Oak Security
1.7K posts

Oak Security
@SecurityOak
Book. Secure. Relax. Oak Security offers audits, penetration testing, training, and advisory.



The trade-off between privacy and security is changing. On CypherTalk podcast (Ep. 3), @jbaylina, founder of @ziskvm joins @beyer_st and @pumpkinGMI to explain how Zero-Knowledge enables both. With selective disclosure, you can prove correctness without revealing data.



Old approvals can become future exploits. “Watering hole contracts” target users, not protocols. If you approved a contract years ago, even when your wallet held no funds, that permission may still exist today. If the contract is compromised, attackers can exploit those long-standing approvals. On CypherTalk podcast (Ep. 4), @iphelix, founder of @blockthreat joins @beyer_st and @pumpkinGMI to explain why reviewing contract approvals is critical for Web3 security.



Episode 4 of CypherTalk podcast is live 🎙️ Ep. 4: Threat Intelligence with Peter Kacherginsky @iphelix, founder of @blockthreat joins @beyer_st and @pumpkinGMI to discuss Web3 threat intelligence, evolving attack patterns, and why security teams need to think like attackers. From operational security to AI-driven threats, the episode explores how teams can better prepare for the next wave of exploits.



