SecurityOak Profile Banner
Oak Security Profile
Oak Security

@SecurityOak

Followers
2K
Following
7K
Media
68
Statuses
1K

Securing the decentralized, trustless future.

Joined July 2021
Don't wanna be here? Send us removal request.
@SecurityOak
Oak Security
15 days
We’re building StylusPort, a framework + CLI to make migrating Rust/C++ Solana programs to @arbitrum Stylus easier. Got 3 mins? Share your input → [ https://t.co/rJE0F0lgfI] Your feedback shapes our upcoming migration handbook & AI assistant!
form.typeform.com
Turn data collection into an experience with Typeform. Create beautiful online forms, surveys, quizzes, and so much more. Try it for FREE.
3
2
12
@SecurityOak
Oak Security
3 hours
In our latest episode,@MarinaMarkezic from the @EuCInitiative discusses how stablecoin regulation is influenced by traditional finance. In Europe, only e-money institutions and banks can issue stablecoins, while in the US, it's non-banks and bank subsidiaries. This
0
1
3
@SecurityOak
Oak Security
7 hours
Biggest worry about AI in cyber attacks? It scales threats exponentially. 1. Near-zero cost targeted attacks 2. Fake audits & impersonations 3. Mass-personalized phishing Traditional defenses can’t keep up.
0
1
4
@SecurityOak
Oak Security
20 hours
State actors love supply chain attacks. They can be laser-targeted, yet pulled off with minimal resources. The perfect mix of low effort, high impact.
Tweet media one
0
1
2
@SecurityOak
Oak Security
23 hours
Containment speed is everything. ⏱️ Rapid detection + swift mitigation = limited damage. In Web3 security, every minute counts.
0
1
2
@SecurityOak
Oak Security
1 day
JavaScript npm supply chain attack! A simple phishing email led to compromised maintainer credentials, showing that OpSec basics fail first even before complex engineering. Immutable builds, locked dependencies, MFA, and monitoring are your first defense.
0
1
4
@0xCygaar
cygaar
2 days
I would strongly recommend not signing any crypto transactions right now. There is a huge supply chain attack on popular NPM packages that may have compromised various crypto websites (frontend, not the actual contracts). It changes the destination address of transactions and
424
877
3K
@SecurityOak
Oak Security
1 day
This could affect both hardware + software wallets across the ecosystem. Stay cautious, verify sources, and protect your keys!
@TheBlock__
The Block
2 days
Ledger CTO warns users to halt onchain transactions amid massive NPM supply chain attack
0
1
1
@SecurityOak
Oak Security
2 days
AI is scaling cyber attacks to near-zero cost: fake audit reports, hyper-personalized phishing, and automated malware. At Oak Security, we fight back with human-reviewed AI in secure, isolated environments.
0
0
2
@SecurityOak
Oak Security
2 days
If your private keys live on a device connected to the internet, consider them gone. 1.Use hardware wallets 2.Air-gap critical keys 3.Separate dev/test keys from production Attackers target humans first, don’t make it easy.
Tweet media one
0
2
5
@SecurityOak
Oak Security
2 days
Phishing is evolving, don’t get caught off guard! Red flags to watch for: ❗️Unrequested messages or links ❗️Time pressure or urgent requests ❗️Too-good-to-be-true opportunities ❗️Unusual tools or platforms Always verify before you click.
0
0
5
@SecurityOak
Oak Security
2 days
We’re excited to join EUCI Insights this week! Our Managing Director, @JphFritsche, will be live with @MarinaMarkezic & @AnjaBlaj to discuss how the EU Data Act will shape smart contract design in the EU.
@EuCInitiative
European Crypto Initiative
5 days
The Data Act will become applicable on September 12. At this week’s EUCI insights, we will share more on how it will affect smart contract design in the EU! EUCI's @MarinaMarkezic and @AnjaBlaj, with special guest @JphFritsche from @SecurityOak, are going LIVE to discuss the
Tweet media one
0
1
3
@EuCInitiative
European Crypto Initiative
5 days
The Data Act will become applicable on September 12. At this week’s EUCI insights, we will share more on how it will affect smart contract design in the EU! EUCI's @MarinaMarkezic and @AnjaBlaj, with special guest @JphFritsche from @SecurityOak, are going LIVE to discuss the
Tweet media one
0
2
4
@SecurityOak
Oak Security
5 days
Company-issued devices are a start, but not enough. In Web3, no single user should ever have unilateral control.. fail-safes are non-negotiable.
0
0
4
@SecurityOak
Oak Security
5 days
Authentication Gold Standard 🔐 ✅ Passkeys > passwords ✅ Strong, unique creds (no reuse) ✅ Password manager (secured) ✅ MFA everywhere (hardware keys, 3 copies) 🚫 No SMS, no password sharing, no storing photos of creds
Tweet media one
0
0
4
@SecurityOak
Oak Security
5 days
In TradFi, you need a keycard just to check your inbox. In Web3, a single compromised laptop can sink a protocol. Time to catch up.
0
0
2
@SecurityOak
Oak Security
5 days
Web3 needs a cultural shift: stop assuming devices are clean, start assuming they’re compromised. Build security with that mindset or attackers will do it for you.
0
0
4
@SecurityOak
Oak Security
6 days
Web3 often obsesses over smart contract bugs, but most hacks don’t start in the code. They start with people. OPSEC failures, phishing, and compromised devices remain the weakest link, and attackers know it.
1
0
4
@SecurityOak
Oak Security
6 days
Building on @arbitrum ? Get up to 100% of your audit funded with Oak Security 🛡️ 600+ projects audited, 70% repeat clients, deep crypto & opssec expertise. Catch the bugs that matter before they hit users. Apply here:
Tweet card summary image
tally.so
2
0
2
@SecurityOak
Oak Security
6 days
Security hygiene isn’t optional Too many Web3 teams, especially smaller ones, ignore it and just hope for the best... until it’s too late
Tweet media one
0
0
4
@SecurityOak
Oak Security
6 days
Most DAOs still run dev + Discord from the same personal laptop. That’s not quirky startup culture... it’s an open door for nation-state attackers!
0
0
4