Skip to content

xpool.eu

crypto news aggregator

Cybersecurity Loopscale Phishing

Loopscale Warns Users of Phishing Attacks

Posted on: April 30, 2025

LoopScale has issued a safety alert to its users, warning them about potential phishing scams. In a statement posted on X (formerly Twitter), Loopscale reported receiving reports of […]

AI Security Cybersecurity Palo Alto Networks

Palo Alto Networks Acquires Protect AI to Boost Cybersecurity Amid AI Surge

Posted on: April 29, 2025

Palo Alto Networks has made a strategic move by acquiring AI security firm Protect AI, aiming to enhance its cybersecurity against rising AI threats. This acquisition is expected […]

AI Security Cybersecurity Palo Alto Networks

Palo Alto Networks Acquires AI Cybersecurity Firm to Boost Protection Efforts

Posted on: April 29, 2025

Palo Alto Networks, a leading cybersecurity provider, has announced the acquisition of Protect AI, a firm specializing in AI and machine learning security solutions. This strategic move aims […]

Cryptocurrency Cybersecurity North Korea

North Korean Hackers Use Fake Crypto Firms for Job Scams, Targeting Workers

Posted on: April 26, 2025

North Korea’s notorious Lazarus Group has infiltrated the cryptocurrency sector by creating fake companies to distribute malware in a sophisticated job scam. The group targeted individuals seeking remote […]

Crypto Cybersecurity SEC

SEC Chair’s Social Media Account Potentially Compromised

Posted on: April 26, 2025

The U.S. Securities and Exchange Commission (SEC) chair, Paul Atkins, experienced a potential security breach as his social media account was reportedly hacked. According to Foresight News, the […]

Crypto Scams Cybersecurity North Korea

North Korea Shifts Tactics: Using Fake Crypto Firms for Job Scams

Posted on: April 25, 2025

North Korea’s Lazarus group is employing a new tactic in their cyber attacks – creating fake crypto consulting companies to lure unsuspecting software developers and blockchain professionals into […]

Cryptocurrency Cybersecurity North Korea

North Korean Hackers Launch New Crypto Malware Campaign Targeting Developers

Posted on: April 25, 2025

A new malware campaign targeting cryptocurrency developers has been launched by North Korean hackers, linked to the Lazarus Group. The group is utilizing fake companies and job scams […]

Crypto Heist Cybersecurity North Korea

Lazarus Group Leverages Fake Companies to Deliver Malware in Job Interview Scams

Posted on: April 25, 2025

A sophisticated cyber attack by the North Korea-linked Lazarus hacker group has been uncovered, targeting unsuspecting individuals through a fake job recruitment scheme. This operation leverages three shell […]

Cryptocurrency Cybersecurity North Korea

North Korea Uses Fake US Companies for Cryptocurrency Hack Attacks

Posted on: April 25, 2025

North Korean hackers are exploiting job seekers in the cryptocurrency world by using fake American companies as fronts. According to U.S. legal filings and research shared with Reuters, […]

Cryptocurrency Cybersecurity North Korea

North Korea Hackers Use Job Offers to Target Crypto Developers, Stealing Over $1 Billion

Posted on: April 25, 2025

North Korean hackers are using sophisticated tactics to infiltrate crypto developer communities. They’re posing as legitimate job recruiters on platforms like LinkedIn and Telegram, offering fake job opportunities […]

Crypto Heist Cybersecurity ZKSync

ZKsync Recovers Stolen Tokens After Hacker Returns Funds Through Bounty Agreement

Posted on: April 25, 2025

ZKsync has successfully recovered nearly $5.7 million in stolen tokens following a hacker’s agreement to return the funds under a bounty agreement. The recovery came after the hacker […]

Cybersecurity Russia Ukraine

Trump’s Cyber Aid Cut Leaves Ukraine Vulnerable to Russian Attacks

Posted on: April 25, 2025

President Donald Trump has dramatically reduced US cybersecurity support for Ukraine, leaving the nation more exposed to Russian cyberattacks. This action, implemented shortly after his inauguration in January, […]

Cybersecurity Lazarus Group North Korea

Lazarus Group Utilizes US Shell Companies to Infiltrate Crypto Developers

Posted on: April 25, 2025

A new report reveals that North Korean cyber spies known as the Lazarus Group are using a sophisticated tactic to infiltrate the cryptocurrency development community. According to Silent […]

Cryptocurrency Cybersecurity North Korea

North Korean Hackers Create Fake Firms Targeting Crypto Developers

Posted on: April 25, 2025

North Korea has escalated its hacking campaign, launching new schemes aimed at cryptocurrency developers. The Lazarus Group, a North Korean cybercrime group, created fake companies, Blocknovas LLC and […]

Cryptocurrency Cybersecurity North Korea

North Korean Hackers Masquerade as Legitimate Firms to Target Crypto Developers

Posted on: April 25, 2025

The Lazarus Group, a notorious North Korean hacking organization, has been using deceptive tactics to infiltrate cryptocurrency developers. They create fake companies and pose as legitimate tech firms […]

Posts pagination

Previous page Page 1 … Page 14 Page 15 Page 16 … Page 22 Next page

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coins Pi Network Presale Price Prediction Qubetics Regulation Ripple SEC Security Shiba Inu Solana Stablecoin Stablecoins SUI Tariffs Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}