Featured Post

Examining EigenLayer and Restaking from the Security Perspective

This blog presents EigenLayer's basic idea and illustrates the new security threats in the restaking ecosystem.

Examining EigenLayer and Restaking from the Security Perspective
New Website Unveiled | BlockSec Safeguards Protocol's Lifecycle Security
Top 10 "Awesome" Security Incidents in 2023
Filter by:
Monthly Security Review: April 2024

Monthly Security Review: April 2024

Stay updated with April's security trends and our recent developments. πŸ™Œ

Major Upgrades to BlockSec Phalcon's Storage Analysis and Monitoring Functions
Tech and Dev

Major Upgrades to BlockSec Phalcon's Storage Analysis and Monitoring Functions

BlockSec is pleased to announce a significant upgrade to our crypto hack monitoring and blocking system Phalcon's storage analysis and monitoring capabilities.

Examining EigenLayer and Restaking from the Security Perspective
Security Insights

Examining EigenLayer and Restaking from the Security Perspective

This blog presents EigenLayer's basic idea and illustrates the new security threats in the restaking ecosystem.

How to Make One Million in Two Minutes: Using MetaSleuth to Track "Smart" Money on Solana
Tutorials

How to Make One Million in Two Minutes: Using MetaSleuth to Track "Smart" Money on Solana

In this blog, we will show how to use MetaSleuth to track the "smart" money of the meme TIM token on Solana.

Understanding Profit Sharing in the Inferno Drainer: A Comprehensive Guide
Case Studies

Understanding Profit Sharing in the Inferno Drainer: A Comprehensive Guide

The blog exposes the "Inferno Drainer" phishing scam that causes substantial losses and advises users to transact cautiously to avoid such frauds.

How to Avoid Being a Web3 Phishing Victim
Tutorials

How to Avoid Being a Web3 Phishing Victim

In this blog, we present popular phishing methods, and how how to avoid being a phishing victim.

Demystifying "ROP" in Web3 Phishing Scam
Security Insights

Demystifying "ROP" in Web3 Phishing Scam

In this blog, we will show a new type of Web3 phishing and provide suggestions for how to avoid being phished.

What should I do if my crypto assets were stolen?
Tutorials

What should I do if my crypto assets were stolen?

Suggestions when your crypto assets were stolen (or phished by scammers)

Unraveling Hacking Incidents Involving Drainers: Insights and Prevention

Unraveling Hacking Incidents Involving Drainers: Insights and Prevention

The blog provides an overview of drainer-related hacking incidents targeting Web3 users, highlighting the methods employed by hackers and aiming to enhance users' awareness and protection against these tactics.

How to Use Phalcon Fork to Play and Learn Ethernaut CTF 2024
Tutorials

How to Use Phalcon Fork to Play and Learn Ethernaut CTF 2024

This blog explains how to use Phalcon Fork to play the Ethernaut CTF 2024.

Monthly Security Review: March 2024

Monthly Security Review: March 2024

Stay updated with March's security trends and our recent developments. πŸ™Œ

How L2 Blockchains Can Do Better to Protect Their Users
Tech and Dev

How L2 Blockchains Can Do Better to Protect Their Users

How layer 2 (L2) chains can implement several measures to enhance the security of top protocols and protect users' assets on the chain.

Secure your digital assets now with BlockSec's full-stack security services