Skip to content

xpool.eu

crypto news aggregator

Cybersecurity Digital Assets Thailand

Thailand Races to Update Digital Asset and Cybercrime Laws Before Songkran Festival

Posted on: April 5, 2025

Thailand is accelerating the development of regulations for digital assets and cybercrime, aiming to implement new laws by April 2023 in preparation for the Songkran festival. This move […]

Cryptocurrency Cybersecurity North Korea Phishing

Cybersecurity Developments: Phishing Campaigns and North Korea Hacks

Posted on: April 5, 2025

This article outlines recent cybersecurity developments, focusing on alarming phishing attacks targeting cryptocurrency users and the actions taken against online child exploitation platforms. Coinbase and Ledger customers were […]

Adaptive Security Artificial Intelligence Cybersecurity Deepfakes OpenAI Social Engineering

OpenAI Invests in Cybersecurity Startup to Combat Deepfake Threats

Posted on: April 4, 2025

Recognizing the emerging threat of deepfakes from generative AI technology, OpenAI has invested in Adaptive Security, a startup dedicated to combating these increasingly sophisticated cyberattacks. This move highlights […]

Cybersecurity Decentralization Identity Management

Beldex AI: Revolutionizing Decentralized Digital Identity with Enhanced Security and User Control

Posted on: April 4, 2025

Imagine being jolted awake by a jarring notification – your credit card has been compromised, or worse, someone used your social security number for fraudulent activity. This is […]

Android Cybersecurity Malware

Triada Malware: A New Threat to Android Users

Posted on: April 3, 2025

A recent report by cybersecurity firm Kaspersky highlights the alarming threat posed by Triada malware, a highly sophisticated Trojan virus targeting Android devices. The malware has evolved into […]

Cryptocurrency Cybersecurity Malware

Crypto Theft on the Rise: Hackers Use Fake Phones to Steal Funds

Posted on: April 3, 2025

A new tactic in cybercrime is emerging, with hackers using counterfeit Android phones loaded with malware to steal cryptocurrency from unsuspecting users. Cybersecurity firm Kaspersky has revealed this […]

Android Phones Cybersecurity Malware

Fake Android Phones: Kaspersky Identifies Malicious Trojan Attack

Posted on: April 3, 2025

Cybersecurity company Kaspersky Lab has uncovered a dangerous trend: counterfeit Android phones pre-loaded with malware are being sold online at incredibly low prices. The Triada Trojan, capable of […]

Android Malware Cryptocurrency Cybersecurity

Counterfeit Phones with Crypto-Stealing Malware Flood Online Market

Posted on: April 3, 2025

Cybersecurity experts have uncovered a new threat targeting smartphone users worldwide. Thousands of counterfeit Android devices are being sold online, pre-loaded with malware designed to steal crypto and […]

Crypto Cybersecurity North Korea

North Korea’s IT Workers Expand Global Operations, Threatening Companies Worldwide

Posted on: April 2, 2025

Google Threat Intelligence Group (GTIG) has revealed that North Korean IT workers are now targeting European crypto companies, marking a significant expansion of their operations beyond the United […]

Altcoin Cybersecurity North Korea

Google Raises Alert: North Korea Hackers Focus on Altcoins

Posted on: April 2, 2025

Recent hacking incidents underscore the rise of cybercrime, with a notable example being the Bybit cryptocurrency exchange breach in Q2 2025. Google’s latest report has revealed that North […]

Cybersecurity Open Source Malware Sonatype

Sonatype Identifies Surge in Open Source Malware

Posted on: April 2, 2025

Sonatype, a company specializing in securing software supply chains, released its Q1 2025 Open Source Malware Index revealing concerning trends. The report highlights multiple incidents of npm crypto […]

Blockchain Cybersecurity North Korea

North Korea Targets Blockchain Firms Globally: Infiltration Expands Beyond US

Posted on: April 2, 2025

Recent reports indicate a concerning escalation of activity by North Korean cyber operatives, targeting blockchain companies worldwide beyond the US. Google’s Threat Analysis Group (GTIG) has confirmed an […]

Cryptocurrency Cybersecurity Hacking

Crypto Hackers Steal Over $1.6 Billion in Q1 2025

Posted on: April 2, 2025

The first quarter of 2025 saw a surge in crypto hacks, leading to significant losses and raising concerns about the security of the industry. New regulations like the […]

Cybersecurity Fraud WhatsApp

WhatsApp Scams Cost UK Consumers £2,437: Revolut Report Highlights Growing Financial Threat

Posted on: April 2, 2025

A new report from Revolut reveals the staggering financial impact of WhatsApp scams in the UK, with consumers losing an average of £2,437 per victim. This alarming statistic […]

Blockchain Cybersecurity North Korea

North Korean Tech Workers Target European Blockchain Firms Amid U.S. Crackdown

Posted on: April 2, 2025

The threat of North Korean infiltration into the blockchain sector has intensified as US authorities clamp down on activities by North Korean IT workers. According to a recent […]

Posts pagination

Previous page Page 1 … Page 19 Page 20 Page 21 Page 22 Next page

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coins Pi Network Presale Price Prediction Qubetics Regulation Ripple SEC Security Shiba Inu Solana Stablecoin Stablecoins SUI Tariffs Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}