Skip to content

xpool.eu

crypto news aggregator

Cryptosecurity Scam Shiba Inu

Shiba Inu Faces New Threat: Fake Airdrops and Phishing Scams

Posted on: October 8, 2025

The Shiba Inu community faces a growing threat from scammers, as recent incidents highlight the challenges of navigating online activities within this popular ecosystem. One such threat is […]

Cryptosecurity Post Quantum Cryptography Quantum Computing

Quantum Threat: Rethinking Digital Security in a Changing World

Posted on: October 7, 2025

Our reliance on digital interactions is pervasive, from financial transactions to personal communications. This dependence on secure digital systems hinges upon cryptography, complex mathematical algorithms that safeguard our […]

Blockchain Cryptosecurity DeFi

Crypto Platform Security Flaws Raise Risk of Permanent Loss

Posted on: October 5, 2025

Recent hacking incidents on crypto platforms highlight the vulnerability of decentralized systems. The Abracadabra stablecoin platform, for instance, suffered a major cyberattack resulting in significant financial losses and […]

Cryptosecurity DeFi Pi Network

Pi Network Update Sparks Hacking Rumors as Community Questions Authenticity of Official X Post

Posted on: October 4, 2025

Recent developments on the Pi Network have sparked concerns about potential hacking activities, following a dubious post by a non-official account highlighting new DEX and AMM features. The […]

Cryptosecurity DeFi THORChain

THORChain Co-Founder’s Wallet Suffers $1.2 Million Exploit

Posted on: September 12, 2025

A personal cryptocurrency wallet belonging to THORChain co-founder John-Paul Thorbjornsen was targeted in a $1.2 million exploit via social engineering and deepfakes. While the THORChain protocol and user […]

Crypto Theft Cryptosecurity Software Wallets

Software Wallet Hack: $1.35 Million Stolen From Crypto Founder

Posted on: September 12, 2025

A major crypto theft has occurred, with a $1.35 million loss stemming from a software wallet hack targeting a Thorchain cofounder. The victim was not tricked into sending […]

Cryptosecurity Security XRPL

XRPL Unveils XLS-86 Firewall to Combat Scam Threats

Posted on: September 12, 2025

The XRP Ledger (XRPL) has announced the implementation of the XLS-86 Firewall, a measure designed to combat the increasing number of scam threats targeting users. This initiative aims […]

Cryptosecurity iPhone MIE

iPhone 17 Offers Enhanced Cryptocurrency Security with New MIE Chip

Posted on: September 11, 2025

Apple’s upcoming iPhone 17 launch will bring a significant security upgrade for cryptocurrency holders, featuring the new Memory Integrity Enforcement (MIE) system built into its A19 chip. This […]

Binance Cryptosecurity Web3

Binance’s CZ Highlights Cybersecurity Risks Amidst Web3 Advancements

Posted on: September 9, 2025

In the rapidly evolving digital landscape, Changpeng Zhao (CZ), founder of Binance, has underscored the security vulnerabilities inherent in traditional Web2 applications. He urges for robust security measures […]

Cold Storage Cryptosecurity XRP

Protect Your XRP: The Best Cold Wallet for Long-Term Security

Posted on: September 8, 2025

Storing your XRP securely in the long term is crucial, as the crypto landscape evolves. A hot wallet can expose you to risks like malware and exchange outages. […]

Cryptosecurity DeFi Nemo Protocol

Nemo Protocol Suffers $2.4 Million Security Breach: Community Demands Transparency

Posted on: September 8, 2025

A significant security breach has impacted the Nemo Protocol, resulting in a loss of $2.4 million worth of USDC. The exploit led to a decrease in Total Value […]

Blockchain Cryptosecurity Ethereum Malware

Hackers Use Ethereum Contracts to Hide Malware in Open-Source Libraries

Posted on: September 5, 2025

Cybercriminals are increasingly turning to Ethereum smart contracts to disguise malicious code within open-source libraries, making detection and removal more challenging. Research by ReversingLabs reveals that hackers are […]

Cryptosecurity Ethereum Web3

Hidden Malware Threatens Web3 Security: Hackers Infect Ethereum Smart Contracts

Posted on: September 5, 2025

A new threat to the security of decentralized applications (dApps) and blockchain systems is emerging: hackers are embedding malware directly into Ethereum smart contracts. These contracts, designed for […]

AI Security Cryptosecurity Prompt Injection

CopyPasta Attack Exposes AI Security Risks: Prompts for Concern in Cryptoverse

Posted on: September 5, 2025

A new threat dubbed the ‘CopyPasta’ attack has emerged, targeting AI coding assistants with malicious instructions injected through developer file formats. This unprecedented vulnerability, discovered by HiddenLayer researchers, […]

Cryptosecurity DeFi Ethereum

Venus Protocol Recovers Stolen Cryptocurrency After North Korea-Linked Phishing Attack

Posted on: September 4, 2025

The decentralized finance platform, Venus Protocol, successfully recovered $13.5 million in cryptocurrency stolen through a sophisticated phishing attack linked to Lazarus Group, a North Korean hacking collective. The […]

Posts pagination

Previous page Page 1 … Page 3 Page 4 Page 5 … Page 19 Next page

#BTC AI Altcoin Altcoins Binance Binance Coin Bitcoin Blockchain BlockDAG BNB Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF ETFs Ethereum Finance Fintech Institutional Investment Investment Market Analysis Market Trends Market Volatility Meme Coin Meme Coins MoonBull Presale Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}