NPM Supply Chain Attack: Wallet Address Swap Trick

In this article, you’ll learn: How attackers used a string-similarity algorithm to trick users with look-alike wallet addresses. Why even experienced developers can be misled by UI-level deception. What this attack reveals about supply chain risks in Web3. Practical steps to protect your code, transactions, and community trust. At Fidesium, we keep a close eye […]

Fidesium PB&J Case Study

Fidesium Dashboard

Security as a process allows companies to launch quickly and on schedule. In the world of blockchain and Web3 development, security is not merely a checkpoint but a continuous process. When done correctly it empowers organizations to innovate boldly while mitigating risks. This approach transforms potential vulnerabilities into opportunities for refinement, allowing PB&J to launch […]

Fidesium PB&J Case Study Part 2

Fidesium Dashboard

How PB&J Secured a Web3 Game in 1 Minute – and Launched in Under 30 Days In Web3, one missed vulnerability can erase months of work and millions in value – but one minute can save it all. Web3 leaders don’t just ship fast – they ship secure. PB&J Consulting joined that club when they […]

Why Security Needs to Be a Process, Not an Event

The B-52 Stratofortress, a legendary long-range strategic bomber, had a rocky early history with several crashes and incidents. Introduced by Boeing in the 1950s, the B-52 was a complex aircraft for its time, pushing the boundaries of jet-powered heavy bombers. Before the widespread adoption of standardized pre-flight checklists – now a cornerstone of aviation safety […]

Sophisticated Phishing

Scam app

This write up will look at a flavour of social engineering scam that’s been emerging in the current VC winter. Earlier this week we got connected on Telegram to somebody who claimed to work for https://fenbushi.vc/, a pioneering Asian crypto VC. After some initial discussion in Telegram, we agreed to schedule a call to take […]

The Wild West of Crypto: When a Rug Pull is Not a Rug Pull

The cryptocurrency space is often compared to the Wild West – largely unregulated, where degens and normies alike transact in an ecosystem full of risk and opportunity. In this environment, ‘rug pulls’ have become a major concern for crypto investors. A rug pull refers to when developers of a new cryptocurrency abandon the project and […]

Proof of Humanities Implication for Security

The rise of Zero Knowledge Proof and Proof of Humanity protocols like Rarimo presents an interesting crux point for our decentralized ecosystem. Emerging Implications of Proof of Humanity for Security in DeFi and Beyond It is now possible to guarantee and verify that the counterparty for any interaction, whether on or off chain, is a […]

Blockchain’s Need for Speed

The blockchain ecosystem is at an inflection point. On one hand, we’re witnessing staggering innovation – over 1,000+ new projects now launch daily on Ethereum alone, building decentralized finance (DeFi) protocols, NFT platforms, GameFi apps and more. Institutional giants like BlackRock are piling in, global brands are minting metaverse experiences, and nation-states compete to become […]

Flare Networks: A Simplified Guide to the Time Series Oracle and State Connector

Flare Networks: A Simplified Guide to the Time Series Oracle and State Connector Flare is an upcoming blockchain that aims to bring new utility and functionality to cryptocurrencies like XRP, Litecoin, and Dogecoin. Two of Flare’s most powerful innovations are its Time Series Oracle and State Connector. In this post, we’ll explain in simple terms […]

The Blockchain Security Crisis

In the rapidly evolving world of decentralized finance (DeFi) and web3, where billions of dollars pour through smart contracts and decentralized apps (dApps) daily, security should be the bedrock priority. Yet for an industry espousing transparency and trustless systems, the blockchain space has a glaring vulnerability – outdated, siloed security audits. Why audits alone aren’t […]