News
Stay up to date on the latest crypto trends with our expert, in-depth coverage.

1Amazon is Considering a $9 Billion Deal to Acquire Satellite Communications Company Globalstar. Here's Why Amazon, Apple, and Tesla Investors Should Pay Attention.2Exxon’s Guyana-Permian Engine Fuels 21% Earnings Growth—Is the 24 P/E Already Discounting a Squeeze?3Bitcoin’s Movement Compared to Oil’s Rally: Evaluating a Risk-Off Scenario

Iran Crisis Puts Defense Technology Industry to the Test: Can It Rapidly Expand Amid Conflict?
101 finance·2026/04/03 11:33

Alphabet's Gemini Pricing Restructuring: Examining Financial Streams and Market Sentiment
101 finance·2026/04/03 11:33

BWiGA Awards: Unraveling How Capital and Focus Move
101 finance·2026/04/03 11:33

Bitcoin 'done' with 85% crashes, says Cathie Wood amid new $34K target
Cointelegraph·2026/04/03 11:30


Village Farms Set to Address Cannabis Supply Gap with Launch of Delta 2 Expansion
101 finance·2026/04/03 11:24

Trex’s $233M Investment in Arkansas: Vertical Integration May Protect Margins Against Resin Price Fluctuations
101 finance·2026/04/03 11:24

Flex (FLEX) Outperforms Sector After Q4 Beat—Now Hinged on Full-Year Guidance Execution
101 finance·2026/04/03 11:18

EURC/USDC Stalls at 1.1544 as Narrow Bands Signal Impending Move
101 finance·2026/04/03 11:18

Google’s Quantum Research: A Turning Point for Crypto Market Liquidity
101 finance·2026/04/03 11:15
Flash
11:35
Monad co-founder releases a 10-point protocol security self-checklist, highlighting key risks in multi-signature and permission management.According to Odaily, Monad co-founder Keone Hon published a protocol security self-checklist on X, focusing on core issues such as administrative authority, fund security, and multisig mechanism design. The main points include the following ten items: 1. Clearly identify which admin functions may lead to fund loss; 2. Ensure all relevant operations have timelock settings; 3. Establish a real-time monitoring mechanism; 4. Issue timely alerts when admin functions are called; 5. Review all privileged accounts and adopt a multisig (k-of-n) structure whenever possible; 6. Clearly define signature threshold parameters; 7. Multisig signers should use independent cold devices strictly for signing operations and follow best practices (such as independently verifying transaction hashes); 8. Set withdrawal rate limits and ensure they are not controlled by the same multisig group; 9. Ensure employee devices have malware detection and management capabilities; 10. Preset extreme scenarios where multisig signers are compromised, reverse engineer potential attack paths from an attacker's perspective, and optimize system design accordingly to increase the cost and complexity of attacks.
11:30
Mitsui O.S.K. Lines, a Japanese shipping company, said an LNG carrier passed through the Strait of HormuzBlockBeats News, April 3rd, according to Reuters, Japan's shipping company Mitsui O.S.K. Lines said on Friday that one of its Japanese liquefied natural gas carriers has passed through the Strait of Hormuz.
A spokesperson for Mitsui O.S.K. Lines said that the crew on board the Panama-flagged vessel "SOHAR LNG" is currently safe, but did not disclose the specific time of passage through the strait or whether any form of negotiation had taken place regarding the passage.
11:25
CertiK: 46 security incidents recorded in March with losses of approximately 39.8 million dollars, the highest since November 2024Foresight News reported, according to CertiK monitoring, a total of 46 security incidents (excluding phishing) were recorded in March 2026, with total losses amounting to approximately $39.8 million. This is the highest number of recorded security incidents in a single month since November 2024. CertiK stated that after reaching a low point in Q3 2025, security incidents increased again in Q4 2025 and Q1 2026, with code vulnerabilities being increasingly exploited over the past two quarters.
News