Unveiling the Dangers of Smart Contract HoneypotsFYEO’s security team has partnered with TruGard to bring security insights to Web3. This is the first in a series of collaborative posts…Jul 17Jul 17
Cybersecurity Trends July 2023: Threat Intelligence ReportCybersecurity trends that marked July 2023Aug 2, 2023Aug 2, 2023
Cybersecurity Trends May 2023: Threat Intelligence ReportIn our May 2023 report, we take a closer look at the cybersecurity trends that marked May 2023, and other cybersecurity issues that people…Jun 6, 2023Jun 6, 2023
FYEO Cybersecurity Trends April 2023: Threat Intelligence ReportPhishing and Malware trends and statisticsMay 8, 2023May 8, 2023
XRP Ledger one step closer to having native smart contracts (Hooks)The collaboration between FYEO and XRPL Labs to provide a comprehensive security assessment of the Hooks Amendment is an exciting…Apr 19, 2023Apr 19, 2023
Safeguarding Your DeFi Platform: Navigating Risks in a New Financial FrontierDeFi is revolutionizing the financial landscape, but its rapid growth has brought unique security challenges.Apr 17, 2023Apr 17, 2023
An intro to Zero Knowledge ProofsIn simple terms, a zero-knowledge proof (ZKP) is a method for proving a statement is true without revealing any additional information…Apr 3, 2023Apr 3, 2023
Ransomware Group Deep Dive: BlackCatRansomware groups (also called ransomware gangs) are one of the biggest threats to an organization’s cybersecurity posture. However, these…Mar 9, 2023Mar 9, 2023
Denial of Service (DoS) with block GAS limitEvery transaction in Ethereum requires 21000 GAS on top of computations made in the contract. Bulk operations with the array of data allow…Jan 17, 2023Jan 17, 2023
Substrate and Polkadot Parachains: A Deep Dive into the Security Implications and How to Mitigate…In this article, we will delve into the security pitfalls of Substrate blockchains and Polkadot parachains, exploring common…Jan 11, 2023Jan 11, 2023