fix
spherex Blog
Featured post

Working with Slither for Fun, for Profit, or for Useful Information

Slither not only detects vulnerabilities but also visualizes contract structures, helping you ensure security and efficiency.

Read more
Next icon
3 min read ・ Sep 30, 2024 ・by Shira Shalev
spherex Blog
Working with Slither for Fun, for Profit, or for Useful Information
Slither not only detects vulnerabilities but also visualizes contract structures, helping you ensure security and efficiency.
Read more
Next icon
3 min read ・ Sep 30, 2024 ・by Shira Shalev
This is some text inside of a div block.
spherex Blog
DORA: The New Guardian of Digital Finance
DORA mandates cybersecurity measures, including risk management and incident reporting, for smart contract owners, ensuring compliance.
Read more
Next icon
4 min read ・ Sep 05, 2024 ・by Eilon Morag
This is some text inside of a div block.
spherex Blog
MiCA: The Regulatory Wave Reshaping Crypto's Future
MiCA is a comprehensive EU regulation that mandates compliance in crypto, affecting smart contracts and blockchain-based operations
Read more
Next icon
4 min read ・ Sep 05, 2024 ・by Eilon Morag
This is some text inside of a div block.
spherex Blog
Attack Contracts in Blockchain: New Trends and Developing Risks
Study shows hackers are executing their attack transaction in one step rather than multiple steps, making it harder to alert of an attack
Read more
Next icon
3 min read ・ Jul 30, 2024 ・by Maor Ovadia
This is some text inside of a div block.
spherex Blog
From Update to Exploit: How Web3 Updates Become Targets for Hackers
There are a number of critical risks to consider when developing a protocol, and a serious one that is often overlooked are protocol updates
Read more
Next icon
2 min read ・ Jul 17, 2024 ・by Chen Galed
This is some text inside of a div block.
spherex Blog
New Insights into Radiant Capital Attack: A Hacker's Trail
There are new details found by the spherex analytics team around the behavior of the hacker 5 weeks before the Radiant hack itself
Read more
Next icon
2 min read ・ Jul 03, 2024 ・by Maor Ovadia
This is some text inside of a div block.
spherex Blog
Web3 Wolves in Sheep's Clothing: The Disturbing Rise of Malicious Developers
How do you protect your protocol from rogue developers and mitigate internal threats so your protocol maintains security and trust with you
Read more
Next icon
4 min read ・ Jun 27, 2024 ・by Chen Galed
This is some text inside of a div block.
spherex Blog
The Persistent Threat: Why Reentrancy Attacks Remain a Challenge in Web3
The Web3 community needs to adopt comprehensive runtime protection mechanisms to effectively mitigate reentrancy attacks.
Read more
Next icon
4 min read ・ Jun 20, 2024 ・by Eyal Fine
This is some text inside of a div block.
spherex Blog
The 3rd party problem of Web3
An Exploration of Web3 Supply-Chain Attacks
Read more
Next icon
4 min read ・ Jun 05, 2024 ・by Ariel Tempelhof
This is some text inside of a div block.
spherex Blog
7 Additional Costs of Getting Hacked: Beyond the Financial Fallout
Beyond the immediate financial loss, a hack can have profound and lasting impacts on a protocol's reputation, user trust, operational focus
Read more
Next icon
4 min read ・ May 30, 2024 ・by Ron Sabo
This is some text inside of a div block.
spherex Blog
The Dark Side of Code Verification: How Attackers Are Exploiting Security Measures
A new and counter-intuitive “hiding-in-plain-sight” technique, that attackers started to using to execute their hacks successfully.
Read more
Next icon
3 min read ・ May 28, 2024 ・by Maor Ovadia
This is some text inside of a div block.
<Additional resources>

We’re here to help you get started

Icon

Audited by OpenZeppelin

"spherex is emerging as a ground-breaking Web3 technology"
-OpenZeppelin
Contact Us
Next icon
product icon

About Our Product

Protect your smart contracts and gain trust with spherex - First on chain security
Read more
Next icon
sphrex icon

About spherex

Dive into our technical litepaper to gain a deeper understanding of spherex, the first on-chain runtime security solution
Contact Us
Next icon

Upgrade To A Fully Decentralized Security For Your Smart Contracts Today

Image