LUKSO for Solidity DevelopersToday we’re exploring what happens when an EVM chain rethinks its first principles. LUKSO maintains full bytecode compatibility while…2d ago2d ago
Extropy Security Bytes: w12 2025The past week has been a stark reminder of how rapidly evolving technologies, especially AI, are reshaping the landscape of cybersecurity…6d ago6d ago
Securing the LUKSOverse: Free Smart Contract Security Check-UpAttention LUKSO Innovators! Secure your smart contracts with an exclusive, no-cost Security Check-Up from Extropy, designed specifically…6d ago6d ago
Extropy Security Bytes: w11 2025Welcome to this week’s security news roundup, covering March 11th to 18th. The cybersecurity landscape remains as dynamic as ever, with…Mar 14Mar 14
Starknet Scaling Bitcoin — The What and WhyBitcoin’s security and decentralisation are unmatched, but scalability has always been a challenge. Now, Starknet has unveiled a bold plan…Mar 13Mar 13
Extropy Security Bytes: w10 2025Welcome to this week’s edition of Extropy Security Bytes, where we break down the latest security incidents, exploits, and vulnerabilities…Mar 10Mar 10
Extropy Security Bytes: w9 2025The crypto space continues to grapple with security threats, scams, and exploits that highlight the importance of robust security practices…Mar 3Mar 3
Audit-Driven Fix Secures Liquid Staking Token Against ManipulationA critical vulnerability was discovered in a recent audit of a project within the LUKSO ecosystem, impacting its liquid staking mechanism…Feb 21Feb 21
Using Formal Verification techniques when auditingAt Extropy we are continually striving to improve the quality of our audits to help ensure that our clients’ projects are safe from attack…Feb 17Feb 17
Extropy Security Bytes: w6 2025Welcome to this week’s Web3 security roundup, covering the latest hacks, exploits, and social engineering scams from 1st-8th Feb 2025. This…Feb 10Feb 10