y0news
AnalyticsDigestsSourcesTopicsRSSAICrypto

#security News & Analysis

510 articles tagged with #security. AI-curated summaries with sentiment analysis and key takeaways from 50+ sources.

510 articles
AIBullishGoogle AI Blog · Mar 177/10
🧠

Our latest investment in open source security for the AI era

Google announces new investments in open source security specifically designed for the AI era. The company is developing new tools and building code security solutions to address emerging security challenges in AI development.

Our latest investment in open source security for the AI era
AI × CryptoBullisharXiv – CS AI · Mar 177/10
🤖

TAS-GNN: A Status-Aware Signed Graph Neural Network for Anomaly Detection in Bitcoin Trust Systems

Researchers developed TAS-GNN, a novel Graph Neural Network framework specifically designed to detect fraudulent behavior in Bitcoin trust systems. The system addresses critical limitations in existing anomaly detection methods by using a dual-channel architecture that separately processes trust and distrust signals to better identify Sybil attacks and exit scams.

$BTC
AI × CryptoNeutralDecrypt – AI · Mar 167/10
🤖

IBM Opens Quantum Hardware to Researchers as Bitcoin Security Threat Looms

IBM is expanding access to its quantum computing processors for researchers and developers. This development comes as the cryptocurrency community prepares for potential future threats quantum computing may pose to Bitcoin's current cryptographic security systems.

IBM Opens Quantum Hardware to Researchers as Bitcoin Security Threat Looms
$BTC
CryptoNeutralCoinDesk · Mar 167/10
⛓️

U.S., UK, Canada start Operation Atlantic to disrupt crypto approval-phishing scams

The U.S., UK, and Canada have launched Operation Atlantic, a coordinated international law enforcement initiative to combat crypto approval-phishing scams. The operation specifically targets fraudulent schemes that exploit cryptocurrency approval mechanisms to deceive investors and steal funds.

U.S., UK, Canada start Operation Atlantic to disrupt crypto approval-phishing scams
CryptoBearishDL News · Mar 167/10
⛓️

Crypto thief teens trigger helicopter manhunt after bomb threat

Two French teenagers were arrested after allegedly kidnapping a family of cryptocurrency owners and making bomb threats, triggering a helicopter manhunt by police. The incident highlights the growing security risks facing crypto holders as criminals increasingly target them for their digital assets.

Crypto thief teens trigger helicopter manhunt after bomb threat
DeFiBearishProtos · Mar 167/10
💎

Inside DeFi 008: A 99.93% loss, and are DAOs done?

A DeFi user suffered a catastrophic 99.93% loss worth nearly $50 million in a single swap transaction. The article also examines the declining popularity and effectiveness of DAOs in the cryptocurrency space, alongside security developments in DeFi.

Inside DeFi 008: A 99.93% loss, and are DAOs done?
AI × CryptoNeutralBitcoinist · Mar 167/10
🤖

Is AI Killing Bitcoin Mining? Here’s The Truth

A debate is emerging over whether AI data centers, which can pay more for electricity than Bitcoin miners, pose a threat to Bitcoin's long-term security. Market and energy specialists are pushing back against claims that this dynamic threatens Bitcoin mining viability.

Is AI Killing Bitcoin Mining? Here’s The Truth
$BTC
CryptoBearishCryptoPotato · Mar 157/10
⛓️

CertiK Report Reveals Surging Crypto ATM Fraud With $333M Lost in 2025

A CertiK report reveals that crypto ATM fraud has surged dramatically, resulting in $333 million in losses during 2025. The fraud exploits crypto ATMs' minimal verification requirements and fast transaction processing, allowing criminals to quickly convert cash into digital assets before victims can detect the fraudulent activity.

CertiK Report Reveals Surging Crypto ATM Fraud With $333M Lost in 2025
CryptoBearishCryptoPotato · Mar 157/10
⛓️

Ethereum Users Warned as USDT Dust Attacks Jump 612%

Ethereum dust attacks involving USDT have surged by 612%, with USDC transfers also experiencing significant increases. Researchers are issuing warnings to Ethereum users about this spike in malicious small-value transactions designed to compromise privacy and track wallet addresses.

Ethereum Users Warned as USDT Dust Attacks Jump 612%
$ETH
CryptoNeutralBlockonomi · Mar 157/10
⛓️

Bitcoin Network Can Survive 92% of Global Submarine Cable Failures, Study Finds

A new study reveals Bitcoin's network resilience to submarine cable failures, showing it can survive 72-92% of global cable outages during random failures. However, targeted attacks on high-betweenness cables could fragment the network with only 20% damage, and hosting provider failures pose significant risks with just 5% capacity loss.

$BTC
AI × CryptoBearishCoinTelegraph · Mar 127/10
🤖

Crypto ATM losses surge 33% in 2025 as AI superpowers scams: CertiK

Crypto ATM losses increased by 33% in 2025, with AI technology being used to enhance and superpower scamming operations. CertiK identifies crypto ATMs as the most accessible extraction method for scammers to convert stolen funds.

Crypto ATM losses surge 33% in 2025 as AI superpowers scams: CertiK
CryptoBearishCoinTelegraph · Mar 127/10
⛓️

MediaTek patches bug enabling crypto seed theft in just 45 seconds

Ledger's security team discovered a critical vulnerability in MediaTek's secure boot chain that allows attackers to steal cryptocurrency seed phrases from Android devices in just 45 seconds. MediaTek has since patched the security flaw that could have compromised sensitive crypto wallet information on affected Android devices.

MediaTek patches bug enabling crypto seed theft in just 45 seconds
AIBearisharXiv – CS AI · Mar 127/10
🧠

MCP-in-SoS: Risk assessment framework for open-source MCP servers

Researchers have developed a risk assessment framework for open-source Model Context Protocol (MCP) servers, revealing significant security vulnerabilities through static code analysis. The study found many MCP servers contain exploitable weaknesses that compromise confidentiality, integrity, and availability, highlighting the need for secure-by-design development as these tools become widely adopted for LLM agents.

← PrevPage 4 of 21Next →