Skip to content

xpool.eu

crypto news aggregator

Cryptocurrency Cybersecurity WazirX

WazirX Receives Strong Support for Restructuring Plan, Claims Over $195 Million Approved

Posted on: April 7, 2025

Overwhelming support from WazirX users has been received regarding the exchange’s restructuring plan following a major cybersecurity incident that resulted in a loss of ₹2,000 crore in crypto […]

Cybersecurity Financial Security Mobile Banking

Mobile Banking Attacks Surge 258%, Highlight Growing Cybersecurity Threat

Posted on: April 6, 2025

Mobile banking applications are facing a surge in cyberattacks, with Kaspersky reporting a staggering 258% increase according to their latest report. These attacks target both Android and iPhone […]

#CYBER Cryptocurrency Cybersecurity

Mochi Inu Suffers $50,000 Loss due to Cyber Attack

Posted on: April 6, 2025

A recent cyberattack on Mochi Inu has resulted in a significant financial loss of approximately $50,000. The incident was reported by BlockSec and sheds light on ongoing security […]

Cybersecurity Financial Loss Phishing

User Suffers Major Financial Loss From Phishing Scam

Posted on: April 6, 2025

A recent phishing attack has resulted in a significant financial loss, as per Foresight News reports. A user allegedly fell victim to a scam where unauthorized ‘approve’ transactions […]

Cybersecurity Digital Assets Thailand

Thailand Proactively Enacts Digital Asset Laws Ahead of Songkran

Posted on: April 6, 2025

To ensure a safer digital environment before the Songkran festival season, Thailand has swiftly enacted new regulations for digital assets and cybercrime. This proactive approach reflects the growing […]

Cybersecurity Digital Assets Thailand

Thailand Races to Update Digital Asset and Cybercrime Laws Before Songkran Festival

Posted on: April 5, 2025

Thailand is accelerating the development of regulations for digital assets and cybercrime, aiming to implement new laws by April 2023 in preparation for the Songkran festival. This move […]

Cryptocurrency Cybersecurity North Korea Phishing

Cybersecurity Developments: Phishing Campaigns and North Korea Hacks

Posted on: April 5, 2025

This article outlines recent cybersecurity developments, focusing on alarming phishing attacks targeting cryptocurrency users and the actions taken against online child exploitation platforms. Coinbase and Ledger customers were […]

Adaptive Security Artificial Intelligence Cybersecurity Deepfakes OpenAI Social Engineering

OpenAI Invests in Cybersecurity Startup to Combat Deepfake Threats

Posted on: April 4, 2025

Recognizing the emerging threat of deepfakes from generative AI technology, OpenAI has invested in Adaptive Security, a startup dedicated to combating these increasingly sophisticated cyberattacks. This move highlights […]

Cybersecurity Decentralization Identity Management

Beldex AI: Revolutionizing Decentralized Digital Identity with Enhanced Security and User Control

Posted on: April 4, 2025

Imagine being jolted awake by a jarring notification – your credit card has been compromised, or worse, someone used your social security number for fraudulent activity. This is […]

Android Cybersecurity Malware

Triada Malware: A New Threat to Android Users

Posted on: April 3, 2025

A recent report by cybersecurity firm Kaspersky highlights the alarming threat posed by Triada malware, a highly sophisticated Trojan virus targeting Android devices. The malware has evolved into […]

Cryptocurrency Cybersecurity Malware

Crypto Theft on the Rise: Hackers Use Fake Phones to Steal Funds

Posted on: April 3, 2025

A new tactic in cybercrime is emerging, with hackers using counterfeit Android phones loaded with malware to steal cryptocurrency from unsuspecting users. Cybersecurity firm Kaspersky has revealed this […]

Android Phones Cybersecurity Malware

Fake Android Phones: Kaspersky Identifies Malicious Trojan Attack

Posted on: April 3, 2025

Cybersecurity company Kaspersky Lab has uncovered a dangerous trend: counterfeit Android phones pre-loaded with malware are being sold online at incredibly low prices. The Triada Trojan, capable of […]

Android Malware Cryptocurrency Cybersecurity

Counterfeit Phones with Crypto-Stealing Malware Flood Online Market

Posted on: April 3, 2025

Cybersecurity experts have uncovered a new threat targeting smartphone users worldwide. Thousands of counterfeit Android devices are being sold online, pre-loaded with malware designed to steal crypto and […]

Crypto Cybersecurity North Korea

North Korea’s IT Workers Expand Global Operations, Threatening Companies Worldwide

Posted on: April 2, 2025

Google Threat Intelligence Group (GTIG) has revealed that North Korean IT workers are now targeting European crypto companies, marking a significant expansion of their operations beyond the United […]

Altcoin Cybersecurity North Korea

Google Raises Alert: North Korea Hackers Focus on Altcoins

Posted on: April 2, 2025

Recent hacking incidents underscore the rise of cybercrime, with a notable example being the Bybit cryptocurrency exchange breach in Q2 2025. Google’s latest report has revealed that North […]

Posts pagination

Previous page Page 1 … Page 34 Page 35 Page 36 Page 37 Next page

#BTC AI Altcoin Altcoins Binance Binance Coin Bitcoin Blockchain BlockDAG BNB Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF ETFs Ethereum Finance Fintech Institutional Investment Investment Market Analysis Market Trends Market Volatility Meme Coin Meme Coins MoonBull Presale Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}