Security Best Practises
The dangers of surprising code
Malicious actors in DeFi
What to do after been hacked
DeFi attacks
Tips to make auditors love you
How to prepare for a security review
Tokens and approvals
How to read etherscan contracts
9 Essential Steps for your Security
MyCrypto’s Security Guide For Dummies And Smart People Too
Legal resources on smart contract exploits / hacking
Flash Loans
Security of interoperability
Token Allowance Checker
Most common smart contract bugs of 2020
How to make your computer safe for crypto trading
Delphi Digital: Crypto Security Best Practices
Crypto security must follow tips:
Two rights might make a wrong: Saving sushi from MISO exploit
Zach’s master thread of shady actors
Dangerous things in crypto
NFT Scams
Airdrop Hacks
How to prevent your protocol from failure
How to protect against sim swap
Wallet security
Opsec guide
Think Like an attacker: Bringing smart contracts to their breaking point
How to secure your NFTs
Practical Smart Contract Security
Metamask approval hygiene
Opsec tips
Master security thread
Securing our network
Opsec guide
Best smart contract auditors
Q&A w Tree of Alpha
Bug Bounties in crypto
What is Cannon
DeFi Security
Checklist to Protect you and your funds
How to Read Smart Contracts Part 1
How to Read Smart Contracts Part 2
EU Cracks down on unhosted wallets
Ola Finance 3.6m exploit
Hitchhiker’s guides to war rooms and smart contract security incidents
ETHSign
If you don’t want to get hacked in crypto
Technical explanation on the redacted critical bug earlier this year
Proper opsec is key
Crypto Opsec
How to master Etherscan
NFT Platform security
Project Security Practises you should look for
LooksSafe
Security guide
Why OpSec is important
Web3 Security: Attack types and lessons learned
How to read smart contracts
9 attack patterns in DeFi that everyone should know
Smart contract upgradeability
Audit Readiness checklist
2/2 Simple Security Toolkit
Blockchain dark forest selfguard handbook
Onchain Wizard - Smart Contract Red Flags and Staying Safu
Simple security toolkit walkthrough
Guide to hacking the blockchain
How to audit a smart contract
Smart Contract Development w Foundry
Custody solutions: which option is right for me
A security framework for blockchain applications
Coinbase doesn’t list securities
Strips Price manipulation vulnerability explained
Security101: reentrancy attacks
Delegatecall & Contract upgradability
Crypto hacks
DeFi Exploits: Trends, Patterns, and Lessons Learnt
Digital signatures, anonymous credentials and decentralized identity,
SNARK Security and performance
Opsec guide
Phishing sucks
Sybil attackers part 2
Gone phishing for 5m
 
 
 
 
 
 
Resources:
Crypto Opsec resources