pentest

Cryptostake.com Mobile App Penetration Testing
  • Case Studies
  • Penetration testing
  • +1

Cryptostake.com Mobile App Penetration Testing

Cryptostake, a non-custodial and high-reward staking service for proof-of-stake blockchains like Ethereum, Polkadot, and Cosmos, entrusted Hacken with performing an independent security assessment of their mobile applications. Specifically, non-custodial wallets for iOS and Android. As a result of Hacken’s most thorough mobile penetration testing, Cryptostake Wallets received a maximum 10/10 score. Let’s take a closer

18 Dec 2023

Europe’s Top CEX–WhiteBIT–Trusts Hacken For Security
  • Case Studies
  • bug bounty
  • +3

Europe’s Top CEX–WhiteBIT–Trusts Hacken For Security

WhiteBIT has requested several blockchain security services. We explore their case and provide an exclusive interview with their CTO.

20 Mar 2023

Coinmetro Crypto Exchange: Deep Security Approach
  • Case Studies
  • bug bounty
  • +2

Coinmetro Crypto Exchange: Deep Security Approach

Coinmetro is Hacken’s long-time client, and we want to highlight the exchange’s unquestionable approach to security. Coinmetro exchange brief review Coinmetro is a centralized cryptocurrency exchange founded in 2018. The Estonia-based exchange is among the largest European custodians, with an average daily trade volume of around $1 million. Deep security approach Security has been the

16 Feb 2023

Hacken & KuCoin: pentests and bug bounties as CEXs’ keys to users’ trust
  • Case Studies
  • bug bounty
  • +2

Hacken & KuCoin: pentests and bug bounties as CEXs’ keys to users’ trust

In May 2021, KuCoin reached Hacken to order Penetration Testing, later they ordered Bug Bounty

21 Nov 2022

Hacken x SingularityDAO: Securing Decentralization from Day 1
  • Case Studies
  • Penetration testing
  • +1

Hacken x SingularityDAO: Securing Decentralization from Day 1

SingularityDAO requested Hacken’s services because they wanted to ensure the reliability and security of the core functionality.

15 Nov 2022

What is the End Result of a Penetration Test?
  • Discover
  • Penetration testing

What is the End Result of a Penetration Test?

The end result of a penetration test is an insightful and detailed report. A good pentesting report must include an executive summary of findings, a breakdown of the process, and security recommendations. Before launching a new project, you need to detect where you are weak. Pentesting will eliminate the window of opportunity for those with

6 Oct 2022

What are the types of penetration testing you need to know?
  • Discover
  • cybersecurity
  • +1

What are the types of penetration testing you need to know?

Big Idea Definition:Penetration Testing is a proactive cybersecurity measure aimed at identifying internal and external vulnerabilities of a software application by trying to breach existing security controls. What’s so special about Penetration Testing?Penetration Testing follows the steps of a potential attacker but does not deal any harm. Main benefit: Penetration Testing is proactive rather than

7 Jul 2022

Pentest Reports
  • Discover
  • cybersecurity
  • +2

Pentest Reports

What is a penetration test? A penetration test (ethical hacking) can be defined as an authorized cyberattack launched as part of a security audit to look at the system from a hacker’s perspective. Pentest reports are used to remediate discovered vulnerabilities to secure the system controls.  Black Box Testing Also called “trial and error”, this

24 Jun 2022

iOS App Penetration Testing
  • Discover
  • cybersecurity
  • +1

iOS App Penetration Testing

After endless rounds of prototyping, you might think that your iOS app is finally ready to be taken off the ground to start creating optimal user experiences. What about vulnerabilities? Whatever it takes, you need to make sure that no bad actor will be able to harvest user-sensitive data through your app. Have your iOS

16 Jun 2022

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo