Search
South Korea’s bank-first stablecoin approach lacks logic, says Kaia chair
29.10.2025
The Bank of Korea should make clear rules for stablecoin issuers, allowing banks and non-banks to issue the tokens, says Kaia DLT Foundation chair Dr. Sangmin Seo
South Korea’s bank-first stablecoin approach lacks logic, says Kaia chair
29.10.2025
The Bank of Korea should make clear rules for stablecoin issuers, allowing banks and non-banks to issue the tokens, says Kaia DLT Foundation chair Dr. Sangmin Seo
South Korean Crypto Exchanges See 1,400x Jump in Flows Linked to Sanctioned Cambodian Entities
27.10.2025
Bithumb led with 12.4 billion won, followed by Upbit with 366 million won. Smaller amounts moved through Coinone and Korbit, while Gopax reported no activity
Japan's New Yen Stablecoin is Asia’s Only Truly Global Fiat-Pegged Token
27.10.2025
With the yen freely convertible and backed by Japan’s deep government bond market, JPYC’s launch stands apart from the region’s onshore-only experiments in Korea, Taiwan, and beyond
North Korea’s AI-Powered Hackers Are Redefining Crypto Crime
25.10.2025
Mysten Labs’ chief cryptographer warns that artificial intelligence, not quantum computing, poses the real near-term threat to blockchain security
Operator of South Korea’s Largest Rewards Service Adopts Blockchain Identity Infrastructure
24.10.2025
Moca Network, a decentralized digital identity initiative by Animoca Brands, has launched a verifiable loyalty platform developed with Spree Finance and SK Planet. Decentralizing Identity for Millions of Users Moca Network, the decentralized digital identity initiative by Animoca Brands,...
Google: North Korea Uses Blockchain to Distribute Malware
20.10.2025
A report from the Google Threat Intelligence Group warned about a malware campaign implemented by North Korea that uses EtherHiding. The campaign uses a smart contract on a public chain, such as Ethereum or BNB, to avoid deletion or removal by traditional methods. Google Warns About North Korea...
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract
What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts
17.10.2025
"EtherHiding" deploys in two phases by compromising a website, which then communicates with malicious code embedded in a smart contract