Part 1 Beginner Why long-term crypto holders borrow against assets instead of selling A strategic guide to liquidity management, capital preservation, and the real tradeoff between selling and borrowing crypto Open guide 

Danor Cohen is a cybersecurity executive, researcher, and builder who serves as CTO and Co-Founder of Kerberus, a Web3 security company focused on protecting crypto users from scams, phishing, malicious websites, and risky transaction flows. His background spans offensive security, vulnerability research, enterprise security leadership, and digital asset user protection, giving him a technical profile shaped by both traditional cybersecurity and the specific threat models of decentralized finance.
Cohen’s work is centered on the security challenges that emerge when users interact directly with wallets, smart contracts, decentralized applications, and blockchain-based assets. In DeFi and broader Web3 markets, users often approve transactions, sign messages, bridge assets, and connect wallets without the safeguards found in conventional banking or brokerage systems. This creates a large attack surface for phishing campaigns, wallet drainers, spoofed interfaces, malicious contract approvals, and social engineering.
At Kerberus, Cohen applies more than 15 years of security experience to tools designed to identify and reduce these risks before users lose assets. His role as CTO places him in charge of technical direction, security architecture, product reliability, and the company’s approach to real-time threat detection.
Before Kerberus, Cohen served as Head of Offensive Security at Salesforce, where he led a 20-person team focused on discovering, testing, and preventing security breaches. Offensive security teams typically work by thinking like attackers, probing systems for weaknesses before those weaknesses can be exploited in the wild. This type of work requires knowledge of application security, network security, vulnerability chains, exploit development, incident patterns, and defensive engineering.
Cohen’s security research background also includes recognition as a Top 10 PayPal bug hunter and inclusion in Dropbox’s Hall of Fame. Bug bounty recognition is significant because it reflects demonstrated ability to identify vulnerabilities in major technology platforms under responsible disclosure programs. These programs rely on independent researchers and professional security engineers to find and report flaws before malicious actors can use them.
His career has therefore developed across both structured enterprise security environments and external vulnerability research ecosystems. That combination is relevant to Web3 security, where attackers frequently combine technical exploits with user manipulation, fast-moving infrastructure, and public blockchain transparency.
Kerberus focuses on user-facing security in the crypto economy. Rather than only auditing smart contracts or protecting backend systems, the company targets the moment when a user is about to interact with a potentially dangerous website, transaction, contract, or wallet request. This part of the user journey is critical because many crypto losses occur through approvals, signatures, and deceptive interfaces rather than through direct attacks on a blockchain itself.
Cohen’s work at Kerberus is tied to several core security themes:
Cohen’s role is relevant because crypto security has shifted from an infrastructure-only problem into a user protection problem. Major networks such as Ethereum and other smart contract platforms allow users to hold assets directly and interact with applications without intermediaries. This model gives users more control, but it also places more responsibility on individuals to recognize unsafe transactions and malicious websites.
As crypto adoption expands, the difference between secure infrastructure and safe user experience becomes increasingly important. A blockchain can function as designed while users still lose funds through phishing, fake applications, social engineering, or misleading transaction prompts. Security leaders working in this area must therefore understand both technical exploit paths and human behavior.
Web3 security tools can reduce risk, but they cannot eliminate it. Threat actors adapt quickly, malicious sites can change domains, smart contract interactions can be complex, and users may still approve dangerous transactions. Security products also require careful design to avoid false confidence, missed detections, or excessive friction that users bypass.
Cohen’s background in offensive security and vulnerability research provides a strong foundation for addressing these challenges. His work at Kerberus reflects a broader industry need for real-time protection systems that help users navigate crypto applications with clearer information, stronger warnings, and better defenses against scams and malicious interactions.
All images, branding and wording is copyright of Danor Cohen. All content on this page is used for informational purposes only. CryptoSlate has no affiliation or relationship with the person mentioned on this page.