Search
MEXC Reports 200% Surge in Coordinated Fraud Attempts in Q1 2025
3.6.2025
Cryptocurrency exchange MEXC reported a significant 200% increase in coordinated fraudulent trading activity in the first quarter of 2025. Most fraudulent activity is concentrated in Asia, with India accounting for nearly 27,000 or 33% of flagged accounts. Fraudulent Activity Concentrated in Asia...
Major Crypto Firms Spending Millions on Personal Security
19.5.2025
Coinbase, Circle, and Robinhood are spending millions to ensure the security of their top executives as crypto becomes mainstream and criminals begin targeting crypto millionaires. The recent wave of kidnappings in France has heightened the interest of crypto holders in personal security options....
Binance, Kraken Thwarted Social Engineering Attacks Similar to Coinbase Hack
19.5.2025
Attackers reportedly tried bribing support agents, but Binance and Kraken’s internal systems blocked the attempts
CZ Shares Urgent Advice as Phishing Threats Target Crypto Users
17.5.2025
Binance’s founder has urgent advice for crypto users: strengthen logins, avoid risky clicks, and adopt advanced security tools to stay ahead of relentless phishing threats. CZ Shares Crucial Tips to Stop Phishing Scams Targeting Crypto Users Binance co-founder and former CEO Changpeng Zhao...
Zoom/Telegram Deepfake Attack Vector Rises: Crypto Founders Targeted
15.5.2025
Sandeep Nailwal, founder of Polygon, warned about a recent incident involving a hack of one of his contacts that utilized social engineering and deepfakes on Zoom to compromise other Telegram contacts. The attackers sought to install a component that would allow them to gain access to...
KuCoin Commits $2 Billion to “Trust Project” Focusing on Crypto Security and Transparency
30.4.2025
KuCoin’s native token, KCS, will play a more pivotal role in the ecosystem
DeFi Platform Loopscale Negotiates With $5.7M Exploit Hacker
28.4.2025
Loopscale has offered a hacker behind a $5.7 million USDC and 1,200 SOL exploit a deal: return 90% of the funds and keep 10% as a bounty, with full immunity from liability. Attack Impacts 12% of Funds on Loopscale Loopscale, the on-chain borrowing and lending platform, has offered the hacker behind...
Zoom Calls? Beware! Lazarus Is Targeting Crypto Founders
21.4.2025
Kenny Li, co-founder of Manta Network, recently raised alarms about the modus operandi of Lazarus, the North Korean hacking collective, and its use of Zoom. Li reported that he was targeted by a known contact using a Zoom-like app that requested access to his camera. Lazarus Is on the Move: Zoom...
ENS Lead Developer Reveals Flaw Allowing Phishers to Mimic Official Google Alerts
16.4.2025
Nick Johnson, a well‑known Ethereum Name Service (ENS) engineer, disclosed a cunning phishing campaign that preyed on weak spots within Google’s backbone, notably a recently patched OAuth flaw. Google’s Guard Down: ENS Engineer Tracks Phishing Exploit The scheme, according to Johnson’s...
Kiloex DEX Hacked for $7 Million
15.4.2025
Decentralized exchange Kiloex suffered a $7 million exploit. Security firm Cyvers identified a potential price oracle vulnerability as the cause. Kiloex Calls for Blacklisting of Attacker’s Address Kiloex, a decentralized exchange (DEX) on the BNB Smart Chain, confirmed it was the victim of a...
A Thriller Gone Real: Alleged Scammer Kidnapped by Fake Police, Loses $50 Million
4.4.2025
An individual wanted by Interpol, lost $50 million in a kidnapping that involved drugs, fake police officers, and a daring escape in Brazil. Rodrigo Perez was kidnapped on March 24 by fake police officers who kept him drugged and handcuffed to a bed for five days. Fake Police Officers Kidnap...
UPCX Assures Users After Unauthorized Transfer of 18.4M Tokens
2.4.2025
UPCX, a decentralized payment network, has temporarily suspended deposits and withdrawals due to unauthorized activity in its management accounts. Unauthorized Transfer of Millions in UPC Tokens UPCX, a decentralized payment network, has announced the temporary suspension of deposits...
Fake CAPTCHA Forces Users to Run Malware Disguised as Verification Text
22.3.2025
Fake CAPTCHA pages tricked users into pasting malware-laced commands into Windows Run, launching stealth attacks that silently deployed infostealers undetected. Deceptive CAPTCHA Pages Deploy Stealth Malware Using Windows Run Exploit Cybersecurity analysts in New Jersey flagged an alarming malware...
New Malware Is Draining Crypto Wallets Through Google Chrome
21.3.2025
New malware is attacking cryptocurrency users, stealing wallet credentials and financial data by bypassing Chrome’s encryption and monitoring clipboard activity to intercept and redirect transactions. New Malware Targets Crypto Users, Stealing Wallet Credentials and Financial Data A newly...
Dynasty Warriors: Origins' Weapon Reforging Is Kind Of A Scam
12.3.2025
Dynasty Warriors: Origins reveals a plethora of new systems and mechanics to strengthen your protagonist in the postgame. We’re talking expanded level caps, new game plus, a brand new difficulty level which grants new skills and weapons, and…weapon reforging. If you’re au fait with Dynasty Warriors...
Blind Signing Vulnerabilities: ZKPs Offer Potential Fix After Bybit Hack
12.3.2025
The hackers behind the Bybit hack have managed to cash out approximately $300 million of the stolen $1.4 billion in digital assets, despite industry efforts to prevent them.The hack has sparked debate about how Web3 firms can prevent similar attacks in the future. Bybit Hack: 20% of Stolen Funds...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
Crypto mixers and crosschain bridges help criminals obscure stolen funds, making it harder for investigators to trace illicit transactions
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...