Dreamlab Technologies presents to you our brand new ‘Cyber Insights’ newsletter – an expert analysis of the latest developments in the cyber domain across the globe. The cyber world is a world full of opportunities, but unfortunately faces new and emerging threats every day.
Leer màs...
Dreamlab Technologies presents to you our brand new ‘Cyber Insights’ newsletter – an expert analysis of the latest developments in the cyber domain across the globe. The cyber world is a world full of opportunities, but unfortunately faces new and emerging threats every day.
Leer màs...
Metaverse real estate are parcels of land in virtual worlds. They are pixels in the most basic sense. However, they are more than just digital images.
Leer màs...
On October 10th 2022 Fortinet patched a critical authentication bypass vulnerability affecting three of their products: FortiOS, FortiProxy, and...
Leer màs...
Reentrancy is probably the most famous Ethereum vulnerability, and it surprised everyone when discovered for the first time. It was first unveiled during a multimillion dollar heist which led to a hard fork of Ethereum. Reentrancy occurs when external contract calls are allowed to make new calls to the calling contract before the initial execution is complete. This means that the contract state may change in the middle of its execution, as a result of a call to an untrusted contract or the use of a low level function with an external address. One of the major dangers of calling external contracts is that they can take over the control flow. In a reentrancy attack, a malicious contract calls back into the calling contract before the first invocation of the function is finished. This may cause the different invocations of the function to interact in undesirable ways.
Leer màs...
La ciberseguridad en entornos industriales es cada vez más necesaria dado que la explotación de vulnerabilidades podría resultar en la disminución o interrupción de las operaciones, equipos dañados o pérdida de control del entorno, lo que implicaría pérdidas monetarias de gran escala por la interrupción de las líneas de operación, así como un probable impacto sobre la seguridad de los empleados y los consumidores de los servicios.
Leer màs...
Arithmetic Underflow and Overflow Overview
The Ethereum Virtual Machine (EVM) specifies fixed-size data types for integers. This means that an...
Leer màs...
Acueductos del Imperio romano
Uno de los primeros casos de infraestructura crítica reconocidos históricamente fue el sistema de acueductos romano. El...
Leer màs...
Visualisation tools are a key part of the smart contract development and documentation process, as they display high-level information about the...
Leer màs...
While the rise of blockchain provides a unique opportunity to create smart contracts for digital assets such...
Leer màs...