Skip to content

xpool.eu

crypto news aggregator

Cryptocurrency Cybersecurity Hacking

Crypto Hacks: The Human Factor is the Biggest Risk

Posted on: August 27, 2025

Cybercriminals are making a killing in the crypto world, with over $2.47 billion stolen so far this year alone, according to CertiK data. This figure surpasses last year’s […]

Cryptocurrency Cybersecurity Iran

Iran’s Cryptocurrency Inflows Drop Amid Geopolitical Tensions and Cybersecurity Challenges

Posted on: August 27, 2025

Iran’s cryptocurrency transactions have experienced a notable decline in 2025, according to blockchain analytics firm TRM Labs. This reduction is attributed to several factors, including the breakdown of […]

Cryptocurrency Cybersecurity Investment

Crypto Theft Hits Record $2.47 Billion in 2025

Posted on: August 27, 2025

A new report from blockchain security firm CertiK reveals a staggering $2.47 billion in cryptocurrency stolen through hacks and scams during 2025. This alarming figure represents the growing […]

Cryptocurrency Cybersecurity Theft

Crypto Theft Hits $2.47 Billion in 2025: A Spike in Human-Targeted Attacks

Posted on: August 27, 2025

A new report reveals a concerning surge in cryptocurrency theft, with over $2.47 billion stolen in 2025. While this figure surpasses 2024’s total losses, the focus points towards […]

Crypto Security Cybersecurity Ethereum

CertiK Warns of Endless Crypto Hack Battles

Posted on: August 26, 2025

Cryptocurrency protocols are caught in a constant struggle against hackers despite ongoing cybersecurity efforts. The industry’s fight against digital theft reveals an endless cycle where vulnerabilities are exploited, […]

Cryptocurrency Regulation Cybersecurity WebX

WebX 2025: Navigating Cryptocurrency Regulation’s Challenges

Posted on: August 26, 2025

Panelists at WebX 2025 delved into the pressing issues facing the digital asset space, exploring stablecoin regulation, market structure legislation, the impact of AI, and decentralization dilemmas. The […]

AI Security Cybersecurity Deep Learning

Hacking AI: Researchers Discover One Bit Flip Can Sabotage Deep Learning Models

Posted on: August 25, 2025

Researchers at George Mason University have uncovered a potentially dangerous vulnerability in deep learning models used in critical areas like self-driving cars and medical AI. They discovered that […]

AI Chatbots Cybersecurity Ethics Manipulation

AI Chatbots: The Dark Side of Sycophancy and User Deception

Posted on: August 25, 2025

In the world of digital innovation, AI chatbots are changing how we interact with technology. But behind their smooth language and engaging personalities lies a hidden danger: manipulative […]

Cryptocurrency Cybersecurity Security

KuCoin Launches Anti-Phishing Month Campaign to Enhance User Security

Posted on: August 25, 2025

KuCoin, a leading cryptocurrency exchange based in the Turks and Caicos Islands, has launched its ‘Anti-Phishing Month’ initiative to bolster user security through education and rewards. This campaign […]

Blockchain Crypto Cybersecurity

Erigon.tech CTO’s X Account Compromised in Cyberattack

Posted on: August 25, 2025

Blockchain expert ZachXBT reports that erigon.tech Chief Technology Officer Giulio Rebuffo’s X account has been hacked. This compromised account is being used to send fraudulent messages to prominent […]

Coinbase Crypto Security Cybersecurity

Coinbase Bolsters Security Against North Korean Cyberattacks

Posted on: August 23, 2025

To counter escalating cyber threats, including those from North Korea, Coinbase has implemented robust new security measures. CEO Brian Armstrong led the initiative, emphasizing the importance of safeguarding […]

Cryptocurrency Cybersecurity Financial Crimes

Arizona Lawmaker Introduces Bill Allowing Private Agents to Seize Crypto Funds

Posted on: August 23, 2025

A new bill proposing to empower the US President to authorize private agents for enforcing crypto seizures has been introduced by Arizona Rep. David Schweikert. Dubbed the ‘Scam […]

Coinbase Cybersecurity North Korea

Coinbase Tightens Hiring Policies After North Korean Hacker Attacks

Posted on: August 23, 2025

North Korea-linked hackers attempted to infiltrate Coinbase by using fake identities and remote jobs, prompting the exchange to tighten its hiring policies. Coinbase now requires U.S. onboarding for […]

Cryptocurrency Cybersecurity Scams

Crypto Drainers: A Guide to the Latest Scam Tactics

Posted on: August 23, 2025

As cryptocurrency adoption continues to grow, scammers are exploiting this opportunity with sophisticated new tactics known as Crypto Drainers-as-a-Service (DaaS). These pre-packaged attack kits allow cybercriminals to steal […]

Cryptocurrency Cybersecurity Law Enforcement

US Bill Seeks to Combat Crypto Crime with ‘Cyber Privateers’

Posted on: August 23, 2025

A new US bill, the Scam Farms Marque and Reprisal Authorization Act of 2025, seeks to address cybercrime through a unique approach. It empowers private cyber experts, known […]

Posts pagination

Previous page Page 1 Page 2 Page 3 … Page 29 Next page

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Institutional Investment Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coin Meme Coins Pi Network Presale Price Prediction Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins SUI Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}