Back home

All Media Mentions

Complete collection of press coverage, articles, and media appearances — 16 mentions across Web3 security, blockchain, and aerospace.

$ cat media_mentions.log --all
DL News
DL NewsJanuary 2026

How a crypto scam pushed Ethereum transactions to an all-time high

Wallets need to clearly convey intent and surface risk. We also need more adoption of naming systems like ENS, because human-readable identifiers make lookalike address attacks harder.
DL News
DL NewsJanuary 2026

A16z Crypto wants DeFi to ditch 'code is law' for 'spec is law' to combat $649m exploit problem

DeFi protocols often gain an edge over their competitors by having the cheapest fees. Adding extra checks on transactions would increase gas costs, potentially losing them users. Invariant checks are a great security strategy, but they can't account for everything — especially exploits that a protocol's developers can't reasonably anticipate. It's not the silver bullet.
O'Reilly - Mastering Ethereum 2nd Edition
O'Reilly - Mastering Ethereum 2nd EditionNovember 2025

Featured Quote on Back Cover

I've taught crypto devs for many years. If you want to go from zero to hero in smart contracts, Mastering Ethereum is the definitive no-fluff guide I recommend above all to achieve that.
Help Net Security
Help Net SecurityJuly 2025

Hacking Back: Why Offensive Cyber Operations Are a Legal Minefield

This is why firms should focus on operating under frameworks that prevent these scenarios entirely, like scaling bug bounty programs that channel security efforts into authorized, constructive activities. When security researchers work within this framework, they're protected legally, companies get stronger security, and innocent third parties are never put at risk.
ThreeSigma
ThreeSigmaJanuary 2025

DeFi Front-End Exploits: Security Attacks & Threat Detection

In this guide, we break down practical DeFi security solutions: how real-time monitoring works, which exploits it catches, and how to roll it out without slowing product velocity.
Tek Sapo
Tek SapoDecember 2024

Ataques são principal causa de perdas da indústria cripto. Em 2024 'escaparam' 1,49 mil milhões de dólares

Embora a queda nas perdas seja encorajadora, as ameaças persistem [...] Em 2024, observamos um foco maior em ataques a chaves privadas, infraestrutura de projetos e CeFi. O volume de fundos disponíveis em DeFi atingiu $137B este ano (+163%), e, à medida que capital institucional entra no ecossistema, cripto torna-se um alvo irresistível para hackers.
The Block
The BlockOctober 2024

Crypto losses to hacks and scams surpass $1.4 billion in 2024, despite monthly drop: Immunefi

Projects are increasingly adopting robust security measures, including enhanced auditing processes, improved smart contract designs, the implementation of bug bounty programs, among others. They also have access to a larger pool of skilled security professionals. The maturity of the current security stack is far better than what we were seeing 2 or 3 years ago, making it more difficult for hackers to exploit vulnerabilities.
Solidity Blog
Solidity BlogOctober 2024

Underhanded Solidity Contest 2024 - Judge

After reviewing this year's contest submissions, it appears we can draw several conclusions, particularly since no one encountered any significant issues. First, transient storage remains largely unknown and unused by the broader developer community, likely due to its exclusive use in assembly...
Decrypt
DecryptAugust 2024

Crypto Hackers Stole Way Less in August Than They Did in July, Says Immunefi

Most of the losses in 2024 are attributed to attacks targeting CeFi infrastructure. We've known for a while that infrastructure compromises tend to be the most devastating hacks in the cryptocurrency world.
Cointelegraph Magazine
Cointelegraph MagazineApril 2024

Lazarus Group's favorite exploit revealed — Crypto hacks analysis

[North Korean hackers] focus on a small number of high-value targets and can play a very long game, combining detailed technical knowledge with social engineering and spear-phishing capabilities.
Decrypt
DecryptMay 2023

Tornado Cash Governance Attacker Offers DAO New Lifeline—And an Expensive Lesson

Self destruction is, as one can imagine, one of the scariest things one can casually add as an extra function. Changing the logic of a contract provides endless possibilities.
Decrypt
DecryptApril 2023

'Rogue Developers' Drain Merlin DEX of $1.82 Million

Though we're still early in this whole story, there are indications that there were major centralization issues on the Merlin DEX smart contracts. Specifically, the address receiving pool fees was allowed to drain all funds from every pool in the protocol.
Decrypt
DecryptMarch 2023

Meme Coin Project SafeMoon Rekt for $9M Due to Public Burn Bug

The specific bug's root cause was the lack of proper access control to a function which should be for privileged usage only. This is a common security vulnerability which is usually caught at the auditing phase of a smart contract.
Immunefi - Medium
Immunefi - MediumJanuary 2023

Hack Analysis: 0xbaDc0dE MEV Bot, September 2022

In this article, we will be analyzing the exploited vulnerability in the 0xbad smart contract without looking at any actual source code. We'll analyze the massive profit arbitrage transaction and see what we can learn from there, but also try a few decompiling tools to help us reach the same conclusion as the hacker.
AstroPublishing
AstroPublishingMay 2017

Twin spends 340 days in orbit

[W]e must fully understand how the human body and mind are affected by the environment in space. NASA astronauts Scott and Mark Kelly are genetically identical twins and they will show us some answers.
AstroPublishing
AstroPublishingMarch 2017

Two probes will explore the early Solar System

The points derive from the three-body problem, which considers the gravitational pull of just two bodies (in this case, the Sun and Jupiter), and then the few points where smaller points can remain stable are found through algebraic methods. The Trojan asteroids are celestial bodies that gathered around Jupiter's L4 and L5. The Lucy mission is crucial to understanding the history of the solar system.