skip to content

Inside the Bybit Hack

In this webinar, GK8’s CTO, Shahar Shamai, and Galaxy’s Head of Firmwide Research, Alex Thorn, dissect the recent Bybit hack, providing a detailed, step-by-step breakdown of how the attack unfolded. They analyze the methods used to bypass critical security defenses and share key takeaways to strengthen future protections. Watch the replay to understand the root causes of the breach and learn actionable strategies to mitigate emerging threats.

You are leaving Galaxy.com

You are leaving the Galaxy website and being directed to an external third-party website that we think might be of interest to you. Third-party websites are not under the control of Galaxy, and Galaxy is not responsible for the accuracy or completeness of the contents or the proper operation of any linked site. Please note the security and privacy policies on third-party websites differ from Galaxy policies, please read third-party privacy and security policies closely. If you do not wish to continue to the third-party site, click “Cancel”. The inclusion of any linked website does not imply Galaxy’s endorsement or adoption of the statements therein and is only provided for your convenience.

OSZAR »