back to top

All stories tagged :

Cryptocurrency

U.S. Securities and Exchange Commission Grants Approval for Nasdaq’s Tokenization Trading...

Alex Rivera
Cryptocurrency

Render token climbs 30% amid a broader rally in AI‑focused cryptocurrencies.

Jordan Chase
Cryptocurrency

Infinex Revises Initial Coin Offering Terms Amid Reduced Investor Demand

Jordan Chase
Cryptocurrency

Ethereum’s Integration with HTTP: Insights from Marissa Posner and Yoav Weiss.

Jordan Chase
Cryptocurrency

Digital Asset Treasuries Achieve Mainstream Adoption in 2025

Jordan Chase
Cryptocurrency

Kraken’s Ink Layer‑2 protocol exceeds $500 million in total value locked.

Jordan Chase
Cryptocurrency

Investors Assess Venezuela’s Bitcoin Holdings in Light of Recent Developments Involving...

Jordan Chase
Cryptocurrency

J.P. Morgan to Issue Deposit Token Natively on the Canton Network

Jordan Chase
Cryptocurrency

Wyoming Introduces the United States’ First State-Issued Stablecoin.

Jordan Chase
Cryptocurrency

Cryptocurrency Markets Decline Slightly as Investors Assess Macro‑Economic Data

Jordan Chase
Cryptocurrency

Polymarket Begins Implementing Fees on Its U.S. Platform and Cryptocurrency Markets.

Jordan Chase

Featured

Bitcoin

Bitrefill breach suspected to involve hackers with alleged ties to North...

Marcus Chen
Cryptocurrency

Kalshi CEO Responds to Arizona Criminal Charges, Characterizing Them as an...

Alex Rivera
Cryptocurrency

Federal Open Market Committee Keeps Interest Rates Unchanged at March Meeting.

Alex Rivera
Cryptocurrency

SEC Chair Details Rationale Behind Classifying NFTs as Non‑Securities

Alex Rivera
Marcus Chen

Bitrefill breach suspected to involve hackers with alleged ties to North...

North Korea‑Linked Hackers Suspected in Bitrefill Breach That Drained Hot Wallets Image: Lazarus Group operatives (credit: CryptoPotato) Executive summary On 1 March 2024 Bitrefill disclosed a cyber‑intrusion that compromised several of its hot cryptocurrency wallets and allowed the theft of an undisclosed amount of funds. The company’s post‑mortem points to tactics, malware signatures...