
Our customer guide III
This is the third part of the article Our customer guide I and Our customer guide II. Repeated tests and bug bounty program The results of the performed penetration test or security audit are valid only to the specifi...

Our customer guide II
This is the second part of the article Our customer guide I. I want an offer, what do you need from me? (RFP) If you already know exactly which penetration tests or security audits you are interested in, do not hesitat...

Our customer guide I
Everything you wanted to know about our IT security services The goal of the following document is to explain how to choose a suitable penetration test or security audit according to your expectations, following profess...

Summary of the common smart contracts vulnerabilities
Introduction Cryptocurrencies and blockchain technology gained a lot of attention in the last year due to increasing mainstream adoption and new use cases. Thanks to hundreds of completed ICOs launched on Ethereum platf...