Crypto Industry Lost Over $100M To Hacks And Exploits In April
The smart contract security platform Certik reported that April had been the most challenging period for the cryptocurrency sector. According…
The smart contract security platform Certik reported that April had been the most challenging period for the cryptocurrency sector. According…
Many Decentralized Finance (DeFi) protocols are built on Ethereum. However, increased traffic has caused the blockchain to become slow, prompting…
For many years, there have been several inequalities between women and men in terms of financial capabilities and work, among…
Forta, a Web3 security company that monitors on-chain assets for firms like Compound, Polygon, ZenGo, and Lido, has revealed that…
The crypto space is no stranger to monumental hacking incidents, with the digital asset industry losing more than $320 million…
Decentralized and centralized finance sectors are known to have complementary roles. Cryptocurrency industry experts state that the digital asset ecosystem…
Blockchain technology is divided into two: layer-1 and layer-2. Layer-1s can be described as underlying blockchains on which layer-2 networks…
The financial industry has been excited over central banks' successful testing of distributed ledger technology (DLT). The Bank of England…
Polygon Labs penned a letter petitioning the European Union that the Data Act bill as written could hamper efforts to…
ShibaSwap is a DeFi (decentralized finance) protocol that features a DEX (decentralized exchange) along with passive income-generating services such as…
Over the past week, Bitcoin crossed $30,000 for the first time in ten months. Further, the most awaited event on…
On April 16, the multi-chain lending protocol Hundred Finance announced a malicious attack launched on the Ethereum layer 2 scaling…
Euler Finance has announced plans to activate a redemption platform to refund customers their stolen assets. The lending company suffered…
The decision by Euler Finance to distribute the funds returned by the exploiter to its users is attracting attention from…