Security

The Web3 world is filled with both opportunities and risks. This topic will provide you with a comprehensive analysis of security incidents in Web3, uncover common attack methods and vulnerabilities, and offer practical asset protection strategies and guidance.

Articles (142)

Who is the Lazarus Group? The hackers behind billion-dollar heists
Beginner

Who is the Lazarus Group? The hackers behind billion-dollar heists

The Lazarus Group is a hacking organization associated with the North Korean government. Since its activity in cyberspace began in 2009, it has been suspected of numerous major cyberattacks, including the 2016 theft from the Central Bank of Bangladesh and the 2022 attack on the Ronin Network, resulting in the theft of billions of dollars.
3/20/2025, 3:08:26 AM
What are Ring Signatures?
Intermediate

What are Ring Signatures?

A Ring Signature is a digital signature in which a transaction is signed on behalf of a group. This makes it computationally infeasible to determine which group member created the signature. Ring signatures are used in privacy-focused cryptocurrencies like Monero to hide the sender's identity.
3/20/2025, 2:34:44 AM
Regenerative Finance (ReFi): The Path to Cryptocurrency’s Green Transition
Beginner

Regenerative Finance (ReFi): The Path to Cryptocurrency’s Green Transition

This article introduces the concept of Regenerative Finance (ReFi), its market potential, application scenarios, operational mechanisms, and noteworthy projects. It also compares ReFi with DeFi, exploring its future development trends and potential risks.
3/20/2025, 2:29:48 AM
The First Blind Computation Network Nillion and Its Ecosystem Overview
Intermediate

The First Blind Computation Network Nillion and Its Ecosystem Overview

Nillion has always been dedicated to the field of data privacy and security. With its innovative "blind computation" concept and a comprehensive set of application development tools, it enables developers to easily and efficiently build privacy-enhancing applications, supporting a wide range of use cases, including AI, DeFi, Social, gaming, and healthcare.
3/20/2025, 1:23:38 AM
The Top 10 Biggest Crypto Hacks in History
Beginner

The Top 10 Biggest Crypto Hacks in History

This article delves into the top 10 most shocking crypto hacks in history. We will explore notorious hacker groups, common attack methods, and sophisticated money laundering techniques used in the crypto world. Additionally, we will compare traditional hacking vs. crypto hacking and provide valuable security tips to help investors avoid potential risks.
3/20/2025, 12:47:19 AM
What is Front Running in the Crypto Space?
Intermediate

What is Front Running in the Crypto Space?

Front-running in crypto exploits pending transactions for profit, capitalizing on blockchain transparency. Learn how traders, bots, and validators manipulate transaction ordering, the impact on Decentralized Finance, and the possible ways of protecting your transactions.
3/14/2025, 8:40:50 AM
What is Certik?
Advanced

What is Certik?

CertiK is a leading Web3 security firm specializing in smart contract audits, blockchain security, and compliance solutions. It offers services such as code audits, blockchain L1/L2 audits, wallet security, penetration testing, and risk management.
3/14/2025, 8:30:33 AM
Stay Anonymous in DeFi: How Hinkal Protocol Enhances On-Chain Privacy
Intermediate

Stay Anonymous in DeFi: How Hinkal Protocol Enhances On-Chain Privacy

Explore how Hinkal Protocol brings privacy to decentralized finance through zero-knowledge proofs, stealth addresses, and self-custodial private wallets. Learn how institutions and individuals can transact, trade, and yield farm privately on EVM chains.
3/13/2025, 3:47:21 AM
Wrench Attacks in Crypto
Beginner

Wrench Attacks in Crypto

A wrench attack is the physical targeting of cryptocurrency holders to unlawfully obtain possession and ownership of their assets through physical force or threat of harm.
3/12/2025, 2:46:42 AM
BitVM Background Knowledge: The Implementation of Fraud Proof and ZK Fraud Proof
Intermediate

BitVM Background Knowledge: The Implementation of Fraud Proof and ZK Fraud Proof

This article will use Optimism's fraud proof solution as a reference to analyze its approach based on the MIPS virtual machine and interactive fraud proofs, as well as the main idea behind ZK-based fraud proofs.
3/7/2025, 3:47:32 AM
Gate Research: Security Incident Summary for February 2025
Advanced

Gate Research: Security Incident Summary for February 2025

Gate Research report indicates: In February 2025, the Web3 industry experienced 15 security incidents with total losses of $1.676 billion—a significant increase from the previous month. These incidents primarily involved contract vulnerabilities and account hacks, accounting for 53.3% of total losses in the crypto industry. Most losses occurred on the BSC blockchain. Major incidents included the Bybit exchange wallet theft, Infini's lack of strict permission controls, and ionic falling victim to a social engineering attack.
3/6/2025, 3:34:56 AM
Why Have Hackers Become One of the Biggest Risks in Cryptocurrency?
Intermediate

Why Have Hackers Become One of the Biggest Risks in Cryptocurrency?

The cryptocurrency industry is experiencing an unprecedented security crisis, marked by frequent and devastating hacker attacks that have eroded trust in the industry. This article examines recent high-profile hacking incidents, such as the $1.46 billion theft from Bybit, along with historical cases, to uncover the various factors driving these attacks, including technical flaws, human vulnerabilities, economic incentives, and regulatory gaps.
3/3/2025, 6:58:14 AM
Cold Wallet Not Cold? How a Veteran Journalist Lost $400,000 in a Scam
Beginner

Cold Wallet Not Cold? How a Veteran Journalist Lost $400,000 in a Scam

In this decentralized digital world, everyone is responsible for safeguarding their own assets and acting as the first line of defense against risks. We can’t rely on others, but we can rely on rules and common sense. Always remember: Never share your mnemonic phrase.
3/3/2025, 3:34:51 AM
What is OP_VAULT?
Intermediate

What is OP_VAULT?

This article explores OP_VAULT, a Bitcoin feature designed to enhance security by safeguarding funds from loss or unauthorized access. As Bitcoin adoption grows, OP_VAULT introduces "covenants," which let users establish predetermined guidelines for how their cryptocurrency can be used. This feature adds both security and flexibility for protecting digital assets.
3/3/2025, 3:25:00 AM
How Can DeFi Effectively Respond to Market Volatility After the Bybit Hack?
Intermediate

How Can DeFi Effectively Respond to Market Volatility After the Bybit Hack?

This article explores the impact of the recent hack on Aave, Ethena, and USDe, analyzes how DeFi systems responded to the event, and examines whether Proof of Reserves could prevent over $20 million in liquidations.
3/3/2025, 3:18:39 AM

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective