Friday, December 1, 2023

Latest From Category

by Nathan Sialah

A hacker exploited compromised API keys at Kronos Research, a quantitative trading firm, making off with a substantial $25 million in crypto assets Kronos …

by Ken Mutuku

Trust Wallet later developed its native token, the Trust Wallet Token, available on the BEP-2 (Binance Chain) and BEP-20(Binance Smart Chain) standards TWT(Trust Wallet …

by Ken Mutuku

Phishing attacks predate the Web3, and Web2 eras. Experts believe that the attack’s first …

by Ken Mutuku

Bitcoin is built on the notion that crypto miners validate data or transactions through …

by Ken Mutuku

Crypto hardware wallets are the best way to safeguard crypto. A hardware wallet is …

by Ken Mutuku

An overlook caused Ronnins crypto cyber security attack in a previous transaction Poly network …

latest blog posts

by Ken Mutuku

The PSA was an overarching regulatory structure for traditional and crypto exchanges. The MAS promptly issued the Notice PSN02 …

by Ken Mutuku

The Nigeria Police Force has arrested Wilfred Bonse, a Nigerian Politician, in connection to a crypto hack involving Patricia …

by Ken Mutuku

HTX crypto exchange and blockchain protocol, Heco Chain, experienced another crypto hack, further damaging the organization’s reputation. The first …

by Nathan Sialah

Crypto analytics platform Nansen faced a phishing campaign where scammers exploited user data from a prior breach, targeting users …

Web3 Africa

Community

We believe that the most important thing in the Blockchain revolution is the ability of people to understand and embrace the change. Our journalism standards – impartiality, truthfulness, transparency, and accuracy – will help you navigate this extremely dynamic world.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?