Blog
Blog posts, research, and guidance from the Zokyo team.
October 18, 2024
Web3: A Promising Frontier Fraught with Deception – Stay Informed, Stay Safe
A key lesson in Web3 is that there is no "easy passive income." If something seems too good to be true, it almost certainly is.
10 Minutes
September 30, 2024
Safeguarding Private Keys: Best Practices for Web3 Wallet Security
This article explores various methods and best practices for securely storing private keys in Web3 crypto wallet applications.
6 Minutes
September 23, 2024
Navigating the Wild West: Preparing for the Challenges of Smart Contract Audits
An in-depth post on why security audits are paramount to blockchain-based protocols.
25 Minutes
September 18, 2024
Exploring AI Attacks: The Top 10 Vulnerabilities in Large Language Models (LLMs)
We delve into the top 10 attacks on LLMs, offering real-world examples and mitigation strategies to ensure organizations can secure their AI systems.
5 Minutes
September 4, 2024
Penpie Post-Mortem: Analysis of the $27M Reentrancy Exploit
On September 3, the Penpie DeFi protocol suffered a devastating reentrancy attack that led to the loss of $27 million in client funds.
5 Minutes
September 3, 2024
Chainlink VRF Security Considerations
Generating true randomness on a blockchain is a challenging problem due to the inherently deterministic nature of distributed ledger technology.
8 Minutes
August 27, 2024
Flash Loan Attacks - Implications and Attack Avoidance
In this article, the concept of Flash Loans will be introduced to provide readers with an understanding of this innovative feature unique to DeFi.
7 Minutes
August 21, 2024
Unlocking Security: The Power of Penetration Testing
This article delves into why penetration testing is essential for mobile and browser extension crypto wallets and what the process involves.
5 Minutes
August 16, 2024
When Web2 meets Web3: Understanding Subdomain Takeovers
Today, we’re diving into a topic that impacts both Web2 and Web3 realms: subdomain takeovers.
9 Minutes
August 12, 2024
Ensuring Consistency: The Role of Invariant Testing in Cybersecurity
Invariant testing is one of the essential techniques used to ensure that smart contracts maintain their core properties under all conditions.
5 Minutes
March 25, 2024
Under the Hacker’s Hood: JSON Injection in NFT Metadata
A Guide to Understanding and Preventing Data Exploits
9 minutes
April 12, 2024
ShidoGlobal and Zokyo officially announce a strategic partnership!
Focusing on long-term smart contract auditing and integration of Mamoru.ai for advanced threat detection in their decentralized cross-chain ecosystem.
1 minute
May 22, 2024
AI in Crypto & Smart Contract Security
Revolutionizing Blockchain Security with AI Innovations
4 minutes
June 28, 2024
Bug Bounty Programs: Where Have We Come From and Where Are We Now?
Incentivizing ethical hackers to enhance security since Web 1.0
7 minutes
July 4, 2024
Design: Push vs Pull Pattern in EVM
Enhancing Blockchain Development through Efficient Transaction Gas Management
7 minutes
October 24, 2023
Zokyo, FailSafe, and Mamoru: A Collective Approach to Web3 Security
In the dynamic landscape of Web3, security stands out as an uncompromising priority. In response to the growing concerns surrounding potential threats
4 minutes
October 31, 2023
Zokyo Joins Forces with Linea to Fortify Security Measures and Propel Innovation in the Linea Ecosystem
Zokyo is excited to share the news of our newly formed ecosystem partnership with Linea, a cutting-edge Layer 2 zk-Rollup platform developed by Consen
3 minutes
November 2, 2023
Threat Modeling for Web3: A Comprehensive Guide [Part-1]
Web3 represents a paradigm shift in digital infrastructure, offering decentralized solutions that are reshaping the online world. As these ecosystems
20 minutes
November 7, 2023
More Than $22M Stolen from Web3 Platforms in October
In October 2023, the blockchain sector, usually lauded for its solid security layers, was hit by a harsh reality check. A series of advanced hacks resulted in a loss of $22.54 million,
7 minutes