back to top

All stories tagged :

Cryptocurrency

U.S. Securities and Exchange Commission Grants Approval for Nasdaq’s Tokenization Trading...

Alex Rivera
Cryptocurrency

Circle’s USDC Surpasses Tether’s USDT in Adjusted Year‑to‑Date Volume, Mizuho Reports.

Alex Rivera
Cryptocurrency

Officials Face a Shrinking Timeframe to Enact Bitcoin Tax Exemption

Alex Rivera
Cryptocurrency

Circle shares rise amid growth in stablecoin usage; Canaan increases Bitcoin...

Alex Rivera
Cryptocurrency

Bitcoin rebounds from the $74,000 threshold as buying pressure rises, with...

Alex Rivera
Cryptocurrency

AI Tokens Record Strong Gains Amid Broad Cryptocurrency Market Rally.

Jordan Chase
Cryptocurrency

TRUMP token rises more than 50% after announcement of Mar‑a‑Lago conference.

Jordan Chase
Cryptocurrency

Bloomberg strategist cautions that current market trends could resemble the dynamics...

Alex Rivera
Cryptocurrency

Key Ethereum (ETH) Price Levels to Monitor in the Near Term

Alex Rivera
Cryptocurrency

Token2049 and TON Gateway Cancel Dubai Events Amid Iran‑Related Tensions

Jordan Chase
Cryptocurrency

Pumpfun Introduces Automated Buyback System for AI Agent Tokens

Jordan Chase

Featured

Bitcoin

Bitrefill breach suspected to involve hackers with alleged ties to North...

Marcus Chen
Cryptocurrency

Kalshi CEO Responds to Arizona Criminal Charges, Characterizing Them as an...

Alex Rivera
Cryptocurrency

Federal Open Market Committee Keeps Interest Rates Unchanged at March Meeting.

Alex Rivera
Cryptocurrency

SEC Chair Details Rationale Behind Classifying NFTs as Non‑Securities

Alex Rivera
Marcus Chen

Bitrefill breach suspected to involve hackers with alleged ties to North...

North Korea‑Linked Hackers Suspected in Bitrefill Breach That Drained Hot Wallets Image: Lazarus Group operatives (credit: CryptoPotato) Executive summary On 1 March 2024 Bitrefill disclosed a cyber‑intrusion that compromised several of its hot cryptocurrency wallets and allowed the theft of an undisclosed amount of funds. The company’s post‑mortem points to tactics, malware signatures...