RivanorthProblog.rivanorth.com·Mar 6, 2024Security Roundup: March 2024 EditionHacks in the Web3 space are one the rise and up 15% compared to this time last year, with 85% of them happening in the Ethereum ecosystem. Therefore, we've been busy here at Rivanorth and created a comprehensive research article on how to securely im...DiscussNews & UpdatesBlockchain
RivanorthProblog.rivanorth.com·Feb 8, 2024Security Roundup: February 2024 EditionIn this month's security report, notorious hackers Lazarus Group make their first appearance of the year with yet another social engineering attack on a Blockchain project. This month we've seen over $30M stolen over various attacks with a diverse se...DiscussNews & UpdatesSecurity
RivanorthProblog.rivanorth.com·Dec 4, 2023Blockchain Security Roundup: November 2023Another eventful month has unfolded in the world of blockchain security, with this month's highlights featuring a staggering amount of stolen assets! Our Latest Research Secure Proxy Models: Understanding Beacon Proxies The Hacks KyberSwap - $47M - ...DiscussNews & Updatesweb3 hacks
Joseph Chisom Ofonagorochisom.hashnode.dev·Nov 20, 2023What You Need to Know About USB Tethering Via Developer OptionsAs a techie, one of the best things you should do for yourself if you use an android phone is to know how to make use of the developer option on your android phone. Developer Option is a feature present in android phones that allows users, developers...DiscussDeveloper
Sahil Akhtarsahilfrodo.hashnode.dev·Jul 27, 2023Data Visualization Hacks with Matplotlib: Unleashing the Power of Python's Plotting LibraryData visualization is an essential aspect of data analysis and exploration. It allows us to gain insights from complex datasets by presenting information in a visually appealing and easily understandable manner. Among the various tools available, Mat...DiscussData Science
Aniket Patidaraniketpatidar.hashnode.dev·Jun 14, 2023Supercharge Your Productivity: Must-Have Tools for Software Development SuccessThere are several tools and software applications that can help boost productivity in software development. Here are some of the best tools widely used by developers: 1. Integrated Development Environments (IDEs): - Visual Studio Code: A popular, lig...Discuss·1 likeProgramming Blogs
Gideon Batureblog.benehub.tech·May 6, 2023Divide and ConquerHistory of Divide and Conquer Historically, this strategy is attributed to the Roman Military General and Statesman - Julius Ceasar. This strategy has been applied across the military, politics and various problem-solving approaches. What is Divide a...Discuss·22 likes·85 readsProgramming Tips
Sandesh KatwalforSandesh Writes Techsandeshkatwal.hashnode.dev·Apr 8, 2023Laptop Touchpad Gestures That Everyone Must KnowIn today's world, laptops have become an integral part of our daily lives, especially when it comes to work. Whether you're typing up a report, browsing the internet, or streaming your favorite show, you're likely to be using the touchpad on your lap...Discuss·65 readslaptop
PopLab AgencyforOffensive Wirelessradio.popdocs.net·Mar 21, 2023Top 5 Wi-Fi AttacksSecure your network and keep your data safe with the top 5 Wi-Fi attacks. Uncover the most common Wi-Fi security risks, including man-in-the-middle and denial-of-service attacks, and learn how to protect your network and data from these types of atta...DiscussWifi Penetration Testingattacks
WarrenMuforOpen Source Community Kampalablog.oscakampala.org·Mar 4, 2023Security engineering basing on gracenolan notes. part 4Welcome. Today we are going to continue with gracenolan notes. Please do some further deep-diving in web application pen-testing as there are many technical details to understand and practical workouts. Am writing according to the notes. Mitigations...Discuss·1 like·154 readshacking