Skip to content

xpool.eu

crypto news aggregator

Cryptojacking Cybercrime Ukraine

Ukrainian Man Arrested Over Alleged Cryptojacking Scheme

Posted on: June 5, 2025

A 35-year-old man from the Poltava region of Ukraine has been apprehended for allegedly engaging in an illegal cryptojacking operation targeting a prominent international hosting company. Ukrainian authorities […]

Cryptojacking Security Breach Ukraine

Ukrainian Man Arrested for Cryptojacking Using Hosting Company Accounts

Posted on: June 5, 2025

A 35-year-old man from Ukraine’s Poltava region has been arrested and accused of illegally gaining access to over 5,000 customer accounts at a major international hosting company. The […]

Cloud Computing Cryptojacking DevOps Security

DevOps Tools Targeted: JINX-0132 Cryptojacking Threat Emerges

Posted on: June 5, 2025

A new cyber threat, JINX-0132, is employing popular DevOps tools to launch cryptocurrency mining attacks on cloud infrastructure. This vulnerability affects 25% of companies utilizing these platforms and […]

Cloud Security Cryptojacking DevOps Security

DevOps Tools Targeted: Cryptojacking Campaign Raises Security Concerns

Posted on: June 4, 2025

A new campaign by the JINX-0132 hacking group has exposed vulnerabilities in DevOps tools, threatening a significant portion of cloud environments. Experts at Wiz have discovered this group […]

Cryptojacking Docker Security Linux Malware

New Linux Malware Threatens Docker Infrastructure: Decentralized Cryptojacking Attack

Posted on: May 28, 2025

A recent cybersecurity report from Kaspersky highlights a newly emerged Linux malware targeting insecure Docker infrastructures. This threat is enabling the creation of a decentralized cryptojacking network, where […]

Cryptojacking Cybersecurity Security

Cryptojacking Threats: Key Insights into Security Measures

Posted on: May 12, 2025

Cryptojacking attacks pose significant risks to computing resources due to the unauthorized use of machines for cryptocurrency mining. Security firms like Imperva and CrowdStrike are focusing on enhancing […]

Bitcoin Cryptojacking Fraud

Massive Bitcoin Heist: Social Engineering Scam Results in $330 Million Theft

Posted on: April 30, 2025

A large-scale Bitcoin heist involving over $330 million in BTC has been confirmed. According to blockchain expert ZachXBT, the theft was a result of a targeted social engineering […]

Cryptojacking DeFi Security Ethereum

Hacked for Millions, Then Scams in DeFi: A Crypto Heist Gone Wrong

Posted on: April 2, 2025

A recent exploit in the decentralized finance (DeFi) space has left a hacker reeling after they were caught in a web of scams. The attacker stole a staggering […]

Cryptojacking Cybersecurity North Korea

North Korea’s Crypto Attacks Escalate in Sophistication

Posted on: April 1, 2025

Cryptocurrency firm Paradigm warns in a report titled ‘Demystifying the North Korean Threat,’ that cyberattacks from North Korea on the cryptocurrency industry are becoming increasingly sophisticated. The number […]

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coins Pi Network Presale Price Prediction Qubetics Regulation Ripple SEC Security Shiba Inu Solana Stablecoin Stablecoins SUI Tariffs Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}