Brand Logo
Product
Product Overview
Discover how we enables a trustworthy Web3.
SphereX Protect
Learn how SphereX protects your Web3 app.
Dashboard
See how SphereX monitors security threats.
Open Source
Build new solutions on top of SphereX Engine.
Resources
Roadmap
Stay in touch with our future plans and releases.
Downloads
Get free access to insights, audits, and more.
Blog
Exploring Web3 security insights and news.
DOCS
Read the SphereX Protect docs
Press Releases
SphereX across prominent publications.
About
Contact
Deploy SphereX Now
Menu
Blog
spherex blog
spherex's blog posts
From Update to Exploit: How Web3 Updates Become Targets for Hackers
There are a number of critical risks to consider when developing a protocol, and a serious one that is often overlooked are protocol updates
By
Chen Galed
・
2
mins read
New Insights into Radiant Capital Attack: A Hacker's Trail
There are new details found by the spherex analytics team around the behavior of the hacker 5 weeks before the Radiant hack itself
By
Maor Ovadia
・
2
mins read
Web3 Wolves in Sheep's Clothing: The Disturbing Rise of Malicious Developers
How do you protect your protocol from rogue developers and mitigate internal threats so your protocol maintains security and trust with you
By
Chen Galed
・
4
mins read
The Persistent Threat: Why Reentrancy Attacks Remain a Challenge in Web3
The Web3 community needs to adopt comprehensive runtime protection mechanisms to effectively mitigate reentrancy attacks.
By
Eyal Fine
・
4
mins read
The 3rd party problem of Web3
An Exploration of Web3 Supply-Chain Attacks
By
Ariel Tempelhof
・
4
mins read
7 Additional Costs of Getting Hacked: Beyond the Financial Fallout
Beyond the immediate financial loss, a hack can have profound and lasting impacts on a protocol's reputation, user trust, operational focus
By
Ron Sabo
・
4
mins read
The Evolving Threat: How Attackers Exploit Verification in Smart Contract Attacks
A new and counter-intuitive “hiding-in-plain-sight” technique, that attackers started to using to execute their hacks successfully.
By
Maor Ovadia
・
3
mins read
Our team puts toget
Additional resources
We’re here to help you get started
About our product
Protect your smart contracts and gain trust with SphereX - First on chain security
learn more →
spherex Technical Litepaper
Dive into our technical litepaper to gain a deeper understanding of SphereX, the first decentralized security solution
Download litepaper →
Upgrade to a Fully Decentralized Security for Your Smart Contracts Today
Deploy SphereX Now
Speak with us
1-click code setup
Pay as you grow pricing
Verifiable security