Extropy Security Bytes: w11 2025Welcome to this week’s security news roundup, covering March 11th to 18th. The cybersecurity landscape remains as dynamic as ever, with…2d ago2d ago
Starknet Scaling Bitcoin — The What and WhyBitcoin’s security and decentralisation are unmatched, but scalability has always been a challenge. Now, Starknet has unveiled a bold plan…3d ago3d ago
Extropy Security Bytes: w10 2025Welcome to this week’s edition of Extropy Security Bytes, where we break down the latest security incidents, exploits, and vulnerabilities…6d ago6d ago
Extropy Security Bytes: w9 2025The crypto space continues to grapple with security threats, scams, and exploits that highlight the importance of robust security practices…Mar 3Mar 3
Audit-Driven Fix Secures Liquid Staking Token Against ManipulationA critical vulnerability was discovered in a recent audit of a project within the LUKSO ecosystem, impacting its liquid staking mechanism…Feb 21Feb 21
Using Formal Verification techniques when auditingAt Extropy we are continually striving to improve the quality of our audits to help ensure that our clients’ projects are safe from attack…Feb 17Feb 17
Extropy Security Bytes: w6 2025Welcome to this week’s Web3 security roundup, covering the latest hacks, exploits, and social engineering scams from 1st-8th Feb 2025. This…Feb 10Feb 10
Extropy Security Bytes: w4 2025Welcome to this week’s blockchain security roundup, brought to you by Extropy.io! In this series, we deliver bite-sized updates on the most…Jan 27Jan 27
2024 in reviewIn 2024 we continued our focus on zero-knowledge technology and security. We expanded our team, delivered impactful training to hundreds of…Dec 31, 2024Dec 31, 2024
This article illustrates the main sections of an audit report, using examples from recent audits…A typical report will contain the following sections :Sep 23, 2024Sep 23, 2024