PinnedResonanceCybersecurity Challenges and the Paradox of Centralized Cloud Infrastructure in the Decentralized…In this article, we explore the security challenges faced by Web3 projects due to their dependence on centralized cloud infrastructure…Apr 20, 2023Apr 20, 2023
ResonanceA Journey Through NEAR Protocol’s Storage — When Removing Doesn’t Necessarily Mean DeletingWhat is NEAR?4d ago4d ago
ResonanceResonance Reflections: Third-Party Dependency vs. Risk on BlastPoints, airdrops, jackpots, native staking yields, and gas revenue sharing — this is what Blast promises. This highly anticipated Ethereum…Jun 27Jun 27
ResonanceTaylor May — Transforming First-Time Clients Into Lifetime OnesCan you tell us about yourself?Jun 7Jun 7
ResonanceIn the jungle of AWS S3 EnumerationAmazon Web Services (AWS) Simple Storage Service (S3) is a foundational pillar of cloud storage, offering scalable object storage for…Jun 2Jun 2
ResonanceResonance Reflections: Potential Misuse of Functionality Within the Runes ProtocolBitcoin hype is on the rise again. While the Bitcoin blockchain’s original purpose was to be a distributed ledger for peer-to-peer…May 23May 23
ResonanceGrace Dees — Following the Passion to Protect and Serve Through CybersecurityCan you tell us about yourself?Apr 26Apr 26
ResonanceResonance Reflections: Insights from Recent CyberattacksThe volatile landscape of decentralized finance (DeFi) has once again come under scrutiny with a series of high-profile hacks, shaking the…Apr 18Apr 18
ResonanceOur goal to improve the cybersecurity ecosystemWhen we decided to create Resonance Security, the primary aim was to correct and improve what service/pentest companies were currently…Apr 15Apr 15
ResonanceGeorge Skouroupathis — Aiming For Excellence in CybersecurityCan you tell us about yourself?Feb 1Feb 1