cybersecurity

Biggest Crypto Hacks & Their Causes
  • Discover
  • cybersecurity
  • +1

Biggest Crypto Hacks & Their Causes

What are the most influential crypto hacks, their causes and consequences. How to protect your Web3 project from similar hacks?

24 Feb 2023

Sybil Attack in Blockchain: Examples & Prevention
  • Insights
  • cybersecurity
  • +1

Sybil Attack in Blockchain: Examples & Prevention

A comprehensive guide on Sybil Attack, a security violation where an entity has numerous fake identities on a blockchain.  

16 Feb 2023

NFT Smart Contract Audit: Ultimate Guide
  • Discover
  • cybersecurity
  • +2

NFT Smart Contract Audit: Ultimate Guide

Smart contract vulnerabilities in NFTs lead to security issues. Regular NFT smart contract audits migitate the risks of hacks.

3 Feb 2023

Cross-Chain Bridge Security
  • Discover
  • crypto bridge
  • +1

Cross-Chain Bridge Security

Hacks of bridges account for more than 50% of in total value lost in DeFI. How to protect cross-chain bridges?

24 Jan 2023

How to Prepare for a Smart Contract Audit
  • Discover
  • cybersecurity
  • +1

How to Prepare for a Smart Contract Audit

The crypto industry is at a standstill in terms of market capitalization and TVL. But the number of smart contracts audits is increasing every month. Innovative applications of blockchain technology continue to create value. dApps and Web3 apps still handle millions and billions of user funds. Even in the bear market, we see a hike

4 Jan 2023

Hacken: defending Ukraine while growing business
  • Hacken News
  • #StandWithUkraine
  • +1

Hacken: defending Ukraine while growing business

The Russian invasion of Ukraine has dramatically affected everyone in this country. Millions of refugees, regular missile attacks targeting critical infrastructure, destruction of industrial facilities, heavy bombardments of large cities, and the unprecedented scope of cyberattacks are the reality in Ukraine today.  Nevertheless, Ukraine is firmly beating Russia on the battlefields, and the country’s economy

23 Nov 2022

How To Steal Bitcoin And Other Crypto?
  • Discover
  • cybersecurity
  • +1

How To Steal Bitcoin And Other Crypto?

The Bitcoin fever is a real magnet for thieves who come up with many ways to steal crypto. It turns out that Bitcoin stealers target not only big companies but individual users with modest amounts in their crypto wallets. Chainalysis recently revealed that $3.8 billion of crypto assets were stolen in 2022, an increase of 15%

11 Jul 2022

List Of Smart Contract Vulnerabilities & How To Mitigate Them
  • Discover
  • cybersecurity
  • +1

List Of Smart Contract Vulnerabilities & How To Mitigate Them

The article by Hacken’s Smart Contract Auditor on the most common smart contract vulnerabilities & how to prevent them.

8 Jul 2022

What are the types of penetration testing you need to know?
  • Discover
  • cybersecurity
  • +1

What are the types of penetration testing you need to know?

Big Idea Definition:Penetration Testing is a proactive cybersecurity measure aimed at identifying internal and external vulnerabilities of a software application by trying to breach existing security controls. What’s so special about Penetration Testing?Penetration Testing follows the steps of a potential attacker but does not deal any harm. Main benefit: Penetration Testing is proactive rather than

7 Jul 2022

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo