Connect with us

Coin Market

A simple tile game is spiking daily txs on Sui Network: Data platform

Published

on

Launched in October, Sui 8192 is a fully-on-chain tile-sliding puzzle game that records each move as a transaction on the Sui Network.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Coin Market

Your digital identity got stolen — Now what?

Published

on

By

What is digital identity?

Your digital identity is the fingerprint you leave across the internet, a living map of who you are.

Your digital identity is more than just your name or email; it stretches from your social media profiles and crypto wallet addresses to your device fingerprints and even the rhythms of your daily browsing habits. In the fast-moving world of cryptocurrency, where identity and financial access often overlap, digital identity theft isn’t just a nuisance; it’s an open door to your assets. 

Without strong protection, even small pieces of stolen information can be stitched into a full profile, giving cybercriminals everything they need to impersonate you, seize your funds or lock you out of your accounts.

What many don’t realize is how quickly this exposure happens. Every new wallet connection, exchange login, or saved payment method quietly expands your digital surface area. With each step, your data becomes more valuable and more vulnerable. In a landscape where information is currency, your cyber identity can become a jackpot for hackers who know how to cash it out.

Did you know? In 2025, experts estimate that over 50 billion digital identities could be compromised worldwide, a 22% jump from last year. Crypto users are among the biggest targets, especially on decentralized finance (DeFi) platforms without strong identity checks. Synthetic identity fraud is also exploding, hitting new crypto lending services the hardest.

How cybercriminals steal your digital identity

Cybercriminals blend technology and manipulation to pry open digital identities.

Phishing remains a common entry point, where fake websites or emails trick users into revealing passwords or seed phrases. Large personal data breaches leak databases of usernames, emails and credentials, fueling account takeover attacks across different services.

Hackers also exploit:

Synthetic identity fraud: combining real and fake data to create new identities.Social engineering attacks: manipulating users emotionally to voluntarily reveal sensitive information.Credential stuffing: using leaked passwords on other platforms, hoping users reused them.

Knowing how criminals exploit crypto markets and digital ecosystems can make it much harder to be tricked.

Stolen identity, sold forever on the dark web

Once your data is stolen, it often ends up for sale on the dark web, multiplying the threat.

Dark web identity theft is a thriving economy. Full identity profiles, including names, emails, Social Security Numbers (SSNs) and crypto keys can fetch high prices. Buyers may use the stolen identity immediately or resell it repeatedly, creating multiple waves of attacks months or even years later.

Even after you lock down your accounts, your leaked data can keep circulating in dark corners of the web. That’s why tools like dark web monitoring and breach alerts aren’t optional; they’re your long-term defense. Recovery isn’t a one-time fix. It’s a habit of staying alert and adapting.

Signs your digital identity has been stolen

Spotting the signs of identity theft early can stop criminals before they cause major damage.

Victims of cyber identity theft may notice strange transactions, denied logins or devices appearing that they don’t recognize. Sometimes the signs are financial — unauthorized credit card charges, changes in your crypto balances or unexpected loans under your name.

Key warning signs include:

Password reset requests you didn’t initiate.Locked-out accounts or sudden logouts across devices.New accounts or credit lines appearing on your financial history.Unexpected withdrawals or transfers from crypto wallets.

By catching the signs of identity theft early, you can shut down fraud before it spirals, and protect your money and your name.

What to do if your identity is stolen

Fast, clear action gives you the best chance to limit the damage from identity theft.

If you realize your identity has been stolen, the first priority is locking down access. Update your passwords across all platforms, enable two-factor authentication (2FA) protection, and revoke access to any suspicious sessions or devices. Most major exchanges, banks and crypto services allow you to temporarily freeze your accounts while you investigate.

Beyond immediate security steps, you should report the incident to authorities and file a case with your local cybercrime unit or financial protection agency. 

Using online help services can speed up your response plan. These initial moves through clear recovery steps are critical to regaining control before criminals spread the attack further.

Recovery steps after digital identity theft

Recovering from identity theft involves more than just securing your passwords; it’s a complete rebuild of your digital trust.

After locking down your accounts and alerting key institutions, you need to start active monitoring. This means regularly reviewing your bank statements, checking your crypto wallets for unauthorized transactions and inspecting your credit report for any new activity.

Some victims also pursue:

Filing fraud alerts or credit freezes with major credit agencies.Hiring professional identity recovery services.Exploring identity theft insurance to cover legal and investigative costs.

Full recovery can take months, but a systematic approach reduces financial and emotional damage.

How to protect your digital identity

Good security habits are the strongest defense against cybercriminals.

Crypto platforms and companies should adopt decentralized blockchain-based identity solutions. These systems ensure that your data remains secure, transparent and in your control, making it much harder for hackers to manipulate or steal your personal information.

Unlike centralized systems, blockchain-based identities are stored on a distributed ledger, reducing single points of failure and making it significantly more difficult for cybercriminals to gain unauthorized access. Furthermore, decentralized identity systems enable users to verify their identities without exposing sensitive personal data, allowing for more privacy and control over who sees their information.

For users, fortifying their digital identity isn’t about ticking boxes; it’s about building sharp habits that evolve with the risks. Here’s how to stay ahead:

Treat passwords like armor: Use strong, unique combinations for every account. A password manager can forge and guard them better than memory ever could.Double down with 2FA: One password isn’t enough, so add an extra lock on every door worth protecting, especially your finances and crypto.Practice digital minimalism: Every birthday, pet name or photo shared online can become ammo for hackers. Choose smart allies: Stick with crypto platforms that prioritize decentralized digital identity verification and real security, not just flashy promises.Watch, detect, respond: Set alerts and monitor your accounts. Spotting strange activity early can turn a disaster into a close call.Be stingy with your data: Only trust platforms that collect the bare minimum. If a site asks for too much, walk away.Avoid easy mistakes: Public WiFi is a hacker’s playground. Use a VPN when you connect, and regularly check if your credentials have leaked.

The less you reveal, the safer you stay. 

Update, review, repeat: Your digital identity depends on it

Maintaining your digital identity is a daily practice, not a one-time setup.

Regularly update your passwords and security settings. Review app permissions, device authorizations and wallet connections at least every few months. Incorporating biometric authentication (fingerprints or facial scans) adds a critical physical layer of protection beyond passwords.

Understanding how hackers manipulate crypto — from phishing for private keys to setting traps with fake decentralized applications (DApps) — is what keeps you a step ahead. In today’s world, staying sharp about cybersecurity isn’t optional. It’s a basic survival skill, right up there with managing your money or protecting your home.

The future will only become more digital and more decentralized. Defending your digital identity today means preserving your independence tomorrow.

Continue Reading

Coin Market

Bitcoin miner Phoenix Group adds 52 MW of mining capacity in Ethiopia

Published

on

By

Bitcoin mining firm Phoenix Group announced the addition of 52 megawatts (MW) worth of mining capacity to its capabilities in Ethiopia.

According to an April 29 announcement, with this latest addition, Phoenix’s Bitcoin mining capacity in Ethiopia reaches 132 MW. The firm’s global capacity now reportedly exceeds 500 MW.

Phoenix’s co-founder and CEO, Munaf Ali, said the firm’s strategy relies on “securing prime locations with abundant, low-cost energy.”

“Initiatives like our latest expansion in Ethiopia are pivotal steps, not only creating significant value today but also solidifying our position,” he said.

Related: Arkansas city rejects crypto mining proposal after community pushback

Building on previous agreements

The news follows Phoenix Group signing an agreement that secures the right to 80 MW of power in Ethiopia in January. An announcement published at the time noted that the new Bitcoin mining site was scheduled to go live in the second quarter of 2025.

The 52 MW site will be developed in two phases, with the first one using just 20 MW to power 5,300 air-cooled mining units with an expected hashrate of 1.2 exahashes per second. In the second phase — expected to reach completion by the end of Q2 2025 — the site will use the full 52 MW, water cooling, and produce an estimated 2.4 exahashes per second of hashrate.

An exahash is a unit of computational power used mainly to measure the speed of cryptocurrency mining networks, especially Bitcoin. Exahashes quantify how many trillions of calculations a mining network can perform per second.

Reza Nedjatian, the CEO of the firm’s mining, artificial intelligence and data center subsidiary, highlighted that the plant will be powered by renewable energy:

“With 132 MW now running on clean hydropower, we’re proud to set a new benchmark for sustainable mining in Africa and deliver large-scale operations in energy-rich regions.”

Related: LAPD recovers $2.7M worth of Bitcoin miners stolen in airport heist

A fast-burn company

Phoenix Group became a publicly-traded company following its late 2023 listing on the Abu Dhabi Securities Exchange. The firm successfully closed its initial public offering (IPO) with an oversubscription of 33 times, reporting that its offer of 907,323,529 shares saw “overwhelming demand.”

Following the listing, Phoenix Group shares rapidly rose by 50% following the $371 million IPO, opening at 2.25 dirhams ($0.6) and rapidly reaching 1.50 dirhams ($0.41). At the time of writing, shares are trading at around $7.94.

Phoenix Group share price chart. Source: Google Finance

The firm is known for its large-scale mining initiatives, having acquired $187 million worth of Bitcoin mining equipment in a single transaction in early 2024.

Bitcoin mining is not the only activity the firm is involved in.

In 2024, Tether, the largest stablecoin provider in the digital asset industry, announced plans to launch a new stablecoin pegged to the United Arab Emirates dirham. Tether partnered with Phoenix Group and Green Acorn Investments on the project.

Magazine: AI may already use more power than Bitcoin — and it threatens Bitcoin mining

Continue Reading

Coin Market

Circle gets Abu Dhabi regulatory nod to expand in Middle East

Published

on

By

USDC stablecoin issuer Circle has received in-principle approval (IPA) from the Financial Services Regulatory Authority (FSRA) of the Abu Dhabi Global Market (ADGM), the company announced on April 29.

The approval moves Circle closer to obtaining a full Financial Services Permission (FSP) license, allowing it to operate as a regulated money services provider in the United Arab Emirates, the firm said in an official press release.

Jeremy Allaire, Circle’s Co-Founder and CEO, said the approval “advances our strategy to establish deep roots in markets embracing the onchain economy.” He added:

“It also underscores Circle’s enduring commitment to global stablecoin oversight—strengthening trust, compliance, and adoption worldwide, while laying a resilient foundation for the internet financial system.”

Comments from Circle CEO and Chief of Market Development at ADGM regarding the regulatory nod. Source: PR

Related: Circle files for Initial Public Offering planned for April

Circle partners with Hub71

In addition to regulatory progress, Circle announced a partnership with Hub71, Abu Dhabi’s tech ecosystem. As part of the collaboration, the two firms plan to work together on projects within ADGM’s digital regulatory sandbox.

Circle will also join Hub71’s digital assets group, sharing its experience with a community of more than 500 tech startups and investors.

Circle’s flagship USDC token is the second-largest stablecoin in terms of market capitalization. As of now, there are $62.03 billion USDC (USDC) tokens in circulation, according to data from CoinMarketCap.

Meanwhile, Circle has been pushing into new global markets amid rising interest in stablecoins.

In July 2024, Circle became the first global stablecoin issuer to comply with the European Union’s Markets in Crypto-Assets (MiCA) regulation.

In Japan, Circle expanded its presence through a partnership with SBI Holdings. On March 26, 2025, SBI VC Trade, a subsidiary of SBI Holdings, launched USDC trading, making it the first stablecoin approved under Japan’s regulatory framework.

Related: Circle executive denies claims of seeking US banking license

UAE aims to position itself a major Web3 hub

The United Arab Emirates has been actively working to establish itself as a global Web3 hub, leveraging progressive regulation and strategic partnerships to attract leading digital asset firms.

In August 2024, the country ranked third in a crypto adoption index released by Henley & Partners, an investment migration consultancy firm.

On April 6, Dubai’s real estate and crypto regulatory authorities signed a new agreement aimed at expanding digital asset adoption in the real estate sector. The agreement will link Dubai’s real estate registry with property tokenization through a governance system. 

Magazine: Bitcoin price consolidation likely as US Core PCE, manufacturing, and jobs reports print this week

Continue Reading

Trending