Skip to content

xpool.eu

crypto news aggregator

Blockchain Security Cryptocurrency DeFi

CertiK Raises Concerns Over Suspicious Transactions on the Base Blockchain

Posted on: June 10, 2025

A recent alert from CertiK Alert has triggered concern within the crypto community as it highlights a potential exploit on the Base blockchain. The alert, shared by CertiK […]

Blockchain Security Cetus Protocol Cryptocurrency

Cetus Protocol Relaunches Open-Source After Major Exploit

Posted on: June 9, 2025

Cetus Protocol has relaunched following a $220 million exploit that led to the platform’s closure. The exchange has committed to becoming fully open-source, with 15% of its native […]

Blockchain Security Cetus Protocol Crypto

Cetus Protocol Reimagines After Major Exploit, Unveils New Roadmap and Compensation Plan

Posted on: June 9, 2025

The decentralized exchange, Cetus Protocol, has relaunched following a significant $223 million exploit. The protocol announced its post-relaunch strategy in a June 8 blog post outlining measures to […]

Blockchain Security DKG Qubetics

Qubetics Introduces DKG Architecture for Enhanced Security and Trust

Posted on: June 6, 2025

In the pursuit of a more decentralized, secure, and interoperable blockchain future, Qubetics unveils its groundbreaking Distributed Key Generation (DKG) system. This revolutionary technology redefines security by decentralizing […]

Blockchain Security Cryptocurrency SUI

Cetus Liquidity Aggregator Restored After $223 Million Hack

Posted on: June 4, 2025

The Cetus liquidity platform has regained its fully functional liquidity aggregator following a significant breach impacting the Sui blockchain network, resulting in a $223 million loss. This crucial […]

Blockchain Security Cryptocurrency Quantum Computing

Quantum Computing Threat Looms for Crypto, Industry Ignored Warning

Posted on: June 3, 2025

The crypto industry is facing a looming threat from quantum computing. Despite rapid advancements in this field, many blockchain networks rely on encryption methods susceptible to attack by […]

Blockchain Security Cryptocurrency Hacking

Crypto Hackers Stole $257 Million in May: Freezing Funds and Investigating Attacks

Posted on: June 3, 2025

In May, cryptocurrency hackers launched multiple high-profile attacks, resulting in a total theft of $257 million. SlowMist, a prominent blockchain security firm, revealed that $162 million of the […]

Blockchain Security Crypto Hack Nervos

Nervos Network Hit By $3 Million Bridge Exploit

Posted on: June 2, 2025

A major crypto hack has shaken the blockchain community, as the Nervos Network suffered a substantial loss of approximately $3 million. The attack targeted the network’s bridge infrastructure, […]

Blockchain Security Cetus Protocol DeFi

Cetus Protocol Transfers $160 Million Recovered Funds to Multisig Wallet Post Hack

Posted on: June 2, 2025

Following a major hack in May 2025 that resulted in over $220 million in losses, Cetus Protocol has transferred $160 million in recovered funds to a multisig wallet. […]

Blockchain Security Encryption XChat

Elon Musk Introduces XChat: Secure Messaging with Bitcoin-Grade Encryption

Posted on: June 1, 2025

Elon Musk’s new platform, XChat, revolutionizes messaging security by employing Bitcoin-grade encryption. This enhanced privacy feature removes phone number dependencies for access, marking a major leap in user […]

Blockchain Security Cryptocurrency Hacking

Crypto Hack Losses Plummet in May, But Cetus Exploit Remains a Major Threat

Posted on: June 1, 2025

May 2025 saw a significant decrease in the total value stolen through cryptocurrency hacks, according to data from blockchain security firm PeckShield. While 20 major breaches were recorded, […]

Blockchain Security Crypto Theft EIP 7702

Crypto Theft Groups Exploit New EIP-7702 Mechanism

Posted on: May 31, 2025

A new mechanism, EIP-7702, designed for automatic fund transfers within the cryptocurrency ecosystem is being actively exploited by criminal groups. Security firm SlowMist’s Cosine highlighted on X (formerly […]

Blockchain Security Naoris Protocol Quantum Computing

Naoris Protocol Raises $3 Million in Strategic Funding Round Led by Mason Labs

Posted on: May 30, 2025

Blockchain security platform Naoris Protocol has secured a strategic funding round of $3 million led by Mason Labs, a venture capital firm specializing in infrastructure-grade technologies. This significant […]

Blockchain Security Cryptocurrency Quantum Computing

Naoris Protocol Secures $3 Million to Advance Quantum-Resistant Blockchain Security

Posted on: May 29, 2025

Naoris Protocol, a blockchain platform focused on creating quantum-resistant security infrastructure, has secured a $3 million funding round led by Mason Labs. This investment highlights the growing need […]

Blockchain Security Cetus Protocol Cryptocurrency

Cetus Protocol (CETUS) Soars 27% After Hack Recovery Announcement

Posted on: May 28, 2025

The Cetus Protocol, the largest liquidity provider on the SUI blockchain, witnessed a remarkable intraday surge of 27% in its native token CETUS price. This follows an announcement […]

Posts pagination

Previous page Page 1 … Page 3 Page 4 Page 5 … Page 10 Next page

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Institutional Investment Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coin Meme Coins Pi Network Presale Price Prediction Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins SUI Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}