Key takeawaysThe December 2025 Trust Wallet hack shows that vulnerabilities in crypto tools can affect crypto-friendly SMEs, even when attacks target individual users rather than ...
Trust Wallet said it has identified 2,596 compromised addresses following its Christmas Day exploit as investigators work to separate real victims from false claims. Trust Wallet has moved into a ...
Coinbase Commerce hack (2024) linked wallet came back to life after nearly two years of inactivity. On-chain data shows the attacker began moving funds in January 2026. In the fresh moves, it ...
Trust Wallet says attackers stole roughly $7 million in cryptocurrency from nearly 3,000 wallet addresses after compromising its Chrome browser extension. The incident occurred when attackers ...
Crypto exchange Upbit recently claimed that it had identified and fixed a major codebase vulnerability found in its internal digital wallet system and platform while carrying out an urgent probe into ...
An attendee takes a photo of the Google wallet application screen during a news conference unveiling the mobile payment system in New York May 26, 2011. REUTERS/Shannon Stapleton (UNITED STATES - Tags ...
On Thursday, Trust Wallet announced a “security incident” affecting version 2.68 of its Chrome extension. Binance founder Changpeng Zhao confirmed that Trust Wallet “will cover” the losses and that ...
Every week, Information Security Media Group rounds up cybersecurity incidents in digital assets. This week, Paxful's $4M AML penalty, Coinbase's agentic AI wallets, a $1M fraud indictment, a 20-year ...
El Salvador Bitcoin wallet hack, Binance sued again, Tether to block payments to sanctioned entities
In today’s episode, we have some huge stories from the past 24 hours from every corner of crypto. Jack Dorsey’s Block is developing a full Bitcoin mining system that could increase efficiency for ...
A breach at web infrastructure provider Vercel is forcing crypto teams to rotate API keys and do a deep inspection of their underlying code. In a bulletin, Vercel said the hacker was able to grab ...
An iPhone exploit allows bad actors to conduct high-value transactions from your locked phone. Here’s the simple step you ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results