Last updated: 6/28/2025, 3:43:05 AM
Lambur rejected claims of secret DAO votes and early sales, and asserted that Across Protocol's proposals were transparent and aligned with the DAO's intended goals....
Crypto exchange Gemini has launched tokenized Strategy (MSTR) shares for customers in the EU, marking the beginning of its rollout of tokenized U.S. equities on blockchain networks. The offering, enab...
The $1B shelf registration lets Bakkt issue stock, debt, or warrants, considering Bitcoin allocations depending on market conditions....
The Bolivian central bank reported on June 27 that domestic crypto transactions totaled $430 million in the 12 months since regulators reopened formal payment rails, a 630% jump over the previous year...
The decision, announced by Ripple Labs CEO Brad Garlinghouse on Friday, comes shortly after a New York judge blocked the company’s second attempt to settle the case for $50 million....
Ripple will drop its cross-appeal in its prolonged legal battle with the U.S. Securities and Exchange Commission, signaling an end to one of the crypto industry’s most consequential court cases. Rippl...
The company joins Kraken, Coinbase and Bybit who have also received MiCA licenses to operate in Europe....
The crypto exchange has teamed up with tokenization specialist Dinari to offer tokenized U.S. stocks to users in European Union....
The Financial Action Task Force (FATF) said in a report released this week that global efforts to regulate virtual assets and service providers have improved but remain incomplete, with illicit use of...
The crypto custodian rated USDC and AUSD poorly for regulatory oversight and reserve management, while executives from VanEck, Coinbase and others questioned the ranking....
Apple and Google espouse strong values about data privacy, but they allow programs from a Big Brother state to thrive on their app stores, researchers allege....
Whale wallets holding 10+ BTC hit 152,280, the highest since March, signaling deep-pocketed confidence despite BTC trading below $108K....
Moonshot added Apple Pay support for launching new memecoins on June 27, expanding its iOS application beyond buying and trading tokens to include a creation workflow that requires only a photo upload...
Projects tied to Pepe meme creator Matt Furie and the NFT studio ChainSaw lost roughly $1 million to contract takeover exploits last week, according to on-chain investigator ZachXBT. On June 27, ZachX...
A new Cantor Fitzgerald report argues that bitcoin miner Core Scientific is worth far more than the markets believe thanks to its strategic role in powering AI....
U.S. President Trump said that all trade discussions with Canada were being terminated....
If exploited, the critical vulnerability allows attackers to maintain access for longer periods of time than the original CitrixBleed flaw, all while remaining undetected....
President Donald Trump said Bitcoin (BTC) transactions “take a lot of pressure off the dollar” and argued that US leadership in digital assets blocks China from dominating the sector. He made the comm...
Hackers associated with Scattered Spider tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors [...]...
Robinhood expanded its futures trading suite by adding micro futures contracts for XRP, Solana (SOL), and Bitcoin (BTC), according to a June 27 announcement. The zero-commission brokerage said the new...
Bullish signals for stablecoins were all around, from Asia to Europe to Circle's stock price....
Despite ETH's price volatility, Ethereum's network has recorded historic transaction counts....
Bitcoin owners are becoming a significant voting group in the United States, and their influence is poised to grow ahead of the 2026 midterm elections. Following their noticeable role in the 2024 pres...
In a recent intrusion, the notorious cybercriminal collective accessed CyberArk vaults and obtained more 1,400 secrets, subverted Azure, VMware, and Snowflake environments, and for the first known tim...
Polymarket’s growth fuels USDC demand, with stablecoins driving high-velocity settlement activity....
EUR-based stablecoins to threaten USD counterparts by 2028, says LIAN Group’s Fiorenzo Manganiello....
The crypto exchange's new derivatives offering is regulated by the CFTC and will mirror the functions of the increasingly popular perpetual contracts currently not available in the U.S....
Starting June 9, 2025, Russian internet service providers (ISPs) have begun throttling access to websites and services protected by Cloudflare, an American internet giant. [...]...
Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system....
Though old news, U.S. inflation numbers from May were disappointing....
The Re7 Capital partnership marks latest push to scale World Liberty's stablecoin ecosystem on BNB Chain....
PayPal chief executive Alex Chriss said the United States remains far from widespread stablecoin adoption, telling Bloomberg TV on June 26 that consumers lack meaningful incentives to shift away from ...
Strong technical indicators propel Avalanche’s token to test key short-term resistance levels....
Volume spike and strategic buying patterns suggest strong bullish momentum as TON breaks key resistance levels....
A critical NetScaler ADC and Gateway vulnerability dubbed "Citrix Bleed 2" (CVE-2025-5777) is now likely exploited in attacks, according to cybersecurity firm ReliaQuest, seeing an increase in suspici...
Putting a vulnerability debt figure together involves work, but having vulnerability debt figures lets you measure real-world values against your overall security posture....
After breaking below the ascending flag pattern, Ethereum has retraced to retest the broken trendline. Should the selling at this level pressure intensify, a deeper decline toward the $2K support zone...
The past week was a wild one at the cryptocurrency market but that’s also true for legacy markets as well. This just goes to show that the mounting institutional involvement in crypto is, in part, res...
Ripple (XRP) joined Filecoin (FIL) as an underperformer, declining 1.8% from Thursday....
The new feature enables faster, cheaper cross-border payments for merchants and shoppers, the company said....
Cyber operations have become critical to national security, but the United States has fallen behind in one significant area — exploit production — while China has built up a significant lead....
Midas’ mF-ONE, a blockchain-native investment certificate, is structured to track Fasanara’s F-ONE fund....
Meanwhile, XRP's price continues to struggle....
North Korea-linked attacks have resulted in over $1.6 billion in losses, a TRM Labs report released Friday said....
Pi2Day is supposed to be the Pi Day (March 14) times two....
Miners are earning less than at any point this year, but they’re still holding onto their coins....
Your day-ahead look for June 27, 2025...
[PRESS RELEASE – Victoria, Seychelles, June 27th, 2025] Leading global crypto exchange BYDFi will participate in Seoul Meta Week 2025: METACON (SMW2025), taking place from June 26–27 at the 3rd floor ...
[PRESS RELEASE – Dubai, UAE, June 27th, 2025] Bybit, the world’s second-largest cryptocurrency exchange by trading volume, has launched an exclusive limited-time event empowering users to buy crypto w...
Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets are no longer keeping pace. Today’s security leaders are ex...
Mixed on-chain signals and highlight market uncertainty....
A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou, and DeepSeek to deliver Sainbox RAT and the open-source Hidden rootkit. The activity h...
Ahold Delhaize, one of the world's largest food retail chains, is notifying over 2.2 million individuals that their personal, financial, and health information was stolen in a November ransomware atta...
SUI bounced near $2.58 as Nasdaq-listed Lion Group revealed plans to acquire SUI, SOL and HYPE for its crypto treasury....
Canadian public firm begins trading, commits to bitcoin-backed institutional services....
XRP's 30-day annualized realized volatility has dropped to 44%, the lowest since November, indicating reduced price fluctuations....
Threat intelligence firm GreyNoise is warning of a "notable surge" in scanning activity targeting Progress MOVEit Transfer systems starting May 27, 2025—suggesting that attackers may be preparing for ...
Microsoft has released the KB5060829 preview cumulative update for Windows 11 24H2, which includes 38 changes, including improvements to the taskbar and a new PC-to-PC migration experience. [...]...
American grocery wholesale giant United Natural Foods (UNFI) reports that it has restored its core systems and brought online the electronic ordering and invoicing systems affected by a cyberattack. [...
As tensions in the Middle East rise, hacktivist groups are coming out of the woodwork with their own agendas, leading to notable shifts in the hacktivist threat landscape....
Hawaiian Airlines, the tenth-largest commercial airline in the United States, is investigating a cyberattack that has disrupted access to some of its systems. [...]...
A British national arrested earlier this year in France was charged by the US Department of Justice in connection with a string of major cyberattacks....
The Federal Trade Commission (FTC) has approved $126,000,000 in refunds to be sent to 969,173 Fortnite players as part of a settlement over allegations that Epic Games tricked users into making unwant...
A total of 689 printer models from Brother, along with 53 other models from Fujifilm, Toshiba, and Konica Minolta, come with a default administrator password that remote attackers can generate. Even w...
New South Wales police in Australia have arrested a 27-year-old former Western Sydney University (WSU) student for allegedly hacking into the University's systems on multiple occasions, starting with ...
Cisco has published a bulletin to warn about two critical, unauthenticated remote code execution (RCE) vulnerabilities affecting Cisco Identity Services Engine (ISE) and the Passive Identity Connector...
A Kansas City man has pleaded guilty to hacking multiple organizations to advertise his cybersecurity services, the U.S. Department of Justice announced on Wednesday. [...]...
Scattered Spider recently pivoted from targeting worldwide retailers to U.S. based insurance firms, with no signs of slowing down. Learn about Scattered Spider TTPs and how to defend your organization...
In today's cyber battlefield, resilience starts with readiness, and the cost of falling short increases by the day....
Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could permit an unauthenticated attacker t...
The ClickFix social engineering tactic as an initial access vector using fake CAPTCHA verifications increased by 517% between the second half of 2024 and the first half of this year, according to data...
A flaw in ResupplyFi’s contract allowed an attacker to manipulate token prices and drain $9.6 million from its wstUSR market....
SaaS Adoption is Skyrocketing, Resilience Hasn’t Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of man...
Zero-knowledge proofs are a game-changing innovation with profound implications for how users transact business, but can they replace the conventional contract?...
Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since at least July 2023 using a mix of open-source and publicly available ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Fortinet FortiOS, to its Known Exploite...
Israel's cyber pros are having to put theory into practice, as a notorious nation-state APT sponsored by Iran targets them with spear-phishing attacks....
Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution Meta AI to summarize unread messages in chats. The feature, called...
Organizations are moving away from the public cloud and embracing a more hybrid approach due to big changes over the past five years....
Though rudimentary and largely non-functional, the wryly named "Skynet" binary could be a harbinger of things to come on the malware front....
As the definition of machine identities broadens, AI agents working on behalf of users and gaining access to various services blurs the lines of non-human identities even more....
A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, scanner, and label-maker models made by manufactur...
Dark Reading Confidential Episode 7: Cyber experts Tom Parker and Jake Williams offer their views on the practical impact of cuts to the US Cybersecurity and Infrastructure Security Agency....
New research has uncovered continued risk from a known security weakness in Microsoft's Entra ID, potentially enabling malicious actors to achieve account takeovers in susceptible software-as-a-servic...
The emerging group has already gotten its teeth into 16 victims since May with its double extortion tactics, claiming victims in 11 countries, including the US, Thailand, and Taiwan....
The servers that connect AI with real-world data are occasionally wide-open channels for cyberattacks....
Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-6543, carries a CVSS score o...
Malicious actors are exploiting AI-fabricated software components — presenting a major challenge for securing software supply chains....
Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could have enabled attackers to acces...
The company has patched two vulnerabilities in its Graphical User Interface that would have allowed attackers to grab data from a user's input history feature....
Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published online by a pro-Iranian hacktivist group called Cyber Fattah. Cybersecurity company Resec...
If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk. A gap in access control in Microsoft Entra’s subscription handling is allowing guest users to...
Fuzzland says a former employee used insider access and malware to exploit Bedrock’s UniBTC protocol, resulting in $2 million in losses....
Unknown threat actors have been distributing a trojanized version of SonicWall's SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it. "NetExtender en...
Cybercrime accounts for more than 30% of all reported crime in East Africa and West Africa, with online scams, ransomware, business email compromise, and digital sextortion taking off....
Microsoft on Tuesday announced that it's extending Windows 10 Extended Security Updates (ESU) for an extra year by letting users either pay a small fee of $30 or by sync their PC settings to the cloud...
Nobitex, Meta Pool, Bankroll Network, CoinMarketCap, Hacken...
A threat actor hacked a version of SonicWall's NetExtender SSL VPN application in an effort to trick users into installing a Trojanized version of the product....
The campaign infected devices in the US and Southeast Asia to build an operational relay box (ORB) network for use as an extensive cyber-espionage infrastructure....
The United States Embassy in India has announced that applicants for F, M, and J nonimmigrant visas should make their social media accounts public. The new guideline seeks to help officials verify the...
America's largest steel producer initially disclosed the breach in May and took potentially affected systems offline to investigation the intrusion and contain any malicious activity....
Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets. The methods take advantage of the design of various common mining topologies in ord...
Trust no longer comes from network boundaries alone but from continuously validating and protecting data and identities at every interaction....
Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into the login pages that harvest their credentials. Positive Technologies,...
The Canadian Center for Cybersecurity has confirmed that the Chinese state-sponsored cyber-threat actor targeted one of its telecommunications companies in February via a Cisco flaw, as part of global...
I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn’t have asked for a better kickoff panel: three cybersecurity leaders who don’t just talk...
The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns. The development was first reported by Axio...
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked Salt Typhoon actors to breach maj...
Like its predecessor, SparkCat, the new malware appears to be going after sensitive data — such as seed phrases for cryptocurrency wallets — in device photo galleries....
An AI security researcher has developed a proof of concept that uses subtle, seemingly benign prompts to get GPT and Gemini to generate inappropriate content....
IBM is integrating its governance and AI security tools to address the risks associated with the AI adoption boom....
Citrix is recommending its customers upgrade their appliances to mitigate potential exploitation of the vulnerabilities....
After President's Trump decision to enter the US into the conflict in the Middle East, the Department of Homeland Security expects there to be an uptick in Iranian hacktivists and state-sponsored acto...
Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable respo...
The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites as part of the Iran–Israel war that commenced on June 13, 2...
The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners....
Honeypot scams lure crypto investors into buying tokens they can’t sell, locking their funds through smart contract tricks....
In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship....
Trezor warned of ongoing phishing attempts exploiting its support contact form....