logo

Лента

11 Июн 2025

Crypto asset reserve bill lands in Ukraine’s parliament

While authorizing the National Bank of Ukraine to allocate crypto assets like Bitcoin as part of state reserves, the draft bill does not oblige the authority to do so.

11 Июн 2025

87 deepfake scam rings taken down across Asia in Q1 2025: Report

A new report from Bitget, SlowMist and Elliptic highlights the severity of deepfake scams, urging both individuals and organizations to adopt more stringent preventive measures.

11 Июн 2025
11 Июн 2025

Mystery whale opens $300M leveraged Bitcoin bet: James Wynn alt account?

The mysterious $300 million leveraged Bitcoin long comes days after Wynn’s second $100 million leveraged Bitcoin position was liquidated, causing a near $25 million loss.

11 Июн 2025

From ownership to opportunity, Web3 is still on a mission to reshape music

Cointelegraph and Audius are launching a remix contest to spotlight how decentralized platforms are empowering artists and redefining creative ownership to reshape the music industry.

11 Июн 2025

Investment giant Guggenheim taps Ripple to expand digital debt offering

Guggenheim’s Treasury-backed fixed-income product will be available on the XRP Ledger.

11 Июн 2025

How to use Grok for real-time crypto trading signals

Grok scans posts and sentiment shifts on X to help crypto traders identify early signals, memes and macro-driven momentum plays.

11 Июн 2025

Franklin Templeton launches ‘intraday yield’ for tokenized assets on Benji

Yield for assets is often calculated over at least one-day periods, a problem that blockchain composability could address, according to the asset manager.

11 Июн 2025

Fortune 500’s interest in stablecoins triples from last year: Coinbase

Nearly 30% of the 100 executives at a Fortune 500 firm said their company has plans or is interested in stablecoins, up from 8% who said the same last year.

11 Июн 2025

Librarian Ghouls hacker group targeting Russians to mine crypto

Cybersecurity firm Kaspersky says the Librarian Ghouls may be hacktivists, based on their reliance on legitimate, third-party utilities, a technique commonly associated with similar groups.