fix
spherex Blog
Featured post

The Silent Threat: How to Protect Your Assets from Compromised Keys in Web3

Safeguarding your keys is crucial - not just for your personal security, but for the integrity of your entire project.

Read more
Next icon
3 min read ・ Nov 20, 2024 ・by Shira Shalev
spherex Blog
The Silent Threat: How to Protect Your Assets from Compromised Keys in Web3
Safeguarding your keys is crucial - not just for your personal security, but for the integrity of your entire project.
Read more
Next icon
3 min read ・ Nov 20, 2024 ・by Shira Shalev
This is some text inside of a div block.
spherex Blog
KY(ha)C(ker)
Hackers are now switching from anonymization tools, such as TornadoCash, to fabricated or stolen KYC accounts which puts security at risk.
Read more
Next icon
1 min read ・ Nov 05, 2024 ・by Maor Ovadia
This is some text inside of a div block.
spherex Blog
Trick Or Treat - Fooling Etherscan’s Proxy Detection
Hybrid Etherscan setup that could potentially lead the Etherscan displaying one thing while the proxy actually points something else.
Read more
Next icon
3 min read ・ Oct 31, 2024 ・by Eyal Fine
This is some text inside of a div block.
spherex Blog
The Cost of Complacency: What Radiant's Second Hack Teaches Us
‍Why Web3 Protocols Must Rethink Security in an Evolving Threat Landscape.
Read more
Next icon
4 min read ・ Oct 10, 2024 ・by Chris Kunze-Levy
This is some text inside of a div block.
spherex Blog
Working with Slither for Fun, for Profit, or for Useful Information
Slither not only detects vulnerabilities but also visualizes contract structures, helping you ensure security and efficiency.
Read more
Next icon
3 min read ・ Sep 30, 2024 ・by Shira Shalev
This is some text inside of a div block.
spherex Blog
DORA: The New Guardian of Digital Finance
DORA mandates cybersecurity measures, including risk management and incident reporting, for smart contract owners, ensuring compliance.
Read more
Next icon
4 min read ・ Sep 05, 2024 ・by Eilon Morag
This is some text inside of a div block.
spherex Blog
MiCA: The Regulatory Wave Reshaping Crypto's Future
MiCA is a comprehensive EU regulation that mandates compliance in crypto, affecting smart contracts and blockchain-based operations
Read more
Next icon
4 min read ・ Sep 05, 2024 ・by Eilon Morag
This is some text inside of a div block.
spherex Blog
Attack Contracts in Blockchain: New Trends and Developing Risks
Study shows hackers are executing their attack transaction in one step rather than multiple steps, making it harder to alert of an attack
Read more
Next icon
3 min read ・ Jul 30, 2024 ・by Maor Ovadia
This is some text inside of a div block.
spherex Blog
From Update to Exploit: How Web3 Updates Become Targets for Hackers
There are a number of critical risks to consider when developing a protocol, and a serious one that is often overlooked are protocol updates
Read more
Next icon
2 min read ・ Jul 17, 2024 ・by Chen Galed
This is some text inside of a div block.
spherex Blog
New Insights into Radiant Capital Attack: A Hacker's Trail
There are new details found by the spherex analytics team around the behavior of the hacker 5 weeks before the Radiant hack itself
Read more
Next icon
2 min read ・ Jul 03, 2024 ・by Maor Ovadia
This is some text inside of a div block.
spherex Blog
Web3 Wolves in Sheep's Clothing: The Disturbing Rise of Malicious Developers
How do you protect your protocol from rogue developers and mitigate internal threats so your protocol maintains security and trust with you
Read more
Next icon
4 min read ・ Jun 27, 2024 ・by Chen Galed
This is some text inside of a div block.
spherex Blog
The Persistent Threat: Why Reentrancy Attacks Remain a Challenge in Web3
The Web3 community needs to adopt comprehensive runtime protection mechanisms to effectively mitigate reentrancy attacks.
Read more
Next icon
4 min read ・ Jun 20, 2024 ・by Eyal Fine
This is some text inside of a div block.
spherex Blog
The 3rd party problem of Web3
An Exploration of Web3 Supply-Chain Attacks
Read more
Next icon
4 min read ・ Jun 05, 2024 ・by Ariel Tempelhof
This is some text inside of a div block.
spherex Blog
7 Additional Costs of Getting Hacked: Beyond the Financial Fallout
Beyond the immediate financial loss, a hack can have profound and lasting impacts on a protocol's reputation, user trust, operational focus
Read more
Next icon
4 min read ・ May 30, 2024 ・by Ron Sabo
This is some text inside of a div block.
spherex Blog
The Dark Side of Code Verification: How Attackers Are Exploiting Security Measures
A new and counter-intuitive “hiding-in-plain-sight” technique, that attackers started to using to execute their hacks successfully.
Read more
Next icon
3 min read ・ May 28, 2024 ・by Maor Ovadia
This is some text inside of a div block.
<Additional resources>

We’re here to help you get started

Icon

Audited by OpenZeppelin

"spherex is emerging as a ground-breaking Web3 technology"
-OpenZeppelin
Contact Us
Next icon
product icon

About Our Product

Protect your smart contracts and gain trust with spherex - First on chain security
Read more
Next icon
sphrex icon

About spherex

Dive into our technical litepaper to gain a deeper understanding of spherex, the first on-chain runtime security solution
Contact Us
Next icon

Upgrade To A Fully Decentralized Security For Your Smart Contracts Today

Image