Skip to content

Credshields

Discover

Credshields

Credshields

Discover

Credshields
  • Home
  • About
  • Solutions
    • Smart Contract Audits
    • DApp & Protocol Security
    • Enterprise Web & Mobile Security
    • Penetration Testing
    • Blockchain Security
    • Cloud Infrastructure
    • Wallet Security
    • Mobile App Security
    • Web App Security
    • AI Security Tools
    • SolidityScan
    • Web3 HackHub
    • RustScan
  • Industries
    • Finance & Fintech
    • SaaS & Enterprise
    • Web3 Protocols & Exchanges
    • Gaming & Digital Assets
  • Resources
    • Recently Audited
    • Popular Projects
    • KYC Reports
  • Owasp Top 10

Shreya Berry

    • Home
    • Shreya Berry
    • Page 2
Security Certifications Required for DeFi Protocol Launches
Guides & Education
Shreya Berry January 29, 2026 No Comments

Security Certifications Required for DeFi Protocol Launches

2025: Why Audits Failed and Control Planes Collapsed
Thought Leadership & Trends
Shreya Berry January 18, 2026 No Comments

2025: Why Audits Failed and Control Planes Collapsed

Ledger Data Leak: How the Global-e Hack Exposed User Data
Security Deep Dives
Shreya Berry January 9, 2026 No Comments

Ledger Data Leak: How the Global-e Hack Exposed User Data

Trust Wallet Breach: How a Browser Extension Became the Attack Surface
News & Updates
Shreya Berry January 5, 2026 No Comments

Trust Wallet Breach: How a Browser Extension Became the Attack Surface

Deep Dive: MongoDB Vulnerability (CVE-2025-14847)
Security Deep Dives
Shreya Berry December 30, 2025 No Comments

Deep Dive: MongoDB Vulnerability (CVE-2025-14847)

Uniswap V4: A Deep Dive into the Next Generation AMM (Part 1)
Security Deep Dives
Shreya Berry December 2, 2025 No Comments

Uniswap V4: A Deep Dive into the Next Generation AMM (Part 1)

Aerodrome/Velodrome Front-End Breach: Understanding the Web2 Attack Surface in Web3 Protocols
Hack Analysis Security Deep Dives
Shreya Berry November 24, 2025 No Comments

Aerodrome/Velodrome Front-End Breach: Understanding the Web2 Attack Surface in Web3 Protocols

Inside the Port3 Exploit: How a Cross-Chain Ownership Bug Enabled a Billion-Token Mint
Security Deep Dives
Shreya Berry November 24, 2025 No Comments

Inside the Port3 Exploit: How a Cross-Chain Ownership Bug Enabled a Billion-Token Mint

The Missing Layer in AppSec: Web3
Thought Leadership & Trends
Shreya Berry November 20, 2025 No Comments

The Missing Layer in AppSec: Web3

Boosting Performance and Reducing Costs: Smart Contract Optimization for a 50,000+ User NFT Marketplace
Case Studies & Audits
Shreya Berry November 20, 2025 No Comments

Boosting Performance and Reducing Costs: Smart Contract Optimization for a 50,000+ User NFT Marketplace

Posts pagination

1 2 3

You Missed

Daml

5 Common Daml Authorization Mistakes

Announcements

CredShields Joins the Canton Network as an Official Audit Partner

Partnerships

CredShields Partners with NayaOne to Bring Smart Contract Security to Financial Institutions

Hack Analysis

Drift Protocol: Incident Post-Mortem

Credshields

Credshields

Discover

Copyright 2025 CredShields. All Rights Reserved | Blogus by Themeansar.