Education Hub
Session Recordings FOR YOU
GENERAL Live Sessions

Using Yubikeys Keys for Multi-Factor Authentication
In this video, I'll demonstrate how to use Yubikey as a multi-factor authentication device and explain its crucial role in securing our identity. We'll cover common attack vectors like phishing and the risks associated with leaked passwords. Additionally, I'll emphasize good practices for handling credentials, the importance of using strong passwords, and the need to avoid sharing them. We'll explore the concept of multi-factor authentication and discuss why it's essential to implement it whenever possible. Finally, I'll walk you through setting up YubiKeys keys for multi-factor authentication in Google accounts
Watch
How To Spot a Fake Email
In this video, I will show you how to identify and protect yourself from phishing scams, which are the most common methods used to trick users into surrendering sensitive information. I will provide basic steps to follow, such as checking the sender's email address for any typos or misspellings, avoiding clicking on suspicious links, and verifying information directly in your system or application. Additionally, I will analyze real-life examples of fake emails, highlighting the irregularities and indicators that can help you identify them. By the end of this video, you will be equipped with the knowledge to spot and avoid falling victim to these fake emails
WatchArticles

Decentralized Loans: Is Under-collateralization Possible?
When I first learned Solidity, after grasping the basics and writing a few simple smart contracts, my first significant learning experience involved trawling through the constellation of code libraries that make up Aave, the decentralized crypto-lending platform.

Michal Bazyli — Unwavering Passion for Transforming the WEB3 Landscape
My name is Michal. I’ve been immersed in the world of cybersecurity for a total of 7 years, with the last 2 years specializing in blockchain security.

Protecting Your WiFi Network: How to Detect Unauthorized Users and Secure Your Connection
In today’s digital age, a stable and secure WiFi network is essential for both work and leisure. However, the convenience of wireless connectivity also makes it susceptible to unauthorized access. The possibility of someone using your WiFi network without your knowledge can lead to various issues, such as slow internet speeds, data breaches, and potential security threats. In this article, we will discuss how to check if your WiFi network is being used by someone else without your permission and provide valuable tips on how to prevent such incidents.

Automated Market Makers and Betting
When I turned eighteen, a few of my friends and I dressed up in tuxedos, and went to the Kurhaus casino. This was the first and last time I ever gambled with a large sum of money — 100 guilders, or about 500$ in today’s money, which was a huge amount to me at that age.

Luis Lubeck — Passionate about technology, new trends and especially security.
I have always been passionate about technology, new trends, and especially security. Combining these is the key element to creating a more secure environment for everyone. I am lucky that throughout my 20 years of experience in technology education I have been able to not only keep up with new trends and best practices but share that knowledge with others. If I can help a family member or a team member avoid falling into a phishing scam that could potentially trigger a ransomware attack on my network, then ultimately my devices (and my assets) will be more secure.

Joao Simoes — We are Shaping Not Only The Smart Contract Auditing Industry But Also The Entire Cybersecurity Space
Not your typical day-to-day question, but absolutely! There’s so much about one’s self, I wouldn’t even know where to start… Let me give it a try.

Auditing and logistics
Clients of a #smartcontracts auditing company don't just want to know what an audit includes.

An approach to security that resonates
About two years ago, while wandering around the corner of the metaverse that is Decentraland, I met Charles Dray.

Smart Contracts Aren’t Immutable!
In this, the first collaborative article with Resonance Security, offensive security expert[1] João Simões and I look at Ethereum smart contracts, and in particular the myth that they are immutable.

Ilan Abitdol - Diving Deep Into My Journey & Key Insights On Cloud Cybersecurity
As a Lead Security Engineer at Resonance Security, I play a pivotal role in shaping our cybersecurity landscape, let me share my experience and key insights

Computer Security: More carrots, less sticks
This is not just a theoretical article, at the end we provide ten different approaches that can be used to improve online security

Protect Yourself from OpenSea Active Phishing Scam: Safeguard Your Digital Investments
As the popularity of Non-Fungible Tokens (NFTs) continues to rise, so does the risk of falling victim to phishing scams. Cybercriminals are constantly devising new tactics to trick unsuspecting individuals into giving away their valuable digital assets. One such active scam involves a fake OpenSea NFT giveaway, where imposters promise free NFTs to lure users into providing access to their wallets. In this article, we’ll shed light on the modus operandi of these scammers and provide tips to fortify your defenses against such nefarious schemes.

Accents in programming
A few weeks ago I had a discussion with Charles and Ilan Abitbol over at Resonance Security, and in this video I summarize some points we covered about "accents" in computer programming.

Blockchain Cybersecurity: Exclusive Interview With Resonance Security CEO Charles Dray
Resonance Security CEO Charles Dray, gave valuable insights into blockchain cybersecurity in this interview with Olayimika Oyebanji.

Is AI capable of compromising password security?
As technology continues to advance, the issue of cybersecurity has become more pressing than ever. With a growing number of cybercriminals, it is essential that people take steps to protect their sensitive information. One of the most basic forms of security is the password, yet this has proven to be a weak point in many systems. While passwords were once considered sufficient for protecting information, the advent of Artificial Intelligence (AI) has changed this. In this article, we will discuss why it is easy for AI to break a password and why it is so important to enable multi factor authentication

It ain't what you think it's the language that you think in
A few weeks ago I was talking to Michal, who is a Lead Security Engineer over at Resonance Security. We were planning to discuss cross-chain issues, but as is always the case, the conversation meandered off into different fields, mostly concerning how the programming language you use shapes your view of the world.

Web3 Security: Resonating with Resonance
Creating a Safer Web3 with CUBE3.AI + Resonance Resonance provides more than just comprehensive cybersecurity solutions for the blockchain, emerging tech and web2 projects. They offer cybersecurity concierge service, education, and best-in-class security product aggregation for their clients. They are also a team of experts who understand what trends are emerging in the cybersecurity space and share the CUBE3.AI vision for a safer web3 for all.

Meet Resonance: Your Next-Level Cybersecurity Ally
Resonance isn’t your average run-of-the-mill security service; they’re focused on providing an all-encompassing protective shield

Receiving a Simple File Became a Nightmare.: WeTransfer Phishing Campaign
In today’s digital age, phishing attacks have become increasingly sophisticated and prevalent. Cybercriminals employ various tactics to trick unsuspecting individuals into revealing sensitive information or downloading malware. This article aims to raise awareness about this campaign (and many others), shed light on the modus operandi of the attackers, and provide best practices to help users spot fake emails and protect themselves from falling victim to such malicious activities. Let’s take a look at one active phishing campaign involving imposters posing as Wetransfer, a popular file-sharing service.

Cryptocurrencies Beyond the Grave: Best Practices for Crypto Key Management & Asset Recovery in the Event of Death
Imagine you are dealing with the loss of a loved one, and, to your horror, that loss is compounded by the realization that your loved one has not taken proper measures to ensure your family can access the assets they have left behind. While this can happen with any kind of asset, when it comes to cryptocurrency investments, this is unfortunately a common occurrence.

From zero to the working class, Cadence introduction for smart contract auditors
Quick introduction for smart contract auditors to get their hands around Cadence

Cybersecurity Challenges and the Paradox of Centralized Cloud Infrastructure in the Decentralized Web3 Ecosystem
In this article, we explore the security challenges faced by Web3 projects due to their dependence on centralized cloud infrastructure providers like AWS, GCP, and Alibaba Cloud. By leveraging our expertise in web3 security, cloud security, and previous audits/pentests, we offer an in-depth understanding of Web3 security in the context of cloud infrastructure. We examine the paradox of centralized decentralization, where Web3 projects pursue decentralization while relying on centralized cloud providers.