vulnerability

MSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide
Aaditya Khati
January 1, 2023

MSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide

Table Of Contents Introduction About us About CyberRisk Alliance Introduction CryptoGen Nepal is listed as Top 250 MSSP.

Read More
MSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide
Aaditya Khati
January 1, 2023

MSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide

Table Of Contents Introduction About us About CyberRisk Alliance Introduction CryptoGen Nepal is listed as Top 250 MSSP.

Read More
MEGA's Unlimited Cloud Storage Vulnerability
Nirmal Dahal
November 17, 2022

MEGA's Unlimited Cloud Storage Vulnerability

Background Back in June 2022, I found a flaw in the MEGA cloud storage system that let me store more data than they permit for free accounts.

Read More
Arithmetic Vulnerabilities in Smart Contracts
Aayushman Thapa Magar
November 4, 2022

Arithmetic Vulnerabilities in Smart Contracts

Forword This is fourth in a series of articles on vulnerabilities that smart contracts are susceptible to.

Read More
Signature Malleability Vulnerabilities in Smart Contracts
Aayushman Thapa Magar
October 30, 2022

Signature Malleability Vulnerabilities in Smart Contracts

Table Of Contents Foreword Contents Cryptography Basics Hashing Encryption Digital Signature Cryptography in Ethereum Elliptic Curve Cryptography Overview Point Addition Scalar Multiplication Key generation Signatures in Ethereum ECRECOVER Overview Security Risk Mitigation Measure References Foreword This is third in a series of articles on vulnerabilities that smart contracts are susceptible to.

Read More
Re-entrancy Vulnerabilities in Smart Contracts
Aayushman Thapa Magar
October 5, 2022

Re-entrancy Vulnerabilities in Smart Contracts

Table Of Contents Foreword Contents Re-entrancy Overview Security Risk Example Identification techniques Mitigation measures References Foreword This is second in a series of articles on vulnerabilities that smart contracts are susceptible to.

Read More
Transaction Order Dependence Vulnerabilities on Smart Contracts
Aayushman Thapa Magar
October 4, 2022

Transaction Order Dependence Vulnerabilities on Smart Contracts

Table Of Contents Foreword Table of Contents Transaction Order Dependence Overview Introduction Ethereum mempool Security Risk Example Identification Techniques Mitigation Measures References Foreword This work is first in the series of articles on vulnerabilities that smart contracts are susceptible to.

Read More