Category: Security

  • [ADGM Academy] Securing the Future: Custody Best Practices for Web3, DAOs and Blockchain Foundations

    [ADGM Academy] Securing the Future: Custody Best Practices for Web3, DAOs and Blockchain Foundations

    Despite its promise, the Web3 landscape faces significant security and custodial challenges that must be managed for the ecosystem to mature. Unlike traditional systems where established legal and technical safeguards have been carefully developed and adopted, Web3’s decentralised nature shifts much of the responsibility (and risk) to a reliance on the robustness of code within… Read more

  • [Continuum] Understanding the Basics: Slashing Insurance

    [Continuum] Understanding the Basics: Slashing Insurance

    In Proof of Stake (PoS) blockchains, slashing is a real risk for validators. It can happen due to downtime, double signing, or malicious behavior—and it often results in the loss of staked assets. But what exactly is slashing, and how does slashing insurance work? What is Staking? Staking refers to the process of participating in… Read more

  • [Nethermind] From Wallet to Chain. A Bridge of Two Worlds on an Ethereum Transaction

    [Nethermind] From Wallet to Chain. A Bridge of Two Worlds on an Ethereum Transaction

    Introduction & Core Insights:The decentralized nature of blockchain often conflicts with traditional financial regulation. However, innovations on public chains like Ethereum can align with regulatory objectives through technical and economic mechanisms that ensure market safety and stability. Dissecting the Ethereum Transaction Process: Centralization and Censorship Concerns: Layer 2 Issues:Layer 2 solutions improve transaction throughput via… Read more

  • [Deloitte] 2025 – the year of payment stablecoins

    [Deloitte] 2025 – the year of payment stablecoins
    ,

    How do you want to engage? Companies will encounter multiple opportunities to engage with PSCs and must continuously assess which part of the value chain to participate in. Some entities will aggressively seize market share with a first-mover strategy, while others will react when external use of PSCs demands their involvement. Executives need to evaluate… Read more

  • [BIS] Cryptocurrencies and decentralised finance: functions and financial stability implications

    [BIS] Cryptocurrencies and decentralised finance: functions and financial stability implications
    ,

    1. DeFi mimics traditional finance (TradFi) functions but introduces new risksDeFi aims to provide financial services such as payments, lending, and asset management without intermediaries. However, its design—based on anonymity and automation—exposes users to new forms of market failures, including information asymmetry and systemic vulnerabilities. 2. Smart contracts and composability: innovation and fragilitySmart contracts enable… Read more

  • [KoinX] What is A Wallet Address? An Essential Guide for Every Crypto User

    [KoinX] What is A Wallet Address? An Essential Guide for Every Crypto User
    ,

    Cryptocurrency transactions rely on wallet addresses, which serve as unique identifiers for sending and receiving digital assets. Much like an email address for financial transfers, a wallet address ensures that funds reach the correct recipient securely. Understanding how these addresses work is essential to avoid costly mistakes, such as sending funds to the wrong address,… Read more

  • [BEOSIN] INDONESIA ON-CHAIN FUND FLOW AND RISK ANALYSIS REPORT

    [BEOSIN] INDONESIA ON-CHAIN FUND FLOW AND RISK ANALYSIS REPORT
    ,

    Driven by the continuous rise in global crypto asset penetration and the explosive growth of the user base in Southeast Asia, Indonesia, with its youthful population structure and rapidly evolving digital financial infrastructure, is becoming a key growth hub in the Asia-Pacific crypto ecosystem. Overview of Indonesia’s Cryptocurrency Market: On-Chain Fund Flow and Risk Analysis:… Read more

  • [forvis mazars] Key Considerations for Protecting Crypto Assets

    [forvis mazars] Key Considerations for Protecting Crypto Assets

    It is estimated that organizations lose 5% of revenue to fraud each year, with an average loss of $1.7 million dollars. Asset misappropriation, or the unauthorized use of an organization’s assets for personal gain, accounts for 89% of those cases. In almost every case, the existence of controls reduces the overall loss and duration of the fraudulent… Read more

  • [Chainalysis] Leveraging Transparency for Collaboration in the Wake of Record-Breaking Bybit Theft

    [Chainalysis] Leveraging Transparency for Collaboration in the Wake of Record-Breaking Bybit Theft

    On February 21, 2025, Bybit, a prominent cryptocurrency exchange, experienced a significant security breach resulting in the loss of nearly $1.5 billion worth of ether (ETH). This incident stands as the largest digital heist in the history of cryptocurrency. Fortunately, Bybit is actively collaborating with industry experts, including Chainalysis, to trace the stolen assets. They… Read more

  • [ELLIPTIC] The Largest Theft in History – Following the Money Trail from the Bybit Hack

    [ELLIPTIC] The Largest Theft in History – Following the Money Trail from the Bybit Hack

    On February 21st 2025, approximately $1.46 billion in cryptoassets were stolen from Bybit, a Dubai-based exchange. Initial reports suggest that malware was used to trick the exchange into approving transactions that sent the funds to the thief. This is by the far the largest crypto heist of all time, dwarfing the $611 million stolen from Poly Network in 2021 (and the… Read more