
Case Studies
Europe’s Top CEX–WhiteBIT–Trusts Hacken For Security
WhiteBIT has requested several blockchain security services. We explore their case and provide an exclusive interview with their CTO.
Case Studies
WhiteBIT has requested several blockchain security services. We explore their case and provide an exclusive interview with their CTO.
Case Studies
Coinmetro is Hacken’s long-time client, and we want to highlight the exchange’s unquestionable approach to security. Coinmetro exchange brief review Coinmetro is a centralized cryptocurrency exchange founded in 2018. The Estonia-based exchange is among the largest European custodians, with an average daily trade volume of around $1 million.
Case Studies
In May 2021, KuCoin reached Hacken to order Penetration Testing, later they ordered Bug Bounty
Case Studies
The Best Cybersecurity Approach to NFT Marketplaces The case of Jungle confirms Hacken's deep expertise in dealing with NFT projects. Our cybersecurity approach to NFT projects originates from their distinct needs and business context. Most NFT marketplaces have the following key business requirements: 1. Lightning-fast and easy transactions
Case Studies
Gate.io Security Challenge Gate.io is listed among the top 10 crypto exchanges according to CoinMarketCap. Since its founding in 2013, the company has remained committed to making the safety and security of its users its top priority, which requires strong safety measures to protect its traders from hackers
Network
Hacken team would like to share with you details about our new partnership. Openware, Blockchain B2B SaaS provider, has decided to partner with Hacken. Our company will perform the security assessment of Openware’s Yellow Network. The purpose of this partnership is to guarantee the security of assets belonging to
Discover
In our first post, we’ve made a brief introduction into HackenProof and explained why Bug Bounty is the cutting edge of cybersecurity services. The short argument is that Bug Bounty Platforms have access to a much greater talent base than traditional cybersecurity companies. In this post, we’d like
Discover
Hello everyone and welcome to HackenProof Blog! This is our first post, where we would like to introduce ourselves. We’re going to share a brief story with you about how we’ve created HackenProof, what do we do and why do we think it’s important. HackenProof was founded
Insights
Table of Contents 1. The merger of crypto and crypto hacks: A Short History 2. Crypto exchange hacks 3. Statistics 4. Advantages of BB 5. Can a researcher blackmail me? 6. Afterword The merger of crypto and crypto hacks: A Short History 2009 — the bitcoin network was born when Satoshi
Case Studies
Company: TTC Protocol Company description: Social networking ecosystem on the blockchain Service: Smart contract audit, penetration testing, and bug bounty In 2016, Yahoo! announced a massive data breach which affected around 500 million user accounts. The same year, hackers attacked Uber exposing data of 20 million users. In about a
Case Studies
Asian blockchain giant moves towards cybersecurity The spring started with the Asian tour: Hacken’s CEO Dmytro Budorin visited Hong Kong, Shanghai, Seoul, Dubai, and Kuala Lumpur. On March 31, Dmytro was interviewed by Simon Cocking emphasizing that Hacken plans to expand its the presence on the Asian market. Recently,
Case Studies
Hacken Partners with Kuna to ensure its safety and launch HKN trading on the best Ukrainian exchange. At the beginning of February our white hat hackers were hard at work, and now we are pleased to announce that Kuna Crypto Exchange is under protection of Hacken. Although the 100% safety