cybersecurity

How to Prepare for a Smart Contract Audit
  • Discover
  • cybersecurity
  • +1

How to Prepare for a Smart Contract Audit

The crypto industry is at a standstill in terms of market capitalization and TVL. But the number of smart contracts audits is increasing every month. Innovative applications of blockchain technology continue to create value. dApps and Web3 apps still handle millions and billions of user funds. Even in the bear market, we see a hike

4 Jan 2023

Hacken: defending Ukraine while growing business
  • Hacken News
  • #StandWithUkraine
  • +1

Hacken: defending Ukraine while growing business

The Russian invasion of Ukraine has dramatically affected everyone in this country. Millions of refugees, regular missile attacks targeting critical infrastructure, destruction of industrial facilities, heavy bombardments of large cities, and the unprecedented scope of cyberattacks are the reality in Ukraine today.  Nevertheless, Ukraine is firmly beating Russia on the battlefields, and the country’s economy

23 Nov 2022

How To Steal Bitcoin And Other Crypto?
  • Discover
  • cybersecurity
  • +1

How To Steal Bitcoin And Other Crypto?

The Bitcoin fever is a real magnet for thieves who come up with many ways to steal crypto. It turns out that Bitcoin stealers target not only big companies but individual users with modest amounts in their crypto wallets. Chainalysis recently revealed that $3.8 billion of crypto assets were stolen in 2022, an increase of 15%

11 Jul 2022

List Of Smart Contract Vulnerabilities & How To Mitigate Them
  • Discover
  • cybersecurity
  • +1

List Of Smart Contract Vulnerabilities & How To Mitigate Them

The article by Hacken’s Smart Contract Auditor on the most common smart contract vulnerabilities & how to prevent them.

8 Jul 2022

What are the types of penetration testing you need to know?
  • Discover
  • cybersecurity
  • +1

What are the types of penetration testing you need to know?

Big Idea Definition:Penetration Testing is a proactive cybersecurity measure aimed at identifying internal and external vulnerabilities of a software application by trying to breach existing security controls. What’s so special about Penetration Testing?Penetration Testing follows the steps of a potential attacker but does not deal any harm. Main benefit: Penetration Testing is proactive rather than

7 Jul 2022

The major crypto platforms prohibit or limit withdrawals
  • Industry News
  • Crypto exchanges
  • +1

The major crypto platforms prohibit or limit withdrawals

Recently, many crypto platforms have banned or limited the withdrawal of funds for their users. They attribute these limitations to the bear market and extreme market conditions. We will look at notable examples of suspension and consider the implications for crypto traders. Platforms that introduced withdrawals bans or limits CoinLoan, a crypto lending platform, has

6 Jul 2022

Building and Securing Solana Smart Contracts
  • Discover
  • cybersecurity
  • +2

Building and Securing Solana Smart Contracts

Smart Contracts are the foundation for the world of decentralized applications. These self-executing contracts are made up of code that initiates one or a series of functions when specific pre-defined parameters are satisfied. Once deployed, they are designed to be autonomous, eliminating the need for a middleman or centralized infrastructure. As a component created on

30 Jun 2022

Security Audit For Blockchain Projects
  • Discover
  • blockchain
  • +2

Security Audit For Blockchain Projects

What are smart contracts? Smart contracts are digital contracts that automatically execute financial transactions once specific terms and conditions are met. Smart contracts make up the foundation of decentralized finance. The significant benefits of smart contracts are speed, efficiency, accuracy, trust, transparency, security, and savings. Most transactions on the blockchain utilize smart contracts. Smart contract

29 Jun 2022

Pentest Reports
  • Discover
  • cybersecurity
  • +2

Pentest Reports

What is a penetration test? A penetration test (ethical hacking) can be defined as an authorized cyberattack launched as part of a security audit to look at the system from a hacker’s perspective. Pentest reports are used to remediate discovered vulnerabilities to secure the system controls.  Black Box Testing Also called “trial and error”, this

24 Jun 2022

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo