Featured Post
Examining EigenLayer and Restaking from the Security Perspective
This blog presents EigenLayer's basic idea and illustrates the new security threats in the restaking ecosystem.
Stay updated with April's security trends and our recent developments. π
BlockSec is pleased to announce a significant upgrade to our crypto hack monitoring and blocking system Phalcon's storage analysis and monitoring capabilities.
This blog presents EigenLayer's basic idea and illustrates the new security threats in the restaking ecosystem.
In this blog, we will show how to use MetaSleuth to track the "smart" money of the meme TIM token on Solana.
The blog exposes the "Inferno Drainer" phishing scam that causes substantial losses and advises users to transact cautiously to avoid such frauds.
In this blog, we present popular phishing methods, and how how to avoid being a phishing victim.
In this blog, we will show a new type of Web3 phishing and provide suggestions for how to avoid being phished.
Suggestions when your crypto assets were stolen (or phished by scammers)
The blog provides an overview of drainer-related hacking incidents targeting Web3 users, highlighting the methods employed by hackers and aiming to enhance users' awareness and protection against these tactics.
This blog explains how to use Phalcon Fork to play the Ethernaut CTF 2024.
Stay updated with March's security trends and our recent developments. π
How layer 2 (L2) chains can implement several measures to enhance the security of top protocols and protect users' assets on the chain.