Emerging Tech Security
AI security and safety, cyber-kinetic security, 5G and mIoT security, blockchain and crypto security, and other emerging technology risk domains adjacent to quantum.
-
Trying to Solve the Mysterious $200M BitMart Hack
A missing pile of Safemoon and other cryptocurrencies, accusations of broken promises, and then nothing. When a high-profile cyber attack takes place and hundreds of millions of dollars are lost, usually a healthy balance is struck between safeguarding information to…
Read More » -
How Multimodal Attacks Exploit Models Trained on Multiple Data Types
In simplest terms, a multimodal model is a type of machine learning algorithm designed to process more than one type of data, be it text, images, audio, or even video. Traditional models often specialize in one form of data; for…
Read More » -
Why DevSecOps is Essential for the Blockchain Ecosystem
In recent years, many organizations have adopted more modern development practices, including Agile, Scrum, and DevOps. The goal of these new processes is to improve the pace and efficiency of development by streamlining the development process and using automation whenever…
Read More » -
What the $534M Coincheck Hack Taught Us All About Safe Storage of Digital Assets
The biggest crypto heist in history at the time it occurred in 2018 was an eye-opener for many reasons, not least of which for the way the stolen assets were being stored. Seasoned crypto enthusiasts and early adopters of the…
Read More » -
Security Threats to Blockchain Networks – 6 – Wallet Attacks
Wallet Attacks: A Deep-dive Wallets are a logical target for cyber-attacks, along with the emerging institutions that hold custody of them on users’ behalf. While secured with technically unbreakable code, hackers have found numerous ways to gain illicit access to…
Read More » -
What the Biggest Blockchain Game’s Hack Reveals about the Future of Crypto Adoption
Axie Infinity’s Ronin Bridge Hack for $551M worth of crypto assets could paradoxically lead to higher rates of blockchain adoption by showing that it’s a lot easier to track stolen cryptocurrency than people think. The popular misconception that cryptocurrencies are…
Read More » -
Security Threats to Blockchain Networks – 5 – Consensus Attacks
Consensus Attacks: A Deep-dive Where centralized systems operate on the basis of centralized permission, blockchain protocols proceed on the basis of decentralized consensus. While this is more secure in theory, the system is not flawless. All blockchains are susceptible to…
Read More » -
The Threat of Query Attacks on Machine Learning Models
Query attacks are a type of cybersecurity attack specifically targeting machine learning models. In essence, attackers issue a series of queries, usually input data fed into the model, to gain insights from the model's output. This could range from understanding…
Read More » -
Security Threats to Blockchain Networks – 4 – Network Attacks
Network Attacks: A Deep-dive Network attacks are a class of exploits that focus on the isolation and manipulation of individual nodes or groups of nodes. While blockchain networks are theoretically robust against such attempts, both hackers and academics have found…
Read More » -
Security Threats to Blockchain Networks – 3 – Smart Contracts
Smart Contract Risk and How to Mitigate It: A Deep-dive The strengths of smart contracts are also the source of its weaknesses, and will always present opportunities for hackers to exploit. So far, the pace of innovation in counter-measures is…
Read More » -
Diving into the $320M Wormhole Bridge Hack
The full story behind the exploit that led to the fraudulent minting of 120,000 wETH and threatened to crash Solana. Early February of 2022 was a low-point for the cryptocurrency asset class; one of many more to come throughout the…
Read More » -
Security Threats to Blockchain Networks – 2 – A Holistic Overview
The utopian view of the blockchain as an unhackable alternative to the status quo is a pipedream. Many traditional cyberattacks are effective in a blockchain-based setting, and even cryptographically-secured processes are prone to errors and exploits. Understanding the potential attack…
Read More » -
Securing Data Labeling Through Differential Privacy
Differential Privacy is a privacy paradigm that aims to reconcile the conflicting needs of data utility and individual privacy. Rooted in the mathematical theories of privacy and cryptography, Differential Privacy offers quantifiable privacy guarantees and has garnered substantial attention for…
Read More » -
Security Threats to Blockchain Networks – 1 – Cyber Attacks Taxonomy
Cyber-Attack Strategies in the Blockchain Era – A Framework for Categorizing the Emerging Threats to the Crypto Economy Market attacks Rely on the mass-manipulation of investors through asymmetric information Pump-and-dump Parties conspire to artificially inflate (pump) the price of an…
Read More » -
Introducing Society 5.0
Self-help authors and politicians seem to agree on at least one thing: mindset matters. The shelves of bookstores worldwide are awash with motivational books by evangelical writers hoping to convert readers to their gospel of optimism. The central thesis is…
Read More »













