Generative Data Intelligence

Tag: logged-in

How to Ensure Web3 Users Are Safe from Zero Transfer Attacks

How to Ensure Web3 Users Are Safe from Zero Transfer Attacks - OpenZeppelin blog ...

ETHDenver 2023 OpenZeppelin Hackathon Bounty Winners

ETHDenver 2023 OpenZeppelin Hackathon Bounty Winners - OpenZeppelin blog ...

Final Results – Blockchain Hacking Techniques of 2022 | Top 10

Final Results - Blockchain Hacking Techniques of 2022 | Top 10 - OpenZeppelin blog ...

EIP-4337 – Ethereum Account Abstraction Incremental Audit

EIP-4337 – Ethereum Account Abstraction Incremental Audit - OpenZeppelin blog ...

Compound Polygon Bridge Receiver Audit

Compound Polygon Bridge Receiver Audit - OpenZeppelin blog ...

Webacy Bags $5M Fund, Fortifying Next-gen Crypto Wallet

Webacy has closed a $5 million seed fundraising round Webacy is a technology layer, not a competitor to crypto wallets like MetaMask The...

How Can Disrupting DNS Communications Thwart a Malware Attack?

Question: How does a threat actor utilize DNS communications in malware attacks?Dave Mitchell, CTO, Hyas: The idea that you can protect yourself from all...

Top 10 Blockchain Hacking Techniques of 2022 [Voting Phase Open]

Top 10 Blockchain Hacking Techniques of 2022 - OpenZeppelin blog ...

Kanye West won’t buy Parler after all following ‘mutual’ agreement

Kanye West, the controversial rapper who has lost big business deals over anti-Semitic comments, is no longer going to buy Parler, the “free speech”...

Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin

ESET researchers uncover Dolphin, a sophisticated backdoor extending the arsenal of the ScarCruft APT group ESET researchers have analyzed a previously unreported...

How to hack an unpatched Exchange server with rogue PowerShell code

by Paul Ducklin Just under two months ago, some worrying bug news broke: a pair of zero-day vulnerabilities were announced...

Penetration Testing and The 5 Best Penetration Testing Firms

Penetration testing, or pentesting, is the practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?