Crypto and Blockchain Security Book

Crypto & Blockchain Security

The book will be published in December 2022. In the meantime, you can download for free the training material this book is based on. See Blockchain and Crypto Security Training.

Free book chapters

How Blockchain Security Differs From Traditional Cybersecurity – 3 – User...

Blockchain User Security
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security.  Check out the first two...

How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart...

Smart Contract Security Differences
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security.  Check out the...

How Blockchain Security Differs From Traditional Cybersecurity – 1 – Node...

Blockchain Security Traditional Cybersecurity
Blockchain is a rapidly-evolving technology with a great deal of interest and investment. Decentralized Finance (DeFi), in particular, has a great deal of money...

The 12 Biggest Hacking Incidents in the History of Crypto

12 Largest Crypto Hacks
The most comprehensive ranked list of the biggest crypto hacks in history (Up until November 1, 2022. I suspect a larger one is just...

How the Big Binance Bridge Hack Will Change the way People...

Binance Bridge Hack
$566M worth of BNB was stolen from Binance’s cross-chain bridge BSC Token Hub, but how they responded to the hack will be the most...

How a $1B Flash Loan Led to the $182M Beanstalk Farms...

Beanstalk Farms
Understanding how flash loans and governance work in DeFi to demystify the Beanstalk Farms Hack The only way to understand how the Beanstalk Farms decentralized...

The Top 4 Supply Chain Security Risks of Blockchain Smart Contracts

Smart Contract Risks
Code reuse is considered best practice in software engineering.  Reusing high-quality, secure code can speed development processes and often results in higher-quality code than...

How the Nomad Bridge Hack can Help Us Explore the Potential...

Nomad Bridge Hack
One attacker and hundreds of copycats looted the Nomad bridge for over $190 million; few did the right thing. Decentralization is a hot-button topic in...

How Crypto’s Biggest Hacker was Found but Never Identified

Poly Network Hack
The $611M Poly Network exploit is the largest crypto hack to date in terms of mark-to-market value and all the stolen funds were returned,...

The $160M Wintermute Hack: Inside Job or Profanity Bug?

Wintermute Hack
Getting to the bottom of the exploit that led to one of the biggest hacks in the history of decentralized finance.  In order to understand...

Introduction to Blockchain Layers 0, 1, and 2 Security

Blockchain Layers Security
What Are Blockchains Layers 0, 1, and 2? A blockchain is a complex, multi-layered system.  Bitcoin, the original blockchain, maintained a distributed and decentralized digital...

Trying to Solve the Mysterious $200M BitMart Hack

BitMart Hack
A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing. When a high-profile cyber attack takes place and hundreds of...

Why DevSecOps is Essential for the Blockchain Ecosystem

DevSecOps Blockchain
In recent years, many organizations have adopted more modern development practices, including Agile, Scrum, and DevOps.  The goal of these new processes is to...

Security Threats to Blockchain Networks – 6 – Wallet Attacks

Crypto Wallet Attacks
Wallet Attacks: A Deep-dive Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While...

What the Biggest Blockchain Game’s Hack Reveals about the Future of...

Axie Infinity
Axie Infinity’s Ronin Bridge Hack for $551M worth of crypto assets could paradoxically lead to higher rates of blockchain adoption by showing that it’s...

Security Threats to Blockchain Networks – 5 – Consensus Attacks

Blockchain Consensus Attacks
Consensus Attacks: A Deep-dive Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this...

Security Threats to Blockchain Networks – 4 – Network Attacks

Blockchain Network Attacks
Network Attacks: A Deep-dive Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes....

Security Threats to Blockchain Networks – 3 – Smart Contracts

Smart Contract Security
Smart Contract Risk and How to Mitigate It: A Deep-dive The strengths of smart contracts are also the source of its weaknesses, and will always...

Diving into the $320M Wormhole Bridge Hack

Wormhole Bridge Hack
The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana. Early February of 2022 was...

Security Threats to Blockchain Networks – 2 – A Holistic Overview

Crypto Security Overview
The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a...