Session Recordings FOR YOU
You don't have any recordings yet. But, you can book one here
This is some text inside of a div block.
This is some text inside of a div block.
Watch
GENERAL Live Sessions
Using Yubikeys Keys for Multi-Factor Authentication
In this video, I'll demonstrate how to use Yubikey as a multi-factor authentication device and explain its crucial role in securing our identity. We'll cover common attack vectors like phishing and the risks associated with leaked passwords. Additionally, I'll emphasize good practices for handling credentials, the importance of using strong passwords, and the need to avoid sharing them. We'll explore the concept of multi-factor authentication and discuss why it's essential to implement it whenever possible. Finally, I'll walk you through setting up YubiKeys keys for multi-factor authentication in Google accounts
Watch
How To Spot a Fake Email
In this video, I will show you how to identify and protect yourself from phishing scams, which are the most common methods used to trick users into surrendering sensitive information. I will provide basic steps to follow, such as checking the sender's email address for any typos or misspellings, avoiding clicking on suspicious links, and verifying information directly in your system or application. Additionally, I will analyze real-life examples of fake emails, highlighting the irregularities and indicators that can help you identify them. By the end of this video, you will be equipped with the knowledge to spot and avoid falling victim to these fake emails
Watch
This is some text inside of a div block.
This is some text inside of a div block.
Watch
Articles
Decentralized Loans: Is Under-collateralization Possible?
Read Article
When I first learned Solidity, after grasping the basics and writing a few simple smart contracts, my first significant learning experience involved trawling through the constellation of code libraries that make up Aave, the decentralized crypto-lending platform.
Michal Bazyli — Unwavering Passion for Transforming the WEB3 Landscape
Read Article
My name is Michal. I’ve been immersed in the world of cybersecurity for a total of 7 years, with the last 2 years specializing in blockchain security.
Protecting Your WiFi Network: How to Detect Unauthorized Users and Secure Your Connection
Read Article
In today’s digital age, a stable and secure WiFi network is essential for both work and leisure. However, the convenience of wireless connectivity also makes it susceptible to unauthorized access. The possibility of someone using your WiFi network without your knowledge can lead to various issues, such as slow internet speeds, data breaches, and potential security threats. In this article, we will discuss how to check if your WiFi network is being used by someone else without your permission and provide valuable tips on how to prevent such incidents.
Automated Market Makers and Betting
Read Article
When I turned eighteen, a few of my friends and I dressed up in tuxedos, and went to the Kurhaus casino. This was the first and last time I ever gambled with a large sum of money — 100 guilders, or about 500$ in today’s money, which was a huge amount to me at that age.
Luis Lubeck — Passionate about technology, new trends and especially security.
Read Article
I have always been passionate about technology, new trends, and especially security. Combining these is the key element to creating a more secure environment for everyone. I am lucky that throughout my 20 years of experience in technology education I have been able to not only keep up with new trends and best practices but share that knowledge with others. If I can help a family member or a team member avoid falling into a phishing scam that could potentially trigger a ransomware attack on my network, then ultimately my devices (and my assets) will be more secure.
Joao Simoes — We are Shaping Not Only The Smart Contract Auditing Industry But Also The Entire Cybersecurity Space
Read Article
Not your typical day-to-day question, but absolutely! There’s so much about one’s self, I wouldn’t even know where to start… Let me give it a try.
Auditing and logistics
Read Article
Clients of a #smartcontracts auditing company don't just want to know what an audit includes.
An approach to security that resonates
Read Article
About two years ago, while wandering around the corner of the metaverse that is Decentraland, I met Charles Dray.
Smart Contracts Aren’t Immutable!
Read Article
In this, the first collaborative article with Resonance Security, offensive security expert[1] João Simões and I look at Ethereum smart contracts, and in particular the myth that they are immutable.
Ilan Abitdol - Diving Deep Into My Journey & Key Insights On Cloud Cybersecurity
Read Article
As a Lead Security Engineer at Resonance Security, I play a pivotal role in shaping our cybersecurity landscape, let me share my experience and key insights
Computer Security: More carrots, less sticks
Read Article
This is not just a theoretical article, at the end we provide ten different approaches that can be used to improve online security
Protect Yourself from OpenSea Active Phishing Scam: Safeguard Your Digital Investments
Read Article
As the popularity of Non-Fungible Tokens (NFTs) continues to rise, so does the risk of falling victim to phishing scams. Cybercriminals are constantly devising new tactics to trick unsuspecting individuals into giving away their valuable digital assets. One such active scam involves a fake OpenSea NFT giveaway, where imposters promise free NFTs to lure users into providing access to their wallets. In this article, we’ll shed light on the modus operandi of these scammers and provide tips to fortify your defenses against such nefarious schemes.
Accents in programming
Read Article
A few weeks ago I had a discussion with Charles and Ilan Abitbol over at Resonance Security, and in this video I summarize some points we covered about "accents" in computer programming.
Blockchain Cybersecurity: Exclusive Interview With Resonance Security CEO Charles Dray
Read Article
Resonance Security CEO Charles Dray, gave valuable insights into blockchain cybersecurity in this interview with Olayimika Oyebanji.
Is AI capable of compromising password security?
Read Article
As technology continues to advance, the issue of cybersecurity has become more pressing than ever. With a growing number of cybercriminals, it is essential that people take steps to protect their sensitive information. One of the most basic forms of security is the password, yet this has proven to be a weak point in many systems. While passwords were once considered sufficient for protecting information, the advent of Artificial Intelligence (AI) has changed this. In this article, we will discuss why it is easy for AI to break a password and why it is so important to enable multi factor authentication
It ain't what you think it's the language that you think in
Read Article
A few weeks ago I was talking to Michal, who is a Lead Security Engineer over at Resonance Security. We were planning to discuss cross-chain issues, but as is always the case, the conversation meandered off into different fields, mostly concerning how the programming language you use shapes your view of the world.
Web3 Security: Resonating with Resonance
Read Article
Creating a Safer Web3 with CUBE3.AI + Resonance Resonance provides more than just comprehensive cybersecurity solutions for the blockchain, emerging tech and web2 projects. They offer cybersecurity concierge service, education, and best-in-class security product aggregation for their clients. They are also a team of experts who understand what trends are emerging in the cybersecurity space and share the CUBE3.AI vision for a safer web3 for all.
Meet Resonance: Your Next-Level Cybersecurity Ally
Read Article
Resonance isn’t your average run-of-the-mill security service; they’re focused on providing an all-encompassing protective shield
Receiving a Simple File Became a Nightmare.: WeTransfer Phishing Campaign
Read Article
In today’s digital age, phishing attacks have become increasingly sophisticated and prevalent. Cybercriminals employ various tactics to trick unsuspecting individuals into revealing sensitive information or downloading malware. This article aims to raise awareness about this campaign (and many others), shed light on the modus operandi of the attackers, and provide best practices to help users spot fake emails and protect themselves from falling victim to such malicious activities. Let’s take a look at one active phishing campaign involving imposters posing as Wetransfer, a popular file-sharing service.
Cryptocurrencies Beyond the Grave: Best Practices for Crypto Key Management & Asset Recovery in the Event of Death
Read Article
Imagine you are dealing with the loss of a loved one, and, to your horror, that loss is compounded by the realization that your loved one has not taken proper measures to ensure your family can access the assets they have left behind. While this can happen with any kind of asset, when it comes to cryptocurrency investments, this is unfortunately a common occurrence.
From zero to the working class, Cadence introduction for smart contract auditors
Read Article
Quick introduction for smart contract auditors to get their hands around Cadence
Cybersecurity Challenges and the Paradox of Centralized Cloud Infrastructure in the Decentralized Web3 Ecosystem
Read Article
In this article, we explore the security challenges faced by Web3 projects due to their dependence on centralized cloud infrastructure providers like AWS, GCP, and Alibaba Cloud. By leveraging our expertise in web3 security, cloud security, and previous audits/pentests, we offer an in-depth understanding of Web3 security in the context of cloud infrastructure. We examine the paradox of centralized decentralization, where Web3 projects pursue decentralization while relying on centralized cloud providers.
This is some text inside of a div block.
Read Article
This is some text inside of a div block.