Celer Network, a blockchain and cross-layer platform, said on July 11, 2024 (9:38 am EST), that it thwarted an attempt to take over its domains. The platform claimed it recovered all the Domain Name System (DNS) records. An investigation found the attack vector likely involved third parties beyond Celer Network’s control. Celer Network assured users […]
Coinshares Expands US Footprint Through Strategic Takeover of Valkyrie and Its Array of ETFs
On Friday, Coinshares International Limited, announced that the firm has acquired Valkyrie Funds LLC, the U.S.-based digital asset manager. The Saint Helier company said the decision comes after a direct result of Valkyrie’s spot bitcoin exchange-traded fund (ETF) approval. Coinshares Amplifies U.S. Market Influence With Key Acquisition Coinshares detailed on Jan. 12, 2024, that the […]
SEC Sues Musk to Make Him Testify in Twitter Takeover Investigation
U.S. Securities and Exchange Commission (SEC) is trying to force Elon Musk to testify in its probe into his purchase of Twitter, now X. After some back and forth, the billionaire investor bought the social media platform for $ 44 billion in October 2022 and the SEC’s probe is focused on Twitter shares he …
Report: Hodlnaut’s Judicial Managers Oppose OPNX Takeover
According to a recent court filing, interim judicial managers for the troubled crypto lender Hodlnaut oppose a takeover by the crypto firm OPNX, which is linked to the now-defunct crypto hedge fund Three Arrows Capital and its founders. OPNX Takeover Faces Resistance from Hodlnaut’s Judicial Management On September 19, 2023, Bloomberg’s Suvashree Ghosh reported on […]
MalCare, Blogvault, and WPRemote Plugins Patch Vulnerabilities Allowing Site Takeover Through Stolen API Credentials
Snicco, a WordPress security services provider, has published an advisory on a vulnerability in the MalCare plugin, which is active on more than 300,000 sites. “MalCare uses broken cryptography to authenticate API requests from its remote servers to connected WordPress sites,” WordPress security researcher Calvin Alkan said. “Requests are authentication by comparing …