Tech
Coinbase Announces Launch Date for Its Innovative Base Protocol
Coinbase, one of the leading cryptocurrency platforms in the world, has announced the testnet launch of Base, a new Ethereum Layer 2 (L2) network that aims to bring the next billion users to web3. It is a secure, low-cost, developer-friendly solution that allows anyone to build decentralized applications (dapps) on-chain.
Base is built on top of Optimism, an open-source project that enables scaling Ethereum using optimistic rollups. It leverages the underlying security of Ethereum, along with Coinbase’s best practices, to enable users to easily and safely access Base from Coinbase, Ethereum L1, and other interoperable chains.
Coinbase Aims to Onboard One Billion People Worldwide
Base is designed to be a home for Coinbase’s on-chain products and an open ecosystem where anyone can build. Developers can benefit from seamless Coinbase product integrations, easy fiat onramps, and powerful acquisition tools that enable them to reach the 110M+ verified users and access $80B assets on the platform in the Coinbase ecosystem.

It also offers full EVM equivalence at a fraction of the cost and is committed to pushing forward the developer platform. For example, developers can set up gasless transactions for their dapps with easy APIs for account abstraction, and securely build multichain applications with easy-to-use bridges.
The protocol aims to be decentralized, permissionless, and open to anyone with the vision of creating a standard, modular, rollup agnostic Superchain powered by Optimism. Coinbase is joining Optimism as a Core Dev on the open-source OP Stack, and working to create a thriving community of other developers. It has no plans to issue a new network token. Developers can get started building on Base today at base.org.
By offering a secure, low-cost, developer-friendly Ethereum L2 network that is empowered by Coinbase and open source, Base hopes to enable anyone, anywhere, to build dapps that can scale and reach mass adoption. It is expected to launch its mainnet later this year.
The post Coinbase Announces Launch Date for Its Innovative Base Protocol appeared first on The Cryptocurrency Post.
Crypto
China Already Has the Compute to Train Mythos-Level AI, Says Nvidia CEO
Nvidia CEO Jensen Huang has warned that China already has the infrastructure and computing power needed to train advanced AI models comparable to Anthropic’s Claude Mythos, raising concerns about potential cybersecurity risks.
Speaking on the Dwarkesh Patel podcast, Huang said the level of compute used to train Mythos is not particularly rare and is already widely available in China.
China’s AI Infrastructure Is “Abundant”
Huang emphasized that the type of hardware and capacity required to build a model like Mythos is not out of reach for China.
“The amount of capacity and the type of compute it was trained on is abundantly available in China,” he said, adding that the country already has access to the necessary chips and infrastructure.
He pointed out that China has significant unused data center capacity, describing it as having “enormous” compute resources, including fully powered but underutilized facilities.
According to Huang, China’s broader advantages include producing around 60% of the world’s mainstream chips, having a large share of global AI researchers, and access to substantial energy resources.
Rising Concerns Over AI and Cybersecurity
The warning comes amid growing concerns about the capabilities of Anthropic’s Claude Mythos model.
The AI system has demonstrated the ability to identify thousands of software vulnerabilities across major operating systems and browsers. Reports suggest that a large portion of these vulnerabilities remain unpatched, increasing the risk of exploitation.
Security researchers have also found that the model can autonomously execute complex, multi-step cyberattacks, tasks that would typically take human experts days to complete.
If a similar model were developed and misused, it could pose serious risks to global cybersecurity, particularly for institutions relying on outdated systems.
Call for Cooperation Over Confrontation
Despite the concerns, Huang cautioned against treating China purely as an adversary.
While acknowledging geopolitical tensions, he argued that collaboration and dialogue around AI development may be a more effective approach to managing risks.
“We want the United States to win,” Huang said, “but having research dialogue is probably the safest path forward.”
US Officials Highlight AI Competition
Meanwhile, US Treasury Secretary Scott Bessent recently described Claude Mythos as a major leap forward in AI capabilities, suggesting it strengthens the US position in the global AI race.
However, the rapid pace of development on both sides underscores the competitive and high-stakes nature of the sector.
Growing Evidence of AI Misuse
Concerns about misuse are not purely theoretical. Anthropic previously reported that a China-linked group attempted to exploit its AI coding tools to target dozens of global organizations, succeeding in some cases.
As AI systems become more powerful and accessible, experts warn that the line between innovation and risk is becoming increasingly thin.
Tech
New AI cybercrime tool breaches banking KYC systems using advanced deepfake technology
According to data published by Dark Web Informer, the actor Jinkusu is marketing an AI cybercrime tool capable of compromising security in 200,000 fraud cases via deepfakes. This fraudulent kit allows bypassing identity verification protocols on financial platforms, marking a critical turning point in protecting today’s global digital assets efficiently.
The system employs cutting-edge technology to perform real-time face swaps with alarming precision and speed. By integrating tools such as InsightFace, attackers achieve fluid gesture transfers that effectively deceive traditional biometrics in real-time. Since these methods evolve rapidly, trust in remote identification processes is currently under an unprecedented technical threat within the global financial infrastructure.
Jinkusu’s sophistication redefines global synthetic identity fraud
Unlike conventional impersonation methods, Jinkusu utilizes sophisticated voice modulation algorithms to personify legitimate users. This capability allows cybercriminals to bypass auditory security layers in banking institutions, generating a structural vulnerability in modern financial systems today. Despite regulatory efforts, the accessibility of these tools democratizes organized crime on a massive and dangerous scale.
Deddy Lavid, an executive at a leading platform in the blockchain sector, warns about the ecosystem’s systemic shortcomings. The expert points out that artificial intelligence drastically lowers barriers to synthetic identity fraud, making the platforms’ front doors a critical failure point. Therefore, it is imperative to adopt a layered security approach that combines verification with proactive monitoring.
Technical analysis performed by Vecert Analyzer reveals a worrying tactical transition compared to previous cycles. While 2022 attacks focused on basic phishing, in 2026 we observe a complete automation of social engineering through deep neural networks globally. This metamorphosis of the attack vector suggests that static defense methods have become obsolete against these dynamic adversaries.
How does artificial intelligence alter the current cryptographic security landscape?
Investors faced historical losses worth 5.5 billion dollars during the last fiscal year alone. These data, linked to psychological manipulation schemes, demonstrate the lethal effectiveness of combining social engineering and technology advanced artificial. Since the software does not require deep technical knowledge, the volume of potential attacks could scale exponentially during the current financial economic cycle.
The same actor, Jinkusu, has been previously linked to the launch of the dangerous Starkiller phishing kit. This malware uses a headless Chrome browser inside a Docker container, allowing to intercept credentials through a real-time reverse proxy invisibly. Although total losses from traditional attacks recently decreased, AI cybercrime keeps the alert level at maximum throughout the global markets.
The evolution of these AI cybercrime tools suggests that visual validation no longer guarantees authenticity. The use of reverse proxies and automated browsers allows attackers to replicate legitimate sessions with fidelity that current firewalls cannot detect. However, cybersecurity companies are already working on AI-based anomaly detection models to counter this growing criminal trend.
The future of security in the cryptographic environment will depend exclusively on the integration of autonomous defenses. Platforms must implement systems that not only verify the static image but also analyze behavioral patterns and network metadata suspiciously and continuously. Proactive surveillance and the constant updating of biometric detection engines will be the pillars of digital resistance moving forward.
The post New AI cybercrime tool breaches banking KYC systems using advanced deepfake technology appeared first on The Cryptocurrency Post.
Tech
The DarkSword exploit on iOS 18 compromises cryptocurrency wallets across six platforms
Google researchers have detected the DarkSword exploit on iOS 18 devices affecting versions 18.4 through 18.7, according to the Google Threat Intelligence report. This exploit chain utilizes six critical vulnerabilities to inject the Ghostblade malware, which extracts sensitive data from six exchange platforms and multiple digital wallets without leaving any apparent trace.
The intrusion chain is activated when users access compromised web portals that execute arbitrary code in the background. This silent process leverages flaws in the system’s rendering engine to install malicious components without requiring direct interaction from the owner of the affected device. The sophistication of DarkSword demonstrates a level of engineering previously reserved for government-level espionage operations.
Mobile espionage reaches critical levels of technical precision
Once inside the Apple environment, the Ghostblade component scans the system for centralized exchange applications such as Binance and Kraken. The objective is to capture login credentials and session tokens that allow total control over the user’s funds. This surgical approach minimizes system alerts, allowing the data extraction to occur within a matter of seconds.
The danger extends to self-custody solutions, including cold and hot wallets such as MetaMask, Ledger, and Phantom. By intercepting seed phrases and private keys during transaction processes, the malware nullifies the inherent security of physical storage for digital assets. The vulnerability puts the financial integrity of both retail and institutional investors at significant risk today.
Beyond financial data, the exploit extracts personal metadata including call logs, Wi-Fi passwords, and browsing cookies. This massive exfiltration capability allows for much more effective subsequent social engineering attacks against the victim. The collection of health and location data adds an extremely intrusive dimension of personal surveillance for any mobile user.
How does DarkSword alter the security paradigm for mobile devices?
From a technical perspective, Ghostblade introduces a tactical innovation based on the volatility of its files within the internal storage. After completing the data transfer to external command centers, the program automatically deletes its traces to avoid detection by mobile security tools. This ephemeral behavior makes it extremely difficult to create effective detection signatures at this time.
The geographic distribution of the campaign suggests advanced coordination, affecting critical infrastructure in nations such as Ukraine and Saudi Arabia. In these cases, the impersonation of legitimate government portals to spread the virus among the civilian population has been observed. This “watering hole” tactic maximizes the infection rate by abusing pre-existing institutional trust.
Historically, the blockchain sector has been the target of massive attacks such as the one recorded by Inferno Drainer, which stole nine million dollars. However, DarkSword represents a superior threat by acting directly on the operating system, differing from conventional phishing scams. The scale of this new risk demands a complete re-evaluation of security protocols.
To mitigate these risks, it is imperative that Apple device users install the latest security patches immediately. Reliance on SMS-based two-factor authentication should be reduced, opting instead for physical security keys or independent authentication apps. It is vital to prevent intrusions via software from unverified sources to maintain financial sovereignty.
The future of mobile security will depend on the manufacturers’ ability to close zero-day gaps before their exploitation. Meanwhile, constant monitoring of data flows and the use of isolated environments for cryptographic transactions are recommended measures. The industry must prepare for a new era of persistent threats that challenge the closed architecture of iOS continuously.
The post The DarkSword exploit on iOS 18 compromises cryptocurrency wallets across six platforms appeared first on The Cryptocurrency Post.
-
Crypto4 years agoCardalonia Aiming To Become The Biggest Metaverse Project On Cardano
-
Press Release5 years agoP2P2C BREAKTHROUGH CREATES A CONNECTION BETWEEN ETM TOKEN AND THE SUPER PROFITABLE MARKET
-
Blockchain6 years agoWOM Protocol partners with CoinPayments, the world’s largest cryptocurrency payments processor
-
Press Release5 years agoETHERSMART DEVELOPER’S VISION MADE FINTECH COMPANY BECOME DUBAI’S TOP DIGITAL BANK
-
Press Release5 years agoProject Quantum – Decentralised AAA Gaming
-
Blockchain6 years agoWOM Protocol Recommended by Premier Crypto Analyst as only full featured project for August
-
Press Release5 years agoETHERSMART DEVELOPER’S VISION MADE FINTECH COMPANY BECOME DUBAI’S TOP DIGITAL BANK
-
Blockchain6 years ago1.5 Times More Bitcoin is purchased by Grayscale Than Daily Mined Coins
