![Decoding PolyNetwork exploit](https://blog.quillaudits.com/media/uploads/2023/07/Polynetwork-exploit-Post-Mortem-medium-banner-768x432.png)
![Decoding PolyNetwork exploit](https://blog.quillaudits.com/media/uploads/2023/07/Polynetwork-exploit-Post-Mortem-medium-banner-768x432.png)
Decoding Poly Network $34 Billion Hack
Read Time: 8 minutes Summary: On July 2nd, 2023, Poly Network suffered a hack of what was initially reported to be 34 billion dollars.
![Bridging the Gap: Chartered Accountants and Smart Contract Auditors in the Web3 Space](https://blog.quillaudits.com/media/uploads/2023/07/bridging-the-gap-2-768x768.png)
![Bridging the Gap: Chartered Accountants and Smart Contract Auditors in the Web3 Space](https://blog.quillaudits.com/media/uploads/2023/07/bridging-the-gap-2-768x768.png)
C.A. and Smart Contract Auditors in the Web3 Space
Read Time: 2 minutes I recently participated in a panel discussion on ‘Cyber Security Issues of Web3,’ organized by Startup ICAI, a community of
![Fantom Security Audit](https://blog.quillaudits.com/media/uploads/2023/06/Fantom-Audit-768x432.png)
![Fantom Security Audit](https://blog.quillaudits.com/media/uploads/2023/06/Fantom-Audit-768x432.png)
Fantom Audit Essentials: Maximize Security & Trust
Read Time: 5 minutes Fantom, a high-performing Layer 1 blockchain, has recently become a hub for DeFi due to its scalability and cost-effective transaction
![Decoding Ara Protocol's Flash Loan](https://blog.quillaudits.com/media/uploads/2023/06/ara-protocol-exploit-flash-loan-2-768x432.png)
![Decoding Ara Protocol's Flash Loan](https://blog.quillaudits.com/media/uploads/2023/06/ara-protocol-exploit-flash-loan-2-768x432.png)
Decoding Ara Protocol’s Flash Loan Exploit
Read Time: 3 minutes Summary On June 18, 2023, the Ara Protocol on the BNB Chain was attacked due to an access control vulnerability.
![Anatomy of Defi Rug Pull](https://blog.quillaudits.com/media/uploads/2023/06/Anatomy-Of-Defi-Rug-Pull-768x402.png)
![Anatomy of Defi Rug Pull](https://blog.quillaudits.com/media/uploads/2023/06/Anatomy-Of-Defi-Rug-Pull-768x402.png)
The Anatomy of a DeFi Rug Pull: How to Protect Yourself as an Investor
Read Time: 5 minutes Let us give you some hard facts. According to a report, we saw 1,548 Scam tokens deployed in the year
![QuillAudits Red Team](https://blog.quillaudits.com/media/uploads/2023/06/QRT-G1-768x432.png)
![QuillAudits Red Team](https://blog.quillaudits.com/media/uploads/2023/06/QRT-G1-768x432.png)
QuillAudits Red Team As A Service: All You Need To Know
Read Time: 4 minutes The Web3 world has witnessed growth in leaps and bounds compared to how it was all a decade ago. As
![Understanding Hyperledger](https://blog.quillaudits.com/media/uploads/2023/06/understanding-hyperledger-and-its-sec-blog-red-1-768x432.png)
![Understanding Hyperledger](https://blog.quillaudits.com/media/uploads/2023/06/understanding-hyperledger-and-its-sec-blog-red-1-768x432.png)
Understanding Hyperledger and Its Security Guidelines
Read Time: 6 minutes Blockchain technology, with its decentralized nature, has revolutionized the way we approach transparency and efficiency. This technology delegates tasks to
![Guide To MEV](https://blog.quillaudits.com/media/uploads/2023/05/guide-to-MEV-300x169.png)
![Guide To MEV](https://blog.quillaudits.com/media/uploads/2023/05/guide-to-MEV-300x169.png)
A Guide To MEV: Critical Issues and Best Security Practices
Read Time: 6 minutes Profit-making is the ultimate aim behind any work that an individual performs. In regard to that, MEV, which stands for
![DOS Attacks on Smart Contract](https://blog.quillaudits.com/media/uploads/2023/05/dos-attack-300x169.png)
![DOS Attacks on Smart Contract](https://blog.quillaudits.com/media/uploads/2023/05/dos-attack-300x169.png)
Fix & Avoid Denial of Service Attacks in Smart Contracts
Read Time: 6 minutes Ever visited a site that took a long loading time only to find that it can’t be opened at the
![SUI Blockchain](https://blog.quillaudits.com/media/uploads/2023/05/Sui-Blockchain-300x169.png)
![SUI Blockchain](https://blog.quillaudits.com/media/uploads/2023/05/Sui-Blockchain-300x169.png)
SUI Blockchain: Advantages and Audits
Read Time: 4 minutes Since Bitcoin became a thing, we have seen many blockchains come and go. The one that has established its dominance
![Near Protocol Security Practice](https://blog.quillaudits.com/media/uploads/2023/05/Near-Protocol-Security-Practices-300x169.png)
![Near Protocol Security Practice](https://blog.quillaudits.com/media/uploads/2023/05/Near-Protocol-Security-Practices-300x169.png)
NEAR Protocol: Architecture, Ecosystem, and Best Security Practices
Read Time: 7 minutes The competition for layer-1 blockchains is growing strong with new emerging solutions improvised in terms of cost, speed, security and
![Guide to ZkSync](https://blog.quillaudits.com/media/uploads/2023/05/guide-to-ZkSync-300x169.png)
![Guide to ZkSync](https://blog.quillaudits.com/media/uploads/2023/05/guide-to-ZkSync-300x169.png)
An Explanatory Guide To ZkSync
Read Time: 5 minutes The most popular blockchain- Ethereum, certainly has some drawbacks, such as high gas fees and slow processing of transactions. However,
![L1 Protocol Security Threats](https://blog.quillaudits.com/media/uploads/2023/04/L1-protocol-security-threat-300x169.png)
![L1 Protocol Security Threats](https://blog.quillaudits.com/media/uploads/2023/04/L1-protocol-security-threat-300x169.png)
Emerging L1 Protocol Security Threats
Read Time: 8 minutes Layer 1 protocols are the heart of the blockchain ecosystem. If you do not know about what Layer 1 is,
![ERC-4337](https://blog.quillaudits.com/media/uploads/2023/04/erc-blog-banner-2-300x169.png)
![ERC-4337](https://blog.quillaudits.com/media/uploads/2023/04/erc-blog-banner-2-300x169.png)
Understanding ERC-4337 User Operation Packing Vulnerability
Read Time: 5 minutes The world of Web3 is a world of protocols and standards. You sure must have come across several ERC standards.
![prepare for a security breach](https://blog.quillaudits.com/media/uploads/2023/04/prepare-security-breach-300x169.png)
![prepare for a security breach](https://blog.quillaudits.com/media/uploads/2023/04/prepare-security-breach-300x169.png)
How to Prepare for a Web3 Security Breach: Incident Response Planning
Read Time: 5 minutes No matter how hard you try to secure your house from a security breach, you never know what the thief
Search Blog
Categories
Categories
Popular Posts
![ERC 404](https://blog.quillaudits.com/media/uploads/2024/03/Erc-404-Blog-banner-300x169.jpg)
![ERC 404](https://blog.quillaudits.com/media/uploads/2024/03/Erc-404-Blog-banner-300x169.jpg)
![ERC 404](https://blog.quillaudits.com/media/uploads/2024/03/Erc-404-Blog-banner-300x169.jpg)
ERC 404 Standard: Everything You Need to Know
![DNS Attacks](https://blog.quillaudits.com/media/uploads/2024/03/DNS-Attacks_-Cascading-Effects-and-Mitigation-Strategies-300x169.jpg)
![DNS Attacks](https://blog.quillaudits.com/media/uploads/2024/03/DNS-Attacks_-Cascading-Effects-and-Mitigation-Strategies-300x169.jpg)
![DNS Attacks](https://blog.quillaudits.com/media/uploads/2024/03/DNS-Attacks_-Cascading-Effects-and-Mitigation-Strategies-300x169.jpg)
![EIP 4844](https://blog.quillaudits.com/media/uploads/2024/02/EIP-4844-blog-banner-300x169.jpg)
![EIP 4844](https://blog.quillaudits.com/media/uploads/2024/02/EIP-4844-blog-banner-300x169.jpg)
![EIP 4844](https://blog.quillaudits.com/media/uploads/2024/02/EIP-4844-blog-banner-300x169.jpg)
![QuillAudits Powers Supermoon at ETH Denver](https://blog.quillaudits.com/media/uploads/2024/02/image2-300x169.png)
![QuillAudits Powers Supermoon at ETH Denver](https://blog.quillaudits.com/media/uploads/2024/02/image2-300x169.png)
![QuillAudits Powers Supermoon at ETH Denver](https://blog.quillaudits.com/media/uploads/2024/02/image2-300x169.png)
QuillAudits Powers Supermoon at ETH Denver!
100x Return- "Georgian Coinbase account is identical to Aladdin's magic lamp"🧞
Coinbase (COIN) users in the Eastern European country of Georgia were able to exploit a price bug that allowed them to cash out their holdings for 100 times the exchange rate, pocketing thousands of dollars in profit.