HackenCup

Europe’s Top CEX–WhiteBIT–Trusts Hacken For Security
  • Case Studies
  • bug bounty
  • +3

Europe’s Top CEX–WhiteBIT–Trusts Hacken For Security

WhiteBIT has requested several blockchain security services. We explore their case and provide an exclusive interview with their CTO.

20 Mar 2023

Coinmetro Crypto Exchange: Deep Security Approach
  • Case Studies
  • bug bounty
  • +2

Coinmetro Crypto Exchange: Deep Security Approach

Coinmetro is Hacken’s long-time client, and we want to highlight the exchange’s unquestionable approach to security. Coinmetro exchange brief review Coinmetro is a centralized cryptocurrency exchange founded in 2018. The Estonia-based exchange is among the largest European custodians, with an average daily trade volume of around $1 million. Deep security approach Security has been the

16 Feb 2023

Hacken & KuCoin: pentests and bug bounties as CEXs’ keys to users’ trust
  • Case Studies
  • bug bounty
  • +2

Hacken & KuCoin: pentests and bug bounties as CEXs’ keys to users’ trust

In May 2021, KuCoin reached Hacken to order Penetration Testing, later they ordered Bug Bounty

21 Nov 2022

Full-house cybersecurity for Jungle NFT Marketplace
  • Case Studies
  • bug bounty
  • +3

Full-house cybersecurity for Jungle NFT Marketplace

The Best Cybersecurity Approach to NFT Marketplaces The case of Jungle confirms Hacken’s deep expertise in dealing with NFT projects. Our cybersecurity approach to NFT projects originates from their distinct needs and business context. Most NFT marketplaces have the following key business requirements: We know what NFT businesses need. We know the most common and

10 Nov 2022

Securing Crypto Exchange Against Vulnerabilities – Gate.io Success Story
  • Case Studies
  • bug bounty
  • +1

Securing Crypto Exchange Against Vulnerabilities – Gate.io Success Story

Gate.io Security Challenge Gate.io is listed among the top 10 crypto exchanges according to CoinMarketCap. Since its founding in 2013, the company has remained committed to making the safety and security of its users its top priority, which requires strong safety measures to protect its traders from hackers and fraudsters. To do this, Gate.io published

1 Jun 2022

Openware is partnering with Hacken to secure its Yellow Network
  • Network
  • bug bounty
  • +1

Openware is partnering with Hacken to secure its Yellow Network

Hacken team would like to share with you details about our new partnership. Openware, Blockchain B2B SaaS provider, has decided to partner with Hacken. Our company will perform the security assessment of Openware’s Yellow Network. The purpose of this partnership is to guarantee the security of assets belonging to the users of Yellow Network. Yellow

21 Dec 2021

Secured by Hacken: the Value of this Label for You
  • Network
  • bug bounty
  • +2

Secured by Hacken: the Value of this Label for You

The scope of security threats existing in modern international business is unprecedented. Malicious actors have become so skilled that they can easily exploit even minor bugs or flaws to get unauthorized access to your data or assets. The development of effective security strategies is the only way for businesses to become more resistant to cyberattacks

14 Sep 2021

Avalanche Launches Bug Bounty Program on HackenProof
  • Network
  • bug bounty
  • +1

Avalanche Launches Bug Bounty Program on HackenProof

Avalanche is launching a bug bounty program on HackenProof, one of the most reliable and advanced bug bounty platforms in the market. The program will leverage the insights and expertise of “white hat” hackers in the HackenProof community to optimize platform security and functionality. Founded in 2017, HackenProof crowdsources the testing, discovery, and resolution of

31 Mar 2021

Microsoft to reward up to $40,000 on Azure Bug Bounty Program
  • Industry News
  • bug bounty
  • +3

Microsoft to reward up to $40,000 on Azure Bug Bounty Program

Infrastructure As A Service (IaaS) attacks is an IT department’s worst nightmare. Imagine a cybercriminal planting a backdoor inside your server, at which point they can consistently use to discreetly steal data. Furthermore, this does not only affect the bare-metal server as this backdoor will remain intact as the cloud infrastructure goes from one customer

20 Aug 2019

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo