Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
What are linters and how can they help in blockchain and crypto development
Code quality is one of the topics that many devs talk about, including (or perhaps especially) in blockchain and crypto development…
And linters are a powerful tool for increasing quality of your smart contract code.
Discover the benefits of using linters to improve coding efficiency, security, and readability 👇
▶️ Read on Medium: What are linters and how can they help in blockchain and crypto development
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
rekt
Rekt - Dodging a Bullet
DeFi / Crypto - No funds lost. No chaos. Just a whitehat report, a five-day fix, and a protocol that treated security like engineering - not damage control. Vesu did everything right… which is exactly why no one’s talking about it.
This is a success story: a crypto project actually prevented losses by implementing coordinated blockchain security measures👇
Read an article: DODGING A BULLET
Proactive security measures are always a best practice
Please open Telegram to view this post
VIEW IN TELEGRAM
Kaspersky
SparkKitty: a new stealer in the App Store and Google Play
The SparkKitty Trojan steals photos from Android and iOS users' galleries.
Trojan steals sensitive data such as seed phrases from user screenshots.
▶️ Read an article: Your cat pics are at risk: the threat posed by the new SparkKitty Trojan
Please open Telegram to view this post
VIEW IN TELEGRAM
Akamai
Cryptominers’ Anatomy: Shutting Down Mining Botnets | Akamai
In the final installment of Cryptominers’ Anatomy, Akamai researchers analyze cryptominers and reveal a novel technique to shut down mining botnet campaigns.
▶️ Read the article: Cryptominers’ Anatomy: Shutting Down Mining Botnets
Please open Telegram to view this post
VIEW IN TELEGRAM
➡️ In the big-endian the ‘big’ end (most significant byte or MSB) comes first. For example, the number 0x1234 will be stored 'as is', 12 34. Big-endian is commonly used in network protocols, for example in TCP/IP.
⬅️ In the little endian the ‘little’ end (least significant byte or LSB) comes first. So, 0x1234 will be stored in memory as 34 12. Little-endian is used in modern processor architectures.
So, big-endian vs. little-endian example:
Take the number 0xDEADBEEF:
- Big-endian: DE AD BE EF
- Little-endian: EF BE AD DE
Why care in blockchain & crypto? We use different machines and protocols to store and transfer the data. The order of bytes affects how data is hashed, signed or transmitted. To create a solid and secure blockchain ecosystem, it is important to take care of endianness.
Be mindful of the endianness and double-check protocol specifications to ensure a consistent data flow across your Web3 system 🚀
Please open Telegram to view this post
VIEW IN TELEGRAM
Cryptonews
Trezor Issues Urgent Alert Over Support-Form Phishing Attack
Trezor issues urgent security alert after hackers exploited support contact form to send phishing emails to users.
Read the article about the incident: Trezor Issues ‘Urgent Alert’ After Support-Form Exploit Sends Phishing Emails – What Users Must Know
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
Frontend / supply chain attacks in crypto and what to do about it
When it comes to blockchain project security, what project areas do you consider first for protection? Most likely you thought of smart…
Supply chain attacks due to lack of frontend security.
It is time to speak up and take frontend security seriously in the blockchain / Web3 industry👇
▶️ Read the article on Medium: Frontend / supply chain attacks in crypto and what to do about it
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥1🔥1👏1 1
BleepingComputer
Google fixes fourth actively exploited Chrome zero-day of 2025
Google has released emergency updates to patch another Chrome zero-day vulnerability exploited in attacks, marking the fourth such flaw fixed since the start of the year.
Read an article: Google fixes fourth actively exploited Chrome zero-day of 2025
Time to update your Chrome
Please open Telegram to view this post
VIEW IN TELEGRAM
Avoid these popular traps like lack of proper checks, clicking phishing links, saving seeds in screenshots.
Play, learn, & stay safe
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
Understanding MEV attacks
One of the key drivers of blockchain protocol stability is MEV (Miner or, more modernly, Maximum Extractable Value) — the profit a miner…
Our latest article dives into MEV attacks, their impact on DeFi, and solutions to ensure integrity in Web3 👇
▶️ Read the article on Medium: Understanding MEV attacks
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
What’s Anchor? It’s a Rust framework for Solana that cuts boilerplate & boosts productivity. Offers declarative syntax, auto account validation, TypeScript bindings, and more. Perfect for DeFi, NFT, or quick prototyping.
Native Rust gives you full control over Solana programs. You handle accounts, serialization & CPI manually. Ideal for custom logic or performance-critical apps, but needs deep Solana knowledge.
Anchor’s edge:
🔸 Less code with macros
🔸 Built-in basic security checks
🔸 Testing framework & TS support
Downside? Less flexibility for niche use cases.
Native Rust’s strengths:
🔸 Ultimate flexibility
🔸 Fine-tuned performance
But, you’ll write more code & handle security yourself. Risky if you miss a check. Best for low-level protocols.
When to use Anchor?
- New to Solana
- Building DeFi / NFT
- Want fast dev & safety
When to use native Rust?
- Need custom logic
- Performance is critical
- You’re a Solana pro or interested in becoming one 😎
In sum:
Want to dive deeper?
▶️ Check Anchor docs: https://anchor-lang.com
▶️ or Solana docs: https://docs.solana.com
Please open Telegram to view this post
VIEW IN TELEGRAM
Cointelegraph
Bitcoin Depot discloses data breach that doxed 27K customers
Crypto ATM operator Bitcoin Depot has told its users that a data breach mid-last year exposed 27,000 of its customers' information, which it only disclosed this week due to a federal investigation.
▶️ Read an article: Bitcoin Depot discloses data breach that doxed 27K customers
The breach compromised names, phone numbers, and driver’s license numbers, and may have also exposed addresses, birth dates, and emails
Please open Telegram to view this post
VIEW IN TELEGRAM
ReversingLabs
Malicious pull request infects VS Code extension | ReversingLabs
ETHcode, a VS Code extension for Ethereum smart contract development, was compromised following a GitHub pull request.
▶️ Read an article: Malicious pull request infects VS Code extension
Stay vigilant & update extensions manually
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
What is entropy illusion vulnerability?
Blockchain systems offer great opportunities for projects and devs, but like any other system, they have a number of certain limitations…
Know more about pseudo-randomness and entropy illusion vulnerability in our recent article
▶️ Read on Medium: What is entropy illusion vulnerability?
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
wiz.io
Soco404: Multiplatform Cryptomining Campaign | Wiz Blog
Wiz Research has identified a new iteration of a broader malicious cryptomining campaign, which we’ve dubbed Soco404.
▶️ Read the article - Soco404: Multiplatform Cryptomining Campaign Uses Fake Error Pages to Hide Payload
Wiz links their recent findings to a broader crypto-scam infrastructure.
Stay cautious, stay safu
Please open Telegram to view this post
VIEW IN TELEGRAM
Access control is how a smart contract defines and restricts who can call critical functions (e.g. withdrawing funds or updating settings).
Hackers seek and exploit access control vulnerabilities to gain unauthorized access to critical functions and data within the contract and abuse the contract processes.
- No access modifiers: functions left public when they should be private / restricted
- Weak role management: admins / minters are not properly verified
- Initializer exploits: unprotected initialization functions that anyone can call post-deployment
- Ensure initialization functions can only be called once and only by authorized entities
- Use access control patterns like Ownable or RBAC to manage permissions
- Use modifiers like onlyOwner or custom roles to sensitive functions
- Test and audit your code 🔍
- Proper design = fewer sleepless nights for devs & users
- Consider every function as a potential entry point
- Explicitly define access rules for all sensitive operations
- And never trust user input without validation
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1🔥1 1 1
Kaspersky
The Efimer Trojan steals cryptocurrency via malicious torrent files and WordPress websites
The Efimer Trojan steals cryptocurrency via WordPress websites and malicious torrent files. Here's how to protect yourself from this new cyberthreat.
▶️ Read the article: Efimer Trojan using hacked websites to steal cryptocurrency
Stay sharp, stay safu
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
Price oracle manipulation vulnerability in smart contracts
To build a competitive DeFi project developers need to add interactions with external price data sources — price oracles — for their…
Our latest security article breaks down this critical issue and provides actionable tips for prevention
▶️ Read on Medium: Price oracle manipulation vulnerability in smart contracts
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM
BleepingComputer
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
In a supply chain attack, attackers injected malware into NPM packages with over 2.6 billion weekly downloads after compromising a maintainer's account in a phishing attack.
▶️ Read an article: Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
Stay vigilant, stay SAFU
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
A SWIFT shift: what is ISO 20022 and how is it related to the blockchain industry?
On November 22, 2025, SWIFT, a key player in global financial payments with over 11,000 connected institutions, will transition from its…
💳 In a few days, SWIFT has planned a global shift to the ISO 20022, which aims to change the TradFi. What is this standard, how does it relate to the blockchain industry, and what twists might it bring? Learn more in our recent article:
▶️ Read on Medium: A SWIFT shift: what is ISO 20022 and how is it related to the blockchain industry?
Stay tuned for more updates from SmartState☺️ , follow us on social media to learn about our latest security services and success stories:
🤖 SmartState on X
🟦 LinkedIn
✈️ Telegram
🥳 Medium
▶️ Read on Medium: A SWIFT shift: what is ISO 20022 and how is it related to the blockchain industry?
Stay tuned for more updates from SmartState
Please open Telegram to view this post
VIEW IN TELEGRAM