Skip to content

xpool.eu

crypto news aggregator

Cryptocurrency Cybersecurity North Korea

North Korean Cyberattacks Cripple Cryptocurrency Market, Leaving $1.5 Billion Hole

Posted on: March 31, 2025

A devastating cyberattack orchestrated by North Korea’s notorious Lazarus Group has left cryptocurrencies reeling, impacting the market with a significant loss of over $1.5 billion from Bybit. This […]

Cryptocurrency Cybersecurity North Korea

North Korea’s Crypto Attacks Rise in Sophistication and Number

Posted on: March 31, 2025

Cryptocurrency firms are warning about a growing sophistication of North Korean cyberattacks on the industry. A report by crypto firm Paradigm, titled ‘Demystifying the North Korean Threat,’ reveals […]

Crypto Cybersecurity RWA

ZOTH Updates on Cyberattack Investigation

Posted on: March 30, 2025

The RWA project ZOTH has provided an update on its investigation into the recent cyberattack targeting the X platform. While no substantial shifts in the movement of funds […]

Crypto Exchange Cybersecurity Ethereum

Bybit Hack Exposes Blind Signing Vulnerability; Experts Weigh In

Posted on: February 26, 2025

A massive cyber heist has hit cryptocurrency exchange Bybit, resulting in the theft of $1.4 billion worth of Ethereum. North Korean hackers, linked to Lazarus Group, exploited a […]

Crypto Exchange Cybersecurity Ethereum

Bybit Ethereum Theft Originated From Safe UI Compromise

Posted on: February 26, 2025

An independent audit reveals that North Korean group Lazarus infiltrated Safe’s infrastructure, leading to the compromise of Bybit’s Ethereum wallet. The theft, estimated at $1.4 billion, occurred on […]

Bybit Crypto Crime Cybersecurity

Bybit Launches LazarusBounty Platform: A Multi-Pronged Offensive Against Crypto Crime

Posted on: February 26, 2025

Bybit, the world’s second-largest cryptocurrency exchange by trading volume, today launched a groundbreaking platform called LazarusBounty.com, marking a decisive move to combat crypto crime. This industry-first initiative utilizes […]

Cybersecurity GitHub Malware

GitHub Hackers Unleash Malware Campaign Using Fake Projects

Posted on: February 26, 2025

Cybersecurity experts have uncovered a dangerous new malware campaign targeting GitHub users through meticulously crafted fake repositories. Dubbed ‘GitVenom’, this initiative involves hackers creating numerous fabricated projects that […]

Crypto Hacks Cybersecurity North Korea

Chainalysis Links North Korea to Bybit Hack Investigation

Posted on: February 25, 2025

Chainalysis, a blockchain analytics platform, has unveiled its investigation into the recent $1.5 billion ETH heist from crypto exchange Bybit. The investigation reveals that North Korean hackers are […]

Cryptocurrency Cybersecurity Ledger

Ledger CEO Warns of Hackers Targeting Cryptocurrency Exchanges

Posted on: February 25, 2025

In a recent interview, Ledger CEO Pascal Gauthier highlighted the vulnerability of cryptocurrency exchanges to cyberattacks. He emphasized that despite Bitcoin’s inherent security, platforms storing digital assets remain […]

Bybit Crypto Cybersecurity

Bybit Hack: $1.4B Heist Marks Largest Crypto Theft in History

Posted on: February 25, 2025

On February 21, 2025, the cryptocurrency exchange Bybit suffered a historic security breach, causing the largest crypto theft ever. Hackers stole approximately $1.4 billion worth of digital assets […]

Posts pagination

Previous page Page 1 … Page 20 Page 21

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coins Pi Network Presale Price Prediction Qubetics Regulation Ripple SEC Security Shiba Inu Solana Stablecoin Stablecoins SUI Tariffs Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}