The Cyber Security Industry Runs On Fear

INTRODUCTION Think about astrology for a moment. Nobody can truly prove that Mercury in retrograde is responsible for your bad decisions, but the moment you ignore the warning and something goes wrong, well, suddenly the stars had a point, didn’t…

The Hidden Trade-Off in the CIA Triad

CIA stands for Confidentiality, Integrity, and Availability and no, we’re not talking about secret agents (though cybersecurity does have its own brand of espionage). These three principles form the absolute cornerstones of the entire cybersecurity industry, acting as the universal…

SQL INJECTIONS

SQL Injection (SQLi) is a security vulnerability that allows attackers to interfere with the queries that an application makes to its database. This can allow attackers to view data that they are not normally able to retrieve, and in some…

CROSS SITE SCRIPTING

Cross-site scripting (XSS) is a common security vulnerability that allows attackers to inject malicious code into a website, often in the form of scripts. When users visit the compromised website, the malicious code runs in their browser, potentially leading to…

PART 3 : EXPLOITING THE DAPP

This article delves into the intricacies of exploiting a common vulnerability in smart contracts, known as a reentrancy attack, using a pirate-themed DApp called “Reentrant Pirate” as our example. The “Reentrant Pirate” DApp is designed to simulate a treasure hunt…

PART 2 : SETTING UP REENTRANT PIRATES

Embark on a thrilling adventure with Captain Reenter and his notorious crew aboard the Ether Buccaneer as you set up the Reentrant Pirates dApp. This guide will lead you through each step of the journey, from cloning the repository to…

PART 1 : INTRODUCTION TO REENTRANCY

Blockchain technology and smart contracts have revolutionised various industries by enabling decentralised and automated processes. However, these innovations come with their own set of vulnerabilities. One critical vulnerability is reentrancy, which can lead to significant security breaches if not adequately…

COMPONENTS OF ZERO TRUST MODEL

Just a recap of all the components of Zero Trust Architecture IDENTITY VERFICATION 1. Multi-Factor Authentication (MFA) MFA enhances security by requiring multiple verification methods before granting access. It’s like needing both a key and a passcode to enter a…