Hunting

In this bug bounty guide, educational resources, useful tools and expert tips for smart contract bug hunters.

23 Aug 2018

Lifecycle of a Bug Bounty Program
  • Discover
  • bug bounty
  • +3

Lifecycle of a Bug Bounty Program

Bug bounty programs gradually become more and more mainstream and that’s great news for global cybersecurity. As we’ve discussed in our previous post, bug bounty programs provide companies with a convenient way to access a crowd of cybersecurity experts with various backgrounds without the need to actually pay for an army of cybersecurity experts. But

17 Aug 2018

What is White Hat Hacker?
  • Discover
  • cybersecurity
  • +1

What is White Hat Hacker?

You all know that Hacken aims to unite blockchain and IT businesses with the community of white hat hackers. However, what do you actually know about white hats? What hurdles do they experience during employment? How much money do they get? How people become white hat hackers? We interviewed experienced white hat hacker to receive

4 Aug 2018

Hacken becomes a cybersecurity partner of e-Mal
  • Case Studies
  • case study
  • +5

Hacken becomes a cybersecurity partner of e-Mal

Company: e-Mal Company description: financial eco-system on the blockchain Service: Smart contract audit and security assessment

24 Jul 2018

What is Bug Bounty?
  • Discover
  • bug bounty
  • +3

What is Bug Bounty?

In our first post, we’ve made a brief introduction into HackenProof and explained why Bug Bounty is the cutting edge of cybersecurity services. The short argument is that Bug Bounty Platforms have access to a much greater talent base than traditional cybersecurity companies. In this post, we’d like to dig a bit deeper into what that

17 Jul 2018

What is HackenProof?
  • Discover
  • bug bounty
  • +4

What is HackenProof?

Hello everyone and welcome to HackenProof Blog! This is our first post, where we would like to introduce ourselves. We’re going  to share a brief story with you about how we’ve created HackenProof, what do we do and why do we think it’s important. HackenProof was founded through a Hacken ICO in late 2017. Hacken

10 Jul 2018

Tokenaire Partners with Hacken to receive pentest and security assessment services
  • Case Studies
  • case study
  • +4

Tokenaire Partners with Hacken to receive pentest and security assessment services

Company: Tokenaire Company description: platform for storing files on the blockchain Service: Penetration testing and security assessment

22 Jun 2018

VeChain Launches Bug Bounty Program on HackenProof
  • Case Studies
  • bug bounty
  • +8

VeChain Launches Bug Bounty Program on HackenProof

Asian blockchain giant moves towards cybersecurity The spring started with the Asian tour: Hacken’s CEO Dmytro Budorin visited Hong Kong, Shanghai, Seoul, Dubai, and Kuala Lumpur. On March 31, Dmytro was interviewed by Simon Cocking emphasizing that Hacken plans to expand its the presence on the Asian market. Recently, Dmytro hinted that Hacken is about

11 Jun 2018

White Hat Hackers helped well-known Crypto Exchanges eliminate a Critical Vulnerability
  • Industry News
  • CER
  • +2

White Hat Hackers helped well-known Crypto Exchanges eliminate a Critical Vulnerability

So you have just familiarized oneself with the three steps of how to become a white hat hacker and now wonder what ethical hackers actually do? Then, we have a nice story for you. On May 22, 2018, one of Hacken’s own advisors Oleksii Matiiasevych helped to prevent a massive crisis in a great crypto

6 May 2018

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo