Oak Security

1.7K posts

Oak Security banner
Oak Security

Oak Security

@SecurityOak

Book. Secure. Relax. Oak Security offers audits, penetration testing, training, and advisory.

Katılım Temmuz 2021
334 Takip Edilen2.7K Takipçiler
Sabitlenmiş Tweet
Oak Security
Oak Security@SecurityOak·
We’ve had a glowup! Since 2017, we have conducted over 600 audits. Today, we offer everything from protocol design to operational security, training, economic advisory, and pentesting. New look, new services. The same uncompromising quality! Book. Secure. Relax.
Oak Security tweet media
English
6
4
39
13.3K
Oak Security
Oak Security@SecurityOak·
Prove what matters. Hide the rest. On CypherTalk podcast (Ep. 3), @jbaylina, founder of @ziskvm joins @beyer_st and @pumpkinGMI to explain selective disclosure, proving you can vote without revealing identity, or using tools like Tornado Cash without exposing the source.
English
1
0
0
40
Oak Security
Oak Security@SecurityOak·
Old code isn’t safe just because it’s old. On CypherTalk podcast (Ep. 4), @iphelix, founder of @blockthreat joins @beyer_st and @pumpkinGMI to explain why relying on legacy infrastructure and the “Lindy effect” is dangerous and why learning from past exploits is critical.
English
2
3
4
1.3K
Oak Security retweetledi
Jade
Jade@pumpkinGMI·
Me finding out about selective disclosure: "So, I can prove something without sharing it? I can choose what I share? WHY ISN'T EVERYONE DOING THIS?"
Oak Security@SecurityOak

The trade-off between privacy and security is changing. On CypherTalk podcast (Ep. 3), @jbaylina, founder of @ziskvm joins @beyer_st and @pumpkinGMI to explain how Zero-Knowledge enables both. With selective disclosure, you can prove correctness without revealing data.

English
0
1
3
72
Oak Security
Oak Security@SecurityOak·
The trade-off between privacy and security is changing. On CypherTalk podcast (Ep. 3), @jbaylina, founder of @ziskvm joins @beyer_st and @pumpkinGMI to explain how Zero-Knowledge enables both. With selective disclosure, you can prove correctness without revealing data.
English
2
2
3
204
Oak Security
Oak Security@SecurityOak·
Most projects focus on preventing hacks, not responding to them. On CypherTalk podcast (Ep. 4), @iphelix, founder of @blockthreat joins @beyer_st and @pumpkinGMI Doherty: Have an incident plan. Define comms. Set up a war room. Preparation matters as much as prevention.
English
1
2
4
163
Oak Security retweetledi
Oak Security
Oak Security@SecurityOak·
ClawJacked highlights the growing security risks around AI agents. As agents gain the ability to call APIs, move data, and act on behalf of users, every new capability expands the attack surface. Why Zero Trust may be essential for securing agentic AI ?
Oak Security tweet media
English
1
1
2
97
Oak Security
Oak Security@SecurityOak·
Security insights fade quickly if they’re not applied. On CypherTalk podcast (Ep. 4), @iphelix from @blockthreat joins @beyer_st and @pumpkinGMI to discuss how threat intelligence can help teams stay aware and improve security practices.
English
1
4
7
454
Oak Security retweetledi
Peter Kacherginsky
Peter Kacherginsky@iphelix·
Honored to join CypherTalk to discuss all things threat intelligence, building robust security programs, and a few attack patterns rapidly evolving this year. Check out this awesome new DeFi security podcast by the good folks at @SecurityOak!
Oak Security@SecurityOak

Episode 4 of CypherTalk podcast is live 🎙️ Ep. 4: Threat Intelligence with Peter Kacherginsky @iphelix, founder of @blockthreat joins @beyer_st and @pumpkinGMI to discuss Web3 threat intelligence, evolving attack patterns, and why security teams need to think like attackers. From operational security to AI-driven threats, the episode explores how teams can better prepare for the next wave of exploits.

English
0
2
4
380
Oak Security
Oak Security@SecurityOak·
Old approvals can become future exploits. “Watering hole contracts” target users, not protocols. If you approved a contract years ago, even when your wallet held no funds, that permission may still exist today. If the contract is compromised, attackers can exploit those long-standing approvals. On CypherTalk podcast (Ep. 4), @iphelix, founder of @blockthreat joins @beyer_st and @pumpkinGMI to explain why reviewing contract approvals is critical for Web3 security.
English
1
3
5
437
Oak Security
Oak Security@SecurityOak·
You can’t defend against every possible attack. On CypherTalk podcast (Ep. 4: Threat Intelligence with Peter Kacherginsky), @iphelix, founder of @blockthreat joins @beyer_st and @pumpkinGMI to explain a simple habit security teams should adopt: Have short weekly discussions about real-world hacks.
English
1
3
4
2.8K