Looking for love lost $36.9 million to crypto scammers: A story of how Axis Digital turned sweet words into stolen coins and laundered it all to Cambodia.
Security News

Blockchain and cryptocurrency security is essential. After all, an autonomous monetary system can only go so far if it can be easily exploited by hackers, rendered inoperable through a mere software bug, or shut down by the powers that be.
Bitcoin’s unique security model is possible through a clever alignment of incentives between the network’s stakeholders — miners, developers, merchants and users. Any attempt to capture the network or reorganize the chain would result in the value of the currency plummeting and thus render any intended benefit completely worthless. The cost of being a bad actor significantly outweighs any possible reward.
Thus, it is in every participant’s best interest to simply play by the rules and collectively work toward the maturation and adoption of the Bitcoin (BTC) ecosystem.
Since its launch in January 2009, the Bitcoin network has never been compromised at the base layer and has had virtually 0% downtime, making it one of the most secure computer systems on the planet.
Cryptocurrency wallets, applications and exchanges that build products and services atop Bitcoin and other crypto networks, however, have frequently been the target of hacks and scams, highlighting the ongoing need to establish best practices around cybersecurity and operational security.
- Explained
- News
The attacker behind the $40 million GMX exploit has begun returning the stolen crypto after accepting a $5 million white hat bounty offered by the GMX team.
2760 - News
The Venn Network team suspects the threat was linked to the North Korean Lazarus Group, citing its complexity and widespread deployment.
3418 - Use Case
How scammers exploit SIM swaps to drain crypto wallets and what tools can help protect against this rising threat.
30205 - News
A fake GitHub repository posing as a Solana trading bot was used to distribute obscured malware that stole crypto wallet credentials, according to cybersecurity firm SlowMist.
5117 - Explained
More than 16 billion passwords were leaked in 2025, not from a single breach, but from years of silent malware infections.
- How to
Address poisoning attacks involve tracking, misusing or compromising cryptocurrency addresses.
16163 - Explained
Quantum computing could enable the reverse engineering of private keys from publicly exposed ones, putting the security of Bitcoin holders at risk.
- News
In a media interview, Chair Paul Atkins pledged to empower businesses to innovate through tokenization.
10608 - News
A flaw in ResupplyFi’s contract allowed an attacker to manipulate token prices and drain $9.6 million from its wstUSR market.
2680 - Explained
Zero-knowledge proofs are a game-changing innovation with profound implications for how users transact business, but can they replace the conventional contract?
- News
Fuzzland says a former employee used insider access and malware to exploit Bedrock’s UniBTC protocol, resulting in $2 million in losses.
31017 - Analysis
Honeypot scams lure crypto investors into buying tokens they can’t sell, locking their funds through smart contract tricks.
97800 - News
Trezor warned of ongoing phishing attempts exploiting its support contact form.
4545 - Defined
How do crypto scammers exploit trust, greed and sophisticated techniques to drain assets? And what measures can be taken to strengthen defenses in the digital asset space?
27238