Crypto 2025: invisible hackers, billions lost, a rogue state involved... What if your wallet was the next silent victim?
Crypto 2025: invisible hackers, billions lost, a rogue state involved... What if your wallet was the next silent victim?
Solana has resisted one of the most intense DDoS attacks ever recorded on a public blockchain, peaking at 6 terabits per second. The network remained stable, with no interruptions or notable degradation. This inadvertent test, occurring amid recurring technical tensions in the ecosystem, marks a turning point. Long criticized for its instabilities, Solana today shows robustness that could change its position in the hierarchy of decentralized infrastructures.
Algorithms decide what we see, but according to which rules? Vitalik Buterin, co-founder of Ethereum, directly challenges Elon Musk and denounces the opacity of X (ex-Twitter). In a context of mistrust towards centralized platforms, he proposes a radical alternative: auditing X’s algorithm thanks to blockchain and ZK-proofs. A strong stance that revives the debate on the governance of social networks in the Web3 era.
During his notable appearance on The Joe Rogan Experience on December 3, 2025, Jensen Huang delivered a striking assessment. The head of Nvidia (NVDA), now the world's most valuable company at $4 trillion, considers artificial intelligence to be a new industrial revolution. But this revolution comes with major security challenges.
Elon Musk and the EU face off in an unprecedented duel after a historic $140 million fine. Between tech regulation, geopolitical tensions, and American support, this clash redefines digital rules. Who will emerge victorious from this war?
As the DeFi protocol Balancer suffers a devastating $128 million hack in less than 30 minutes on November 3, 2025, the crypto industry faces an existential question: how can blockchain infrastructure defend against both today's sophisticated exploits and tomorrow's quantum threats? With DeFi protocols losing over $3.1 billion in 2025 alone, Naoris Protocol emerges as a pioneering solution, having processed over 98 million post-quantum transactions and mitigated 463 million cyber threats on its testnet. The protocol's innovative Sub-Zero Layer architecture and Dilithium-5 cryptography represent a fundamental shift in how the industry approaches security, transforming every device into a defensive node rather than a potential vulnerability.
At PEPE, memes were promised, not malware. The result? A hacked site, emptied wallets, and a resurrected hacking tool. Everything is swimming in crypto-cacophony!
A fake developer, real spies, and US tech trapped: arrested, Vong inadvertently revealed how Pyongyang hacks America without firing a single rocket.
European regulators are increasing pressure on cybercrime networks as they target services that conceal the movement of digital funds. A coordinated action supported by Europol has taken down Cryptomixer, a long-running platform used to mask crypto transactions on the clear web and the dark web. Authorities report that the site handled more than a billion euros over the past decade and became a prominent method for laundering illicit proceeds.
An arithmetic bug, billions of tokens, a hurried hacker… and Yearn retrieving $2.4M in commando mode. In the crypto jungle, treasure hunts are intensifying.
A hacker, a forgotten division, and nine million vanished... The arithmetic falters, the vaults empty, and Yearn's coders mourn their yETH. Crypto drama or bad comedy?
Crypto faced a tough November, losing $127M to hacks and attacks, with DeFi platforms hit hardest and $45M recovered.
Upbit admitted a wallet flaw led to a recent hack and authorities suspect the North Korean Lazarus group is behind the attack.
Upbit’s Solana wallet was breached, prompting the exchange to pledge full reimbursement and move remaining assets to secure storage.
The global cybersecurity market is projected to reach $345 billion by 2026, yet traditional security models continue to fail spectacularly. The recent Balancer protocol incident, which saw $128 million drained in under 30 minutes through a mathematical rounding error, exemplifies a fundamental problem: centralized security architectures create single points of catastrophic failure. As quantum computing advances threaten to render current encryption obsolete within the decade, a new economic model for digital security is emerging, one where trust itself becomes a tradeable, measurable commodity.
Cardano’s network briefly split into two chains after a developer error, prompting emergency fixes and involvement from authorities.
A touch of AI, a pinch of bug, a blockchain going haywire: Cardano exposes its flaws. The crypto is still coughing, but in a very muted silence.
A major Cloudflare outage on Tuesday caused widespread disruptions across crypto platforms and several major websites. Service interruptions spread quickly as users struggled to load exchange portals, block explorers, and analytics tools. Early reports from affected firms indicated that Cloudflare error messages were appearing across front-end interfaces.
While the shadow of the quantum computer looms over digital security, could bitcoin really waver? Faced with the hypothesis of a network made vulnerable by machines capable of breaking SHA 256, opinions diverge. Some anticipate an imminent threat, others temper their expectations. Among them, Adam Back, a figure of the cypherpunk movement and CEO of Blockstream, invites nuance. His reading, both technical and strategic, repositions the debate on concrete grounds, far from catastrophic scenarios, while posing the real questions about the future resilience of the protocol.
As states tighten their control over cryptos, an old bitcoin theft resurfaces amid a geopolitical rivalry. LuBian, a Chinese mining pool, reportedly lost more than 127,000 BTC in 2020. Remaining discreet for years, the case suddenly resurfaces as Beijing now accuses the United States of having seized these funds, now valued at over 14 billion dollars, through an intelligence operation. The suspicion of a state confiscation reignites tensions between two superpowers.
Facing a historic wave of cyberattacks shaking the crypto ecosystem, a French company captures global attention. Ledger, a pioneer of physical wallets, records rapid growth as individuals and institutions seek safe havens. Driven by this explosive demand, the company now plans a stock market debut in New York, a strategic decision embraced, described by its CEO as the new epicenter of crypto capital.
Europe has just dealt a decisive blow against one of the largest crypto scams ever dismantled. Over 600 million euros embezzled through fake investment platforms, nine arrests in three countries, and an operation conducted swiftly under Eurojust's coordination. This cross-border crackdown unveils the alarming scale of criminal networks exploiting blockchain to launder funds out of sight. A case that confirms the urgency of a judicial response commensurate with the crypto challenges.
When Kim Jong-un becomes HR at Upwork, GitHub hosts viruses, and AI disguises thieves… the crypto sphere realizes its worst nightmares are already among us.
Eleven audits, a brilliant architecture, but 128 million gone... The crypto-miracle Balancer falls hard. Who said code was better than a good old banker?
Lobanova joins fellow speakers Eric Trump, Tristan Thompson, Iggy Azalea & a host of blockchain leaders for the Miami Conference on November 5-6th
In a universe where security determines the survival of projects, each update becomes a maturity indicator. Shibarium, the layer 2 solution of the Shiba Inu project, is initiating a critical overhaul of its infrastructure. The goal is to fix an exposed vulnerability and restore trust in a pressured ecosystem. This technical transition, far from trivial, redefines the robustness standards required in DeFi.
Musk, the man who sleeps less than an Ethereum server, attacks WhatsApp with X Chat, encrypted messaging Bitcoin-style. Advertisers and GAFAM, hide your hooks, it's going to encrypt hard!
As blockchain security becomes a central issue for regulators, institutions, and users, Cardano reveals a major evolution: Phalanx. This update to the Ouroboros protocol aims to neutralize grinding attacks, a vulnerability highlighted in Proof-of-Stake systems. Through this announcement, the network intends to reinforce its cryptographic foundations and assert its ability to anticipate the technical challenges weighing on decentralization.
Naoris Protocol was recently cited in a U.S. SEC filing as a reference model for quantum-resilient blockchain infrastructure.
With 0VM live and enabling Ghost Layer—the world’s first secure, global confidential value-transfer layer—Silent Protocol delivers on its mission: to encrypt Ethereum.