Protect your exchange at every level: Vet new listings, monitor core assets, and ensure global compliance.
Screen all incoming and outgoing transactions against high-risk categories, including: terrorism financing, human trafficking, pig butchering, child abuse, and known hacker addresses.
Ensure compliance with FATF standards across the U.S., Europe, Hong Kong SAR, and 27+ global jurisdictions.
Vet projects for listing and investment by conducting rigorous code audits.
Protect your users and reputation by identifying vulnerabilities in advance.
Get real-time monitoring for all your Safe{wallet} multi-sig treasuries.
Detect suspicious transactions and get alerted before they are signed and executed.
Understand the methods behind any exploit that affect your listed assets without delay.
Gain actionable intelligence to strengthen security and inform your community.
Secure Exchange Operations and User Assets
“We are big fans of BlockSec and have been deeply involved from the inception of BlockSec to the use of each of its products. Phalcon is a very good security tool, to help Bybit achieve on-chain tracking and web3 contract security monitoring. We will have more cooperation with BlockSec in the future.”

#2 Bybit Incident: A Web2 Breach Enables the Largest Crypto Hack in History
The largest crypto hack ever, the February 21, 2025 Bybit breach stole about $1.5B after attackers used social engineering to compromise a Safe{Wallet} workflow, injected malicious JavaScript into an AWS S3 bucket, tampered with the transaction signing process, and upgraded Bybit’s Safe{Wallet} contract to a malicious implementation that drained funds across multiple chains.

#1 Cetus Incident: One Unchecked Shift Drains $223M in the Largest DeFi Hack of 2025
Cetus Protocol, the largest concentrated-liquidity DEX on Sui, was exploited on May 22, 2025, resulting in an estimated ~$223M loss across multiple liquidity pools. The attacker leveraged a flaw in checked_shlw(), a custom overflow-prevention helper used in fixed-point u256 math, where an incorrect constant and comparison failed to block unsafe left shifts and caused silent truncation of high bits during liquidity delta calculations. By crafting specific liquidity and tick/price-range parameters, the exploit made required deposits appear near-zero while minting an oversized liquidity position, which was later withdrawn to drain real pool reserves.

Weekly Web3 Security Incident Roundup | Jan 25 – Feb 1, 2026
During the week of January 25 to February 1, 2026, six blockchain security incidents were reported with total losses of ~$18.05M. These involved improper input validation, token design flaws, key compromises, and business logic errors across DeFi protocols on multiple chains. The primary causes included unchecked user inputs enabling arbitrary calls, flawed burn mechanisms allowing price manipulation, compromised developer tools, and missing solvency checks in lending functions.
For 500+ clients, from Web3 leaders to global regulators