back to top

All stories tagged :

Cryptocurrency

U.S. Securities and Exchange Commission Grants Approval for Nasdaq’s Tokenization Trading...

Alex Rivera
Cryptocurrency

TradeXYZ reports record-high trading volume and open interest.

Jordan Chase
Cryptocurrency

Zama’s encrypted Ethereum token auction secures $118 million in investor commitments.

Jordan Chase
Cryptocurrency

Chainalysis Finds Chinese Telegram-Based Networks Account for 20% of Measured Crypto‑Laundering...

Jordan Chase
Cryptocurrency

Bitcoin price falls below $88,000 as investors await the Federal Reserve’s policy...

Jordan Chase
Cryptocurrency

Ethereum ecosystem expands in 2025 despite stagnant ETH price, Everstake reports.

Jordan Chase
Bitcoin

Crypto’s Constructive Start to 2026 – Updated: 2026-01-06 13:49:00

Priya Sharma
Cryptocurrency

Tether Announces Launch of USAT, a Regulated U.S. Dollar‑Pegged Stablecoin.

Jordan Chase
Cryptocurrency

USDAI Announces Upcoming Token Launch and Airdrop Distribution.

Jordan Chase
Cryptocurrency

Movers & Shakers January 2026 – Updated: 2026-01-06 19:06:00

Priya Sharma
Bitcoin

Uniswap Flips the Fee Switch: From Governance Token to Value Accrual...

Priya Sharma

Featured

Bitcoin

Bitrefill breach suspected to involve hackers with alleged ties to North...

Marcus Chen
Cryptocurrency

Kalshi CEO Responds to Arizona Criminal Charges, Characterizing Them as an...

Alex Rivera
Cryptocurrency

Federal Open Market Committee Keeps Interest Rates Unchanged at March Meeting.

Alex Rivera
Cryptocurrency

SEC Chair Details Rationale Behind Classifying NFTs as Non‑Securities

Alex Rivera
Marcus Chen

Bitrefill breach suspected to involve hackers with alleged ties to North...

North Korea‑Linked Hackers Suspected in Bitrefill Breach That Drained Hot Wallets Image: Lazarus Group operatives (credit: CryptoPotato) Executive summary On 1 March 2024 Bitrefill disclosed a cyber‑intrusion that compromised several of its hot cryptocurrency wallets and allowed the theft of an undisclosed amount of funds. The company’s post‑mortem points to tactics, malware signatures...