Industry News & Insights

Understanding Phishing: Common Attack Types and How to Avoid Them

Understanding Phishing: Common Attack Types and How to Avoid Them

With the tremendous expansion of cryptocurrency over recent years, hackers have been presented with unlimited possibilities to take advantage and swindle your money by exploiting innocent victims through phishing attacks and illegal activities. Crypto crime skyrocketed to unprecedented levels — Chainalysis, a blockchain data firm, reveals that scammers seized an astonishing $14 billion of digital assets in […]

Hacker Alert: Identifying the Types of Cybercriminals to Watch Out for in 2023

Hacker Alert: Identifying the Types of Cybercriminals to Watch Out for in 2023

Cybercriminals with malicious intent and access to diverse tools, contacts, and sources of information can cause considerable harm by corrupting systems or stealing data. Such individuals are known as hackers — a formidable threat to the security of any system. With the goal of obtaining data, destroying systems, or disrupting activity, hackers are notorious for their ability […]

Throwback: Achievements And Future Goals of Lossless

Throwback: Achievements And Future Goals of Lossless

Lossless has been working in the crypto industry for already 1.5 years. Our team accomplished many goals during this period and had quite a few success cases. Despite the bear market conditions, we kept BUIDLing and stayed true to our mission — providing security to web3 companies and their users. Let’s run through the core events that […]

New Team Member: Meet the QA Specialist — Anastasiia

New Team Member: Meet the QA Specialist — Anastasiia

We’re happy to announce that our team has grown yet again, and we have a new member to introduce. We now have a specialist on board to take care of our product Quality Assurance (QA) field. Introducing — Anastasiia! What got you into Crypto? To be honest, I never had experience with crypto before. I thought it was […]

8 Most Common Smart Contract Vulnerabilities

8 Most Common Smart Contract Vulnerabilities

Smart contracts are specialized programs stored on a blockchain typically used to automate the execution of an agreement so that all parties can be certain of the outcome without the need to trust one another or any intermediaries. A smart contract guarantees that its execution will correspond exactly to the logic that was originally written […]

2022 Security Review

2022 Security Review

The year 2022 is bound to be influential for the cryptocurrency world. With more than 22,000 digital assets in circulation and growing, the potential for malicious actors to exploit this emerging market is huge. In 2022, decentralized finance protocols faced immense volatility. Referred to as ‘DeFi,’ these applications use automation to provide financial services that […]

This website stores cookies on your computer to provide you a better experience. See our Privacy Policy for more information.