Skip to content

xpool.eu

crypto news aggregator

Cetus Crypto Security DEX

Cetus Recovery Vote Approaches: Community Decision Crucial for Funds Restitution

Posted on: May 28, 2025

The decentralized exchange Cetus is on track to potentially recover funds stolen in a recent exploit, with a community vote set to determine the next steps. As Cointelegraph […]

Cetus Protocol Crypto Security DeFi Recovery

Cetus Protocol Offers 100% User Recovery Following DeFi Incident

Posted on: May 28, 2025

Following a recent incident impacting its users, the Cetus Protocol has committed to full user recovery. In a community update, Cetus outlines its plan to restore trust and […]

Blockchain Cetus Protocol Crypto Security SUI

Cetus Protocol Commits to Full Compensation for Hacked Users

Posted on: May 28, 2025

Cetus Protocol, a blockchain protocol on the Sui network, has pledged to fully compensate users who suffered losses due to a recent security breach. The company will fund […]

Confidential Computing Crypto Security iExec

Build Confidential Apps Fast: iApp Generator Simplifies Deployment

Posted on: May 27, 2025

Building confidential applications is about to get easier. The iExec iApp Generator streamlines the process, letting developers deploy secure apps in minutes with minimal effort. Traditional setup involves […]

Blockchain Cetus Math Library Crypto Security DEX SUI

Sui Blockchain Launches $10 Million Security Initiative Following Major DEX Exploit

Posted on: May 27, 2025

Following a major $223 million hack on the Cetus decentralized exchange (DEX), the Sui blockchain has committed $10 million to bolstering security. This initiative aims to address vulnerabilities […]

Bitcoin Crypto Security Michael Saylor

Michael Saylor Critiques On-Chain Proof-of-Reserves at Bitcoin 2025

Posted on: May 27, 2025

Michael Saylor, CEO of MicroStrategy and renowned Bitcoin advocate, sharply criticized the use of on-chain proof-of-reserves during the recent Bitcoin 2025 conference. Saylor’s reservations stem from perceived security […]

Crypto Security Ledger Solana

Your Complete Guide to Securely Storing SOL with a Ledger Hardware Wallet

Posted on: May 27, 2025

Solana’s high transaction speeds and low fees have attracted developers and investors alike. To protect your assets, engage in staking activities, and interact seamlessly with decentralized applications (dApps), […]

Bitcoin Crypto Security Institutional Crypto

Saylor Warns Against On-Chain PoR for Institutional Crypto, Raises Security Concerns

Posted on: May 27, 2025

Michael Saylor, CEO of MicroStrategy (now Strategy), has issued a critical warning about the use of on-chain Proof-of-Reserves (PoR) by institutions in the cryptocurrency industry. At the Bitcoin […]

Crypto Security Data Breach Solana

Solana Co-founder Targeted in Large-Scale Personal Data Breach

Posted on: May 27, 2025

Raj Gokal, co-founder and President of Solana Labs, has been the victim of a significant personal data breach. Hackers exploited his accounts to leak sensitive information including photos […]

Crypto Security Personal Data Breach Solana

Solana Co-Founder Raj Gokal: Instagram Hack Exposes Personal Data

Posted on: May 27, 2025

A significant data breach has exposed personal information belonging to Raj Gokal, co-founder of Solana, after his Instagram account was hacked. This incident occurred on May 27, 2025, […]

Bitcoin Crypto Security Saylor

Saylor Warns Against On-Chain Proof of Reserves, Emphasizing Security Risks

Posted on: May 27, 2025

Michael Saylor, executive chair of MicroStrategy and a prominent Bitcoin advocate, has expressed his concerns about the use of on-chain proof of reserves in the cryptocurrency industry. He […]

Crypto Security DeFi SUI

Sui Network Bolsters Security After $260 Million Breach

Posted on: May 27, 2025

The Sui network, a prominent platform known for its decentralized exchange and liquidity offerings, recently experienced a significant security breach. This incident, termed the Cetus attack, resulted in […]

Cetus Crypto Security SUI

Cetus Addresses Smart Contract Attack on CLMM Liquidity Pool

Posted on: May 27, 2025

The blockchain platform, Cetus, has issued a detailed report outlining a sophisticated attack that targeted its CLMM liquidity pool. This incident occurred on May 22nd and involved the […]

Cetus Crypto Security DeFi

Cetus Protocol Hack Exposes Major DeFi Vulnerability; $223 Million Lost

Posted on: May 26, 2025

The recent hack of the Cetus protocol, a leading decentralized exchange (DEX) on the Sui network, has exposed a critical vulnerability in its automated market maker logic. Attackers […]

Crypto Security EIP 7702 Ethereum Phishing

Ethereum Phishing Attacks Surge with New EIP-7702 Exploit

Posted on: May 25, 2025

Recent incidents highlight the growing threat of phishing scams targeting Ethereum users leveraging the new EIP-7702 functionality in wallets. While previously limited to single-token transfers, attackers are now […]

Posts pagination

Previous page Page 1 … Page 20 Page 21 Page 22 … Page 34 Next page

#BTC AI Altcoin Altcoins Binance Binance Coin Bitcoin Blockchain BlockDAG BNB Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF ETFs Ethereum Finance Fintech Institutional Investment Investment Market Analysis Market Trends Market Volatility Meme Coin Meme Coins MoonBull Presale Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}