Skip to content

xpool.eu

crypto news aggregator

Crypto Security Ledger Phishing

Ledger Warns Users About Fake Letter Scam Targeting Crypto Addresses

Posted on: April 30, 2025

Crypto hardware wallet company Ledger has alerted its users to a new scam targeting individuals in the cryptocurrency space. The scam involves fake letters that attempt to trick […]

Crypto Security Ledger Phishing

Ledger Users Targeted in Phishing Scam Using Physical Letters

Posted on: April 30, 2025

Crypto hardware wallet users are being targeted by scammers who have begun sending physical letters to customers requesting their 24-word recovery phrases to gain access and drain their […]

Crypto Security DeFi Loopscale

Loopscale Recovers $5.8 Million Stolen Funds After Hacker Bounty Agreement

Posted on: April 29, 2025

Loopscale has successfully recovered the majority of funds stolen during an April 26 exploit, reaching a resolution with the attacker through a whitehat bounty program. The DeFi protocol […]

Coinbase Crypto Security Ledger

Coinbase Teams Up with Ledger to Enhance Wallet Security

Posted on: April 29, 2025

In a move that strengthens user security, Coinbase partnered with Ledger in May 2025 to facilitate seamless asset transfers to Ledger’s offline cold storage. This collaborative effort aims […]

Cold Wallet Storage Crypto Security XRP

XRP Security Warning: Experts Urge Retail Investors to Secure Assets Amidst Market Concerns

Posted on: April 29, 2025

Edward Farina, CEO of Alpha Lions Academy and a vocal XRP supporter, has issued a critical warning to the cryptocurrency community regarding the security of XRP assets. Farina […]

Crypto Security DeFi Solana

Loopscale Makes Progress in Recovering Stolen Funds after Solana Exploit

Posted on: April 29, 2025

The world of decentralized finance (DeFi) is facing a recurring challenge: securing protocols against attacks. When vulnerabilities are exploited, as seen recently with the Solana-based LoopScale protocol, the […]

Blockchain Hackers Crypto Security Tornado Cash

Bitrue Hacker Resurfaces After $23 Million Theft: Funds Laundered Through Tornado Cash

Posted on: April 29, 2025

A hacker who previously stole $23 million from Bitrue Exchange has returned to activity, moving a substantial sum of stolen crypto through the decentralized mixing service Tornado Cash. […]

Blockchain Technology Crypto Security ZK Sync

ZK-Sync Recovers $5 Million in Stolen Assets Through Bounty Negotiation

Posted on: April 25, 2025

ZK-Sync, a leading Ethereum layer-2 scaling solution, achieved a notable milestone by recovering $5 million of stolen tokens. This success followed negotiations with the hacker, who accepted a […]

Crypto Security Phishing Trust Wallet

Trust Wallet Warns Users About Token Approval Scams

Posted on: April 25, 2025

Crypto wallet provider Trust Wallet, part of the Binance ecosystem, has issued a safety alert to its users about potential phishing attacks targeting token approvals. The company emphasizes […]

Crypto Security Ripple Security Breach

Ripple Security Breach Sparks Criticism from Peter Todd

Posted on: April 25, 2025

A security breach in Ripple’s Node Package Manager (NPM) library has exposed wallets to potential theft. While the company quickly addressed the issue, security expert Peter Todd criticized […]

Bitkey Crypto Security Privacy

Jack Dorsey’s Bitkey Wallet to Introduce Enhanced Privacy & Security

Posted on: April 24, 2025

Jack Dorsey announced enhanced privacy features for his Bitkey wallet, including transaction verification, fingerprint reset, and private wallet balances, in a recent X post. A detailed roadmap was […]

Crypto Security Firmware Updates Hardware Wallets

The Hidden Risks of Updatable Firmware in Crypto Wallets

Posted on: April 24, 2025

Crypto security is a significant challenge, with potentially devastating consequences if vulnerabilities are exploited. Updatable firmware, while offering potential benefits like bug fixes and feature enhancements, presents hidden […]

Crypto Security DeFi ZKSync

ZKsync Recovers Stolen Tokens: $5.7 Million Returned after Hacker Agrees to Bounty

Posted on: April 24, 2025

The ZKsync Association has successfully recovered almost $5.7 million in cryptocurrency stolen during a recent security breach. The recovery follows a 72-hour ultimatum issued to the attacker, who […]

Crypto Security Ethereum NFTs

Pudgy Penguins Launches Security Course to Protect NFT Investors

Posted on: April 24, 2025

The cryptocurrency and NFT world is increasingly vulnerable to attacks from hackers and scammers. As these threats grow more sophisticated, the Pudgy Penguins team is taking action. The […]

Crypto Security Ripple Satoshi Nakamoto

Prominent Satoshi Candidate Slams Ripple Over Security Flaws

Posted on: April 24, 2025

Canadian Bitcoin developer Peter Todd, often considered a likely candidate for Satoshi Nakamoto, publicly criticized Ripple in a recent social media post following the discovery of a backdoor […]

Posts pagination

Previous page Page 1 … Page 27 Page 28 Page 29 … Page 34 Next page

#BTC AI Altcoin Altcoins Binance Binance Coin Bitcoin Blockchain BlockDAG BNB Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF ETFs Ethereum Finance Fintech Institutional Investment Investment Market Analysis Market Trends Market Volatility Meme Coin Meme Coins MoonBull Presale Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}