To identify and understand threats and weaknesses of smart contracts, it is important to be at least familiar with common smart contract bugs and…

Read more

Introduction Last year, I attended a job fair organized by the Association of Computer Science Students at ETH Zürich. It was a rewarding experience…

Read more

At Compass Security, we recently launched our managed bug bounty service. We openly invite hunters to probe our publicly exposed services for…

Read more

Authentication and authorization are critical components of any application. Various standards and frameworks have been developed to facilitate the…

Read more

This is hopefully the most useless blog post you will read this year as this post will detail our experience dealing with ransomware cases. It is one…

Read more