Tech


Tech

'Copycats' Stole $88M During Nomad Exploit by Copying Attacker's Code: Coinbase

Over 88% of the addresses involved in the $190 million Nomad attack likely belonged to users copying a code that was initially used by the exploiters.

Elliptic says RenBridge was used to launder $540 million in illicit funds. (Charlie Green/Unsplash)

Tech

Cardano's Vasil Upgrade Is Delayed Again for More Testing

The hard fork has been pushed back by at least “a few more weeks” until testing is complete, developers said.

Time on clock stop by nail delay concept

Tech

Ethereum’s Mainnet Tenth 'Shadow Fork' Goes Live Ahead of September Merge

Developers focused this time on testing key releases similar to the ones in the upcoming Goerli merge – the final testnet hard fork before the real Ethereum Merge.

(Sikranta H. U./Unsplash)

Tech

Harmony Proposes Issuing ONE Tokens to Reimburse Victims of $100M Hack

Developers decided against using treasury funds, citing the project’s long-term viability.

(Shutterstock)

Opinion

To Use or Hold? Solving the Classic Crypto Conundrum With a Dual Token Model

Where blockchain is concerned, two really can be better than one.

(Chris Liverani/Unsplash)

Tech

Matter Labs Schedules zkSync 2.0 Mainnet Launch for October

As Ethereum scaling competition heats up, Matter Labs says it will bring the first EVM-compatible ZK rollup to market.

Matter Labs says it will bring the first EVM-compatible ZK rollup to market. (Shutterstock)

Tech

Crema Finance Attacker Returns Almost $8M, Keeps $1.7M Bounty

The protocol had more than $9 million worth of cryptocurrencies stolen from its platform over the weekend in a flash loan attack.

(Boonchai Wedmakawand/Getty Images)

Tech

Ethereum Scaling System Immutable X Allowing Ether-to-Dollar Withdrawals

The tool is one of the first layer 2 services to allow users to take out U.S. dollars.

The Financial Action Task Force wants to outlaw dirty money flows through crypto. (Richard Levine/Corbis/ Getty Images)

Tech

Chainlink’s Smart Contract Products Go Live on Fantom

Two protocols, Keepers and VRF, will allow developers to deploy more sophisticated applications on the Fantom network.

(Unsplash)