A boastful hacker, a dubious federal contract, and millions in crypto gone: when family cyber-arrogance turns Washington into the stage for a burlesque digital burglary.
A boastful hacker, a dubious federal contract, and millions in crypto gone: when family cyber-arrogance turns Washington into the stage for a burlesque digital burglary.
The French make USB keys, the Americans make billions: Ledger crosses the Atlantic, hoping Wall Street will finally open the vaults of global crypto-finance for it.
In a network where every line of code can become a manifesto, the slightest technical signal takes on the appearance of a political declaration. BIP 110, supported by a growing fraction of Bitcoin nodes, illustrates this internal tension. Behind this seemingly minor proposal lies a clear intention: to tighten control over data insertion into the blockchain and defend a stricter vision of the protocol.
While quantum computers sharpen their circuits, Ethereum brings out the heavy artillery: cryptographers, millions, and devnets. The blockchain wants to last a hundred years, even if it ages before us.
The security of crypto data falters once again. The French platform Waltio, specializing in tax declarations, was the victim of a massive leak of sensitive information. In response, an investigation was opened by the French authorities, mobilizing the National Gendarmerie. This incident rekindles concerns about the vulnerability of services related to cryptos, including those outside the blockchain. As the use of tax tools becomes widespread, users' trust is severely tested.
At the Devconnect conference in Buenos Aires, Ethereum's co-founder issued an unprecedented warning: the elliptic curves securing Bitcoin and Ethereum 'are going to die.' With a 20% probability that quantum computers could break current cryptography before 2030, the crypto industry has less than four years to migrate to quantum-resistant systems.
Saga, a Layer-1 blockchain protocol, has paused its Ethereum-compatible SagaEVM chainlet after a $7 million exploit triggered unauthorized fund transfers. The attack involved assets being bridged out of the network and swapped into Ether. Although the affected chainlet remains offline, Saga says the broader network continues to operate normally.
Ethereum, the engine of blockchain innovation, faces a major challenge: its growing complexity. Vitalik Buterin, co-founder of the network, warns about protocol congestion, an excess of complexity that threatens Ethereum's efficiency and security. To address this, he proposes a radical solution: simplifying the code by removing superfluous elements. However, this approach raises questions: can Ethereum be lightened without compromising its core principles of decentralization and trust?
In the world of cryptocurrencies, hacks have become events that are both frequent and dramatic. The main data is clear: nearly 80% of hacked crypto projects never fully recover, even after fixing their technical vulnerabilities. This means that most protocols experiencing a major attack remain permanently weakened — financially and in terms of trust.
An explosive case shakes the crypto market: three Polymarket whales targeted for suspicious bets on Venezuela. Details here!
Two major cybersecurity incidents shook user confidence in late 2024: $7 million stolen via a compromised Chrome extension at Trust Wallet, and another personal data leak at Ledger. As attacks multiply, the industry is exploring radically different approaches to secure the ecosystem. In Brief Trust Wallet…
Reports of a potential large-scale Instagram data leak have sparked widespread concern, as cybersecurity researchers and Meta offer sharply different accounts of what occurred. While a security firm claims millions of user records are being sold online, Meta insists its systems were not breached. The conflicting narratives have left many users uncertain about the safety of their accounts.
A crypto user known as “The Smart Ape” lost about $5,000 from a hot wallet during a short hotel stay. No phishing links were opened, and no fake sites were used. Instead, a chain of small missteps created the conditions for a delayed wallet drain. Security researchers say the case shows how everyday actions, both online and offline, can combine into a serious loss.
Ledger users are being targeted by a new phishing campaign following a data breach at Global-e, a third-party e-commerce provider used by the hardware wallet company. Attackers are using stolen order information to send personalized scam emails that impersonate Ledger and promote false claims of a merger with rival wallet maker Trezor.
Crypto phishing losses dropped 83% in 2025, with fewer victims and smaller attacks, yet new wallet scams and evolving threats continue to challenge users.
Ilya Lichtenstein, involved in the theft of approximately 119,756 BTC on Bitfinex, says he was released from prison earlier than expected thanks to the First Step Act, a law passed under Donald Trump. He spent just over a year behind bars, although he had been sentenced to five years.
In crypto, good resolutions never last: barely January has started, wallets are already siphoned, insiders suspected, and MetaMask emails clicking where it hurts...
Trust Wallet suspends its Chrome extension after a $7 million hack. Why is this crucial update postponed? What are the risks for users? Analysis of vulnerabilities, impacts, and urgent measures to protect your crypto assets in 2026.
Coinbase pays for justice, not ransom. Data leak, arrest in India, bounty for whistleblowing... courtroom crypto-comedy in several acts.
Polymarket has just confirmed that a security flaw affected certain user accounts. It indicates that a vulnerability related to a third-party authentication provider allowed unauthorized access and resulted in losses for several victims. The platform states it has fixed the problem and indicates there is no longer any persistent risk.
Stealka malware targets browsers and crypto wallets, stealing data while disguised as game hacks and mods.
Adam Back has pushed back against growing concerns over quantum computing, arguing that while Bitcoin should prepare for the future, the technology is still far from posing a real threat.
When Grayscale tells us everything is fine for bitcoin, Naoris draws its anti-quantum shield. What if the enemy is not who we think it is?
Crypto 2025: invisible hackers, billions lost, a rogue state involved... What if your wallet was the next silent victim?
Solana has resisted one of the most intense DDoS attacks ever recorded on a public blockchain, peaking at 6 terabits per second. The network remained stable, with no interruptions or notable degradation. This inadvertent test, occurring amid recurring technical tensions in the ecosystem, marks a turning point. Long criticized for its instabilities, Solana today shows robustness that could change its position in the hierarchy of decentralized infrastructures.
Algorithms decide what we see, but according to which rules? Vitalik Buterin, co-founder of Ethereum, directly challenges Elon Musk and denounces the opacity of X (ex-Twitter). In a context of mistrust towards centralized platforms, he proposes a radical alternative: auditing X’s algorithm thanks to blockchain and ZK-proofs. A strong stance that revives the debate on the governance of social networks in the Web3 era.
During his notable appearance on The Joe Rogan Experience on December 3, 2025, Jensen Huang delivered a striking assessment. The head of Nvidia (NVDA), now the world's most valuable company at $4 trillion, considers artificial intelligence to be a new industrial revolution. But this revolution comes with major security challenges.
Elon Musk and the EU face off in an unprecedented duel after a historic $140 million fine. Between tech regulation, geopolitical tensions, and American support, this clash redefines digital rules. Who will emerge victorious from this war?
As the DeFi protocol Balancer suffers a devastating $128 million hack in less than 30 minutes on November 3, 2025, the crypto industry faces an existential question: how can blockchain infrastructure defend against both today's sophisticated exploits and tomorrow's quantum threats? With DeFi protocols losing over $3.1 billion in 2025 alone, Naoris Protocol emerges as a pioneering solution, having processed over 98 million post-quantum transactions and mitigated 463 million cyber threats on its testnet. The protocol's innovative Sub-Zero Layer architecture and Dilithium-5 cryptography represent a fundamental shift in how the industry approaches security, transforming every device into a defensive node rather than a potential vulnerability.
At PEPE, memes were promised, not malware. The result? A hacked site, emptied wallets, and a resurrected hacking tool. Everything is swimming in crypto-cacophony!