• Trezor and The Sandbox Issue Security Warnings
• Cronos Launches New DEX
• Three Japanese Banks Set to Test Stablecoins
Security News
Hardware crypto wallet provider Trezor warned its users about a new phishing attack targeting their private keys and their crypto investments. The attackers contact the victims via phone call, SMS and/or email to say that there’s been a security breach or suspicious activity on their Trezor account. Blockchain-based metaverse company The Sandbox issued a warning to users regarding a security breach, saying that an unauthorized third party accessed an employee’s computer and sent a fraudulent email to the platform’s users.
DeFi News
Cronos announced the launch of Fulcrom, a decentralized perpetual exchange aimed at professional traders. Users can trade leveraged positions for up to 25X with minimal fees and low price impact. Web3 services platform Chainlink announced the launch of Chainlink Functions, a new Web3 serverless developer platform. It enables developers to connect their decentralized applications (dapps) or smart contracts to any Web2 API and run custom computations on it in minutes using Chainlink’s network.
Stablecoin News
Three Japanese banks – the Tokyo Kiraboshi Financial Group, Minna no Bank, and The Shikoku Bank – will test stablecoins on an Ethereum-compatible blockchain called Japan Open Chain (JOC). This is part of an effort by the banks to develop digital versions of existing fiat currencies for settlement purposes in order to reduce costs related with traditional financial transactions.
Trezor Warning
Trezor warned its users about a new phishing attack targeting their private keys and their crypto investments. „The attackers contact the victims via phone call, SMS and/or email to say that there’s been a security breach or suspicious activity on their Trezor account,“ they said on Twitter. They urged users ignore these messages as they are not from Trezor.
The Sandbox Warning
The Sandbox issued a warning regarding a security breach where an unauthorized third party accessed an employee’s computer and sent fraudulent emails including hyperlinks which may have had malware installed remotely granting access over user information.