#blockchain-analysis

[ follow ]
#crypto-laundering
fromnews.bitcoin.com
2 weeks ago
Cryptocurrency

Chainalysis Details 'Shadow Crypto Economy' Exposure as Grinex Suspends Operations

Grinex's shutdown reveals crypto laundering tactics that evade typical enforcement actions, raising concerns about illicit fund movements.
fromcointelegraph.com
9 months ago
Cryptocurrency

Crosschain swaps move $21B in illicit funds, up 200% in two years: Elliptic

Illicit crypto transactions via crosschain swaps have surged to $21.8 billion in 2023, with 12% linked to North Korea.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Chainalysis Details 'Shadow Crypto Economy' Exposure as Grinex Suspends Operations

Grinex's shutdown reveals crypto laundering tactics that evade typical enforcement actions, raising concerns about illicit fund movements.
#cryptocurrency
fromThe Verge
3 months ago
New York Islanders

Former NYC Mayor Eric Adams accused of $2.5 million crypto 'rug pull' as his NYC Token crashes

fromThe Verge
3 months ago
New York Islanders

Former NYC Mayor Eric Adams accused of $2.5 million crypto 'rug pull' as his NYC Token crashes

fromwww.theguardian.com
3 months ago

On Polymarket, privileged' users made millions betting on war strikes and diplomatic strategy. What did they know beforehand?

In the early hours of 13 June, more than 200 Israeli fighter jets began pummeling Iran with bombs, lighting up the Tehran skyline and initiating a 12-day war that would leave hundreds dead. But for one user of the prediction market Polymarket, it was their lucky day. In the 24 hours before the strike occurred, they had bet tens of thousands of dollars on yes on the market Israel military action against Iran by Friday? when the prospect still seemed unlikely and odds were hovering at about 10%. After the strike, Polymarket declared that military action had been taken, and paid the user $128,000 for their lucky wager.
World news
fromTechCrunch
6 months ago

North Korean hackers stole over $2 billion in crypto so far in 2025, researchers say | TechCrunch

"The actual figure may be even higher. Attributing cyber thefts to North Korea is not an exact science," reads the blog post.
Information security
fromHackernoon
9 months ago

How a Three-Phase Detector Identifies Smart Contract Vulnerabilities | HackerNoon

The Vulnerability Detector analyzes contract states through three phases: Whitelisted Verification Examination, External Call Check, and Post-call State Modifications to identify exploitable vulnerabilities.
Software development
[ Load more ]