Blockchain Vulnerabilities: Vulnerable ERC20 Tokens and How to Avoid Writing Vulnerable Code
Take a detailed look at the two main sources of vulnerabilities in ERC20 tokens.
Take a detailed look at the two main sources of vulnerabilities in ERC20 tokens.
Take a detailed look at the recently discovered Fomo3D exploit and get a better understanding of this vulnerability with our latest overview.
Take a detailed look at the Cloud Foundry platform and see if it's really as helpful and benificial as it seems to be.
Authentication as a Service is both a simpler and more economical solution for identity management. This article will be useful for developers who are...
Meet the third part of our special series on hooking Linux kernel functions with the help of ftrace.
Meet the second part of our series on hooking Linux kernel functions with ftrace.
Meet the first part of our series dedicated to hooking Linux kernel functions using ftrace. Explore four helpful approaches to use for your solutions...
The article provides a close look at the host-based firewall architecture and explains the principles behind host-based firewalls with real-life examp...
This article describes the ways ransomware can infect the cloud and how can you protect your cloud-based systems from such a devastating threat.
Practical tips on how to use LD_PRELOAD with the GCC attribute constructor to preload libraries in the custom order.
Tell us about your project
Send us a request for proposal! Weโll get back to you with details and estimations.
Book an Exploratory Call
Do not have any specific task for us in mind but our skills seem interesting?
Get a quick Apriorit intro to better understand our team capabilities.
Book time slotContact us