RivanorthProblog.rivanorth.com·Apr 7, 2024Security Roundup: April 2024 EditionWelcome to another edition of the latest blockchain security news. Last month we've witnessed a large amount of hacks with over $120M stolen and a wide variety of attack vectors, ranging from rogue developers to smart contract vulnerabilities. Will t...DiscussWeb3news
RivanorthProblog.rivanorth.com·Mar 6, 2024Security Roundup: March 2024 EditionHacks in the Web3 space are one the rise and up 15% compared to this time last year, with 85% of them happening in the Ethereum ecosystem. Therefore, we've been busy here at Rivanorth and created a comprehensive research article on how to securely im...DiscussWeb3Blockchain
RivanorthProblog.rivanorth.com·Feb 8, 2024Security Roundup: February 2024 EditionIn this month's security report, notorious hackers Lazarus Group make their first appearance of the year with yet another social engineering attack on a Blockchain project. This month we've seen over $30M stolen over various attacks with a diverse se...DiscussWeb3Security
RivanorthProblog.rivanorth.com·Dec 4, 2023Blockchain Security Roundup: November 2023Another eventful month has unfolded in the world of blockchain security, with this month's highlights featuring a staggering amount of stolen assets! Our Latest Research Secure Proxy Models: Understanding Beacon Proxies The Hacks KyberSwap - $47M - ...DiscussWeb3web3 hacks
Joseph Chisom Ofonagorochisom.hashnode.dev·Nov 20, 2023What You Need to Know About USB Tethering Via Developer OptionsAs a techie, one of the best things you should do for yourself if you use an android phone is to know how to make use of the developer option on your android phone. Developer Option is a feature present in android phones that allows users, developers...Discuss·183 readsDeveloper
Sahil Akhtarsahilfrodo.hashnode.dev·Jul 27, 2023Data Visualization Hacks with Matplotlib: Unleashing the Power of Python's Plotting LibraryData visualization is an essential aspect of data analysis and exploration. It allows us to gain insights from complex datasets by presenting information in a visually appealing and easily understandable manner. Among the various tools available, Mat...DiscussData Science
Aniket Patidaraniketpatidar.hashnode.dev·Jun 14, 2023Supercharge Your Productivity: Must-Have Tools for Software Development SuccessThere are several tools and software applications that can help boost productivity in software development. Here are some of the best tools widely used by developers: 1. Integrated Development Environments (IDEs): - Visual Studio Code: A popular, lig...Discuss·1 likeProgramming Blogs
Gideon Batureblog.benehub.tech·May 6, 2023Divide and ConquerHistory of Divide and Conquer Historically, this strategy is attributed to the Roman Military General and Statesman - Julius Ceasar. This strategy has been applied across the military, politics and various problem-solving approaches. What is Divide a...Discuss·22 likes·93 readsProgramming Tips
Sandesh KatwalforSandesh Writes Techsandeshkatwal.hashnode.dev·Apr 8, 2023Laptop Touchpad Gestures That Everyone Must KnowIn today's world, laptops have become an integral part of our daily lives, especially when it comes to work. Whether you're typing up a report, browsing the internet, or streaming your favorite show, you're likely to be using the touchpad on your lap...Discusslaptop
PopLab AgencyforOffensive Wirelessoffensive-wireless.hashnode.dev·Mar 21, 2023Top 5 Wi-Fi AttacksSecure your network and keep your data safe with the top 5 Wi-Fi attacks. Uncover the most common Wi-Fi security risks, including man-in-the-middle and denial-of-service attacks, and learn how to protect your network and data from these types of atta...DiscussWifi Penetration Testingattacks