Smart Contract Security: An Agile SDLC Approach
Read Time: 10 minutes Blockchain is quoted as a decentralized and tamper-proof ledger. But this tamper-proof ledger is vulnerable to hacks and exploits. The
Read Time: 10 minutes Blockchain is quoted as a decentralized and tamper-proof ledger. But this tamper-proof ledger is vulnerable to hacks and exploits. The
Read Time: 4 minutes With the consistent progression in technology, blockchain tech seems to be the most promising in terms of security and efficiency
Read Time: 5 minutes Web3 and the metaverse are two terms that pop up almost every time in the technology world. You must have
Read Time: 10 minutes Blockchain is quoted as a decentralized and tamper-proof ledger. But this tamper-proof ledger is vulnerable to hacks and exploits. The
Read Time: 4 minutes With the consistent progression in technology, blockchain tech seems to be the most promising in terms of security and efficiency
Read Time: 5 minutes Web3 and the metaverse are two terms that pop up almost every time in the technology world. You must have
Due to the fact that Web3 technology is still in its infancy, new types of attacks are possible. Some attacks, like ice phishing, are specific to Web3, while others resemble credential phishing attacks.
#CyberSecurity
👇👇
Thoreum Finance on the BNB chain was exploited on January 18, 2023. The exploit resulted in the protocol losing approximately 2261 BNB (~$680K).
✔ Check out our latest article to learn more about how it happens.👇
👉 https://quillaudits.medium.com/decoding-thoreum-finance-exploit-quillaudits-199f090e9bac
#web3 #Security #Audit
Coinbase (COIN) users in the Eastern European country of Georgia were able to exploit a price bug that allowed them to cash out their holdings for 100 times the exchange rate, pocketing thousands of dollars in profit.
Parent Company
Quillhash delivers enterprise grade blockchain technology to leading companies worldwide.
Contact
Refer QuillAudits to Web3 projects for audits.
Thereby help us Secure web3 ecosystem.