Skip to content

xpool.eu

crypto news aggregator

Blockchain Cryptocurrency Cybersecurity

Cryptocurrency Under Attack: $357 Million Lost in April Hacking Attacks

Posted on: May 7, 2025

The cryptocurrency sector recently experienced a concerning surge in cyberattacks, resulting in significant financial losses. According to PeckShieldAlert, hackers caused an alarming $357.11 million in damage across 18 […]

Cybersecurity Data Privacy Nigeria

FG Launches Data Protection Academy: Equipping Nigerians for a Secure Digital Future

Posted on: May 7, 2025

The Federal Government of Nigeria has launched a Data Protection Virtual Academy to bolster cybersecurity across various sectors. The academy, spearheaded by the Nigeria Data Protection Commission (NDPC), […]

Cryptosecurity Cybersecurity DeFi

Crypto Security Remains Untouched Amidst Record Hacks: Hacken CEO Claims Industry Needs Major Overhaul

Posted on: May 7, 2025

Despite a recent record-breaking $1.4 billion theft from Bybit, the cryptocurrency industry appears to be clinging to familiar cybersecurity practices. Hacken CEO Dyma Budorin asserts that companies are […]

Cybersecurity Fake Links Zoom Security

Beware of Fake Zoom Meeting Software Attacks

Posted on: May 7, 2025

SlowMist founder Yu Jian has issued a crucial warning about the rising threat of fake Zoom meeting software attacks. These attacks involve malicious links disguised as legitimate Zoom […]

Cryptocurrency Cybersecurity Hacking

Alleged Nomad Bridge Hacker Facing extradition to US after arrest in Israel

Posted on: May 6, 2025

An Israeli man, Alexander Gurevich, accused of playing a key role in the $190 million Nomad bridge hack has been apprehended and is facing extradition to the United […]

AI Binance Cybersecurity

Binance Bolsters Security Against AI-Powered Face Attacks

Posted on: May 3, 2025

Binance is proactively addressing a new breed of cybersecurity threat: AI-powered face cloning attacks targeting user crypto assets. As CEO Richard Teng highlights, these attacks bypass traditional security […]

AI Binance Cryptocurrency Cybersecurity

AI-Powered Face Cloning Threatens Binance Users as Telegram Faces Security Scrutiny

Posted on: May 3, 2025

Cryptocurrency exchange Binance reported attempts to clone user faces using AI technology, raising security concerns. Meanwhile, Telegram admitted to a potential vulnerability that may compromise user accounts. Experts […]

Cryptocurrency Security Cybersecurity North Korea

Kraken Successfully Prevents North Korean Cyberattack, Demonstrates Security Expertise

Posted on: May 3, 2025

In a groundbreaking security effort, cryptocurrency exchange Kraken thwarted a sophisticated attempt by North Korean hackers to infiltrate the platform. The incident involved an undercover job applicant posing […]

Bank Fraud Cybersecurity SIM Swap

Bank of America Reimburses $38,000 Stolen via SIM-Swap Attack

Posted on: May 3, 2025

A Bank of America customer had $38,000 stolen in a SIM-swap attack, prompting the bank to reimburse the individual after public pressure. This incident highlights the vulnerability of […]

Banking Security Cybersecurity SIM Swapping

Media Pressure Leads to Reimbursement for Bank of America Fraud Victim

Posted on: May 3, 2025

A recent case involving SIM-swapping attacks highlights the vulnerability of banking systems and the need for robust security measures in the face of evolving cyber threats. Justin Chan’s […]

Cryptocurrency Cybersecurity North Korea

Kraken Intercepts North Korean Hacker Attempt: Cybersecurity Spotlight on Crypto Exchanges

Posted on: May 3, 2025

Cryptocurrency exchange Kraken has thwarted a sophisticated infiltration attempt by suspected North Korean hackers, highlighting the ongoing challenge of cybersecurity in the sector. The incident involved a coordinated […]

Cybersecurity Data Breaches Financial

Millions of Records Exposed in 2025 Cyber Breaches: Education, Healthcare, and Finance Hit

Posted on: May 2, 2025

Early 2025 saw a wave of major cyberattacks across different sectors, leading to the compromise of millions of personal records. The breaches primarily affected education, healthcare, and financial […]

Crypto Cybersecurity North Korea

Kraken Detects North Korean Hacker Seeking Engineering Role

Posted on: May 2, 2025

A recent incident reveals the evolving tactics of state-sponsored cybercriminals as a North Korean hacker attempted to infiltrate Kraken’s systems using a job application ruse. The attacker targeted […]

Cryptocurrency Cybersecurity North Korea

Kraken Stops North Korea Hack Attempt Using Disguised Job Applicant

Posted on: May 2, 2025

Crypto exchange Kraken thwarted a sophisticated hacking attempt by North Korean cybercriminals, who disguised their actions as a job application for an engineering role. The scheme demonstrates the […]

Cryptocurrency Cybersecurity Job Applications North Korea

How Hackers Tried to Get In Through Hiring: Kraken’s Unexpected Security Threat

Posted on: May 2, 2025

A North Korean hacker attempted a sophisticated attack on cryptocurrency exchange Kraken, aiming to infiltrate their systems through a seemingly innocent job application. This case reveals a chilling […]

Posts pagination

Previous page Page 1 … Page 27 Page 28 Page 29 … Page 37 Next page

#BTC AI Altcoin Altcoins Binance Binance Coin Bitcoin Blockchain BlockDAG BNB Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF ETFs Ethereum Finance Fintech Institutional Investment Investment Market Analysis Market Trends Market Volatility Meme Coin Meme Coins MoonBull Presale Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}