News
14 Feb 2026, 14:10
Vitalik Buterin Unveils Revolutionary Vision for Personalized Prediction Markets That Could Transform Financial Hedging

BitcoinWorld Vitalik Buterin Unveils Revolutionary Vision for Personalized Prediction Markets That Could Transform Financial Hedging Ethereum founder Vitalik Buterin has unveiled a groundbreaking vision for personalized prediction markets that could fundamentally reshape how individuals manage financial risk and potentially challenge traditional currency systems. Speaking from his global research base in early 2025, Buterin identified critical flaws in current prediction market ecosystems while proposing an AI-driven framework that personalizes financial hedging based on individual spending patterns and risk exposures. Vitalik Buterin’s Critique of Current Prediction Market Dynamics Buterin recently articulated significant concerns about prediction market evolution on major social platforms. He observed that these markets demonstrate unhealthy convergence toward easily marketable topics rather than socially valuable information. Current prediction markets frequently prioritize sensational subjects over meaningful economic indicators, according to his analysis. This trend creates environments where participants often act as naive traders or simple information buyers rather than sophisticated risk managers. Historical context reveals that prediction markets have existed in various forms for centuries, with modern decentralized versions gaining prominence through platforms like Augur and Polymarket. However, Buterin’s critique suggests these implementations have drifted from their original purpose of aggregating wisdom and managing risk. Instead, they increasingly resemble speculative gambling venues with limited social utility. This observation aligns with academic research from institutions like the Cambridge Centre for Alternative Finance, which has documented similar trends in decentralized prediction market development. The Evolution from Trader to Hedger Buterin proposes a fundamental shift in how participants should engage with prediction markets. He advocates for users to evolve beyond basic trading mentalities toward becoming sophisticated hedgers who actively manage personal and professional risks. This transformation represents a significant departure from current market behaviors, where participants typically seek profit through directional bets rather than risk mitigation. To illustrate this concept, Buterin provided a concrete example involving biotech investments. An individual holding substantial biotech stocks could hedge against political risk by betting on the victory of political parties whose policies might negatively impact the industry. This approach transforms prediction markets from speculative tools into practical risk management instruments. Financial experts note this application resembles traditional options hedging but with greater accessibility and customization potential through blockchain technology. The Technical Framework for Personalized Prediction Markets Buterin’s vision extends beyond conceptual critique to propose a detailed technical framework. His system would create comprehensive price indices for all major goods and services, establishing prediction markets for each category. A local large language model would then analyze individual spending patterns with privacy-preserving techniques, generating personalized baskets of prediction market shares that mirror expected future consumption. This architecture presents several innovative components: Comprehensive Price Indices: Blockchain-based indices tracking thousands of goods and services Privacy-First AI Analysis: Local LLMs processing spending data without central storage Personalized Market Baskets: Custom portfolios matching individual consumption patterns Automated Hedging Mechanisms: Continuous rebalancing based on spending changes The technical implementation would likely leverage Ethereum’s existing infrastructure, including zero-knowledge proofs for privacy and smart contracts for automated execution. This approach aligns with ongoing developments in decentralized identity and verifiable credentials, which could enable secure personal data analysis without compromising privacy. Potential Impact on Traditional Financial Systems Buterin’s proposal carries profound implications for traditional financial systems, particularly in the realm of currency and hedging instruments. By creating personalized hedging mechanisms tied directly to consumption patterns, the system could theoretically reduce reliance on fiat currency for certain financial functions. This development represents a natural extension of cryptocurrency’s original vision as an alternative financial system rather than merely a speculative asset class. Financial historians note parallels between this concept and historical attempts to create consumption-based currencies, though previous implementations lacked the technological infrastructure for personalization at scale. The integration of AI analysis with blockchain-based markets creates unprecedented possibilities for customized financial instruments. Regulatory experts anticipate significant discussion around how such systems would interact with existing financial regulations, particularly concerning derivatives markets and consumer protection frameworks. Implementation Challenges and Technical Considerations Realizing Buterin’s vision presents substantial technical and practical challenges. Creating accurate price indices for all major goods and services requires robust oracle systems with reliable real-world data feeds. Privacy-preserving AI analysis necessitates advanced cryptographic techniques to ensure personal spending data remains secure while still enabling useful analysis. Market liquidity represents another critical concern, as personalized hedging requires sufficient trading volume across numerous prediction markets. Key Implementation Requirements for Personalized Prediction Markets Component Technical Requirement Current Status Price Indices Decentralized oracle networks with high-frequency data Partially developed Privacy AI Local LLMs with zero-knowledge capabilities Early research stage Market Liquidity Automated market makers across thousands of markets Theoretical frameworks exist User Interface Intuitive dashboards for non-technical users Prototype development Despite these challenges, several projects within the Ethereum ecosystem are already working on related technologies. Privacy-preserving machine learning, decentralized oracle networks, and automated market makers have all seen significant development in recent years. The convergence of these technologies could potentially enable Buterin’s vision within the next decade, according to blockchain researchers at institutions like the Ethereum Foundation and academic centers studying decentralized systems. Broader Implications for Decentralized Finance This proposal represents a significant evolution in decentralized finance (DeFi) philosophy. While current DeFi applications primarily focus on replicating traditional financial instruments like lending and trading, Buterin’s vision points toward entirely new financial primitives enabled by blockchain technology. Personalized prediction markets could create novel forms of social coordination and risk distribution that lack equivalents in traditional finance. Economic theorists suggest such systems might address certain market failures in traditional insurance and hedging markets, particularly for risks that are difficult to quantify or hedge through conventional means. The ability to create customized financial instruments for individual consumption patterns could democratize access to sophisticated risk management tools previously available only to institutional investors. This development aligns with broader trends in financial technology toward personalization and accessibility. Ethical Considerations and Social Impact Buterin’s proposal raises important ethical questions about financial system design and social responsibility. Personalized hedging systems could potentially exacerbate wealth inequality if accessible only to technologically sophisticated users. The social value of prediction markets remains debated, with critics arguing they might incentivize harmful behaviors or create perverse incentives around certain outcomes. Privacy represents another critical concern, as spending pattern analysis requires access to sensitive personal data. Buterin’s emphasis on local AI processing addresses some privacy concerns, but implementation details will determine actual privacy protections. Regulatory compliance presents additional challenges, as prediction markets occupy complex legal positions in many jurisdictions, often intersecting with gambling, securities, and derivatives regulations. Despite these concerns, proponents argue that well-designed prediction markets could enhance social welfare by improving information aggregation and risk distribution. The potential to hedge against personal economic risks could provide stability for individuals facing volatile income or expenses. Academic researchers continue to study these questions through controlled experiments and theoretical modeling, though real-world implementation will provide the ultimate test of Buterin’s vision. Conclusion Vitalik Buterin’s vision for personalized prediction markets represents a significant conceptual advancement in both blockchain technology and financial system design. His critique of current prediction market dynamics identifies real limitations in existing implementations, while his proposed framework offers innovative solutions through AI personalization and comprehensive market coverage. The potential transformation from speculative trading to practical hedging could fundamentally change how individuals interact with financial markets, particularly in managing personal economic risks. While technical and regulatory challenges remain substantial, the core ideas align with broader trends toward financial personalization and decentralized system design. As blockchain technology continues to mature and AI capabilities advance, Buterin’s vision for personalized prediction markets may gradually transition from theoretical proposal to practical implementation. This development could ultimately contribute to more resilient and accessible financial systems, though careful attention to ethical considerations and social impact will remain essential throughout the development process. FAQs Q1: What are personalized prediction markets according to Vitalik Buterin? Buterin envisions AI-driven systems that analyze individual spending patterns to create custom baskets of prediction market shares, enabling personalized financial hedging against specific consumption risks. Q2: How do personalized prediction markets differ from current prediction platforms? Current platforms focus on speculative trading of popular topics, while Buterin’s vision emphasizes practical risk management through personalized hedging tied directly to individual economic exposures. Q3: What technology would power these personalized prediction markets? The system would combine blockchain-based price indices, local AI analysis of spending patterns, privacy-preserving cryptography, and automated market makers across thousands of prediction categories. Q4: Could personalized prediction markets replace traditional currency? Buterin suggests they could reduce reliance on fiat currency for certain functions by creating alternative mechanisms for managing consumption-based risks, though complete replacement remains speculative. Q5: What are the main challenges to implementing this vision? Key challenges include creating reliable price indices, ensuring privacy in spending analysis, maintaining liquidity across numerous markets, developing intuitive interfaces, and navigating complex regulatory environments. Q6: How would personalized prediction markets benefit ordinary users? They could provide accessible hedging against personal economic risks, democratizing sophisticated risk management tools previously available mainly to institutional investors and wealthy individuals. This post Vitalik Buterin Unveils Revolutionary Vision for Personalized Prediction Markets That Could Transform Financial Hedging first appeared on BitcoinWorld .
14 Feb 2026, 13:30
Blockchain Lender Figure Suffers Devastating Data Breach After Insider-Enabled Hack

BitcoinWorld Blockchain Lender Figure Suffers Devastating Data Breach After Insider-Enabled Hack In a stark reminder of persistent cybersecurity threats, blockchain-based lending platform Figure confirmed a significant data breach this week, exposing sensitive customer information after hackers infiltrated its systems. The incident, reportedly involving the notorious ShinyHunters group and an insider, resulted in 2.5 GB of personal data being leaked on the dark web following a failed ransom negotiation. This breach highlights critical vulnerabilities at the intersection of traditional finance and decentralized technology, raising urgent questions about data protection protocols in the rapidly evolving digital asset sector. Figure Data Breach Timeline and Attack Vector Figure’s security incident unfolded through a multi-stage attack that cybersecurity analysts describe as sophisticated. Initially, threat actors gained unauthorized access to internal systems. Reports from cybersecurity monitoring firms indicate the breach involved credential compromise. The hacking group ShinyHunters, known for targeting financial technology companies, subsequently claimed responsibility for the attack. Investigators discovered evidence suggesting insider assistance facilitated the initial penetration. Consequently, the attackers exfiltrated approximately 2.5 gigabytes of customer data. Figure’s security team detected anomalous network activity during routine monitoring. The company then initiated its incident response protocol immediately. Forensic analysis confirmed the scope of compromised information included: Full names of registered users Physical addresses associated with accounts Dates of birth for identity verification Phone numbers used for authentication Following the data theft, ShinyHunters reportedly demanded a substantial ransom payment in cryptocurrency. Figure’s leadership refused to negotiate with the threat actors. The hacking group then published the stolen dataset on multiple dark web forums. This escalation transformed a contained security incident into a public data exposure crisis. ShinyHunters Hacking Group and Ransomware Tactics The ShinyHunters collective has established itself as a persistent threat to financial technology platforms. Active since 2020, the group typically targets companies handling valuable personal or financial data. Their operational methodology often combines technical exploitation with social engineering techniques. Security researchers have documented their previous attacks against educational institutions, e-commerce platforms, and technology firms. In the Figure breach, ShinyHunters employed what appears to be a double-extortion strategy. First, they stole sensitive customer information. Then, they threatened public release unless Figure paid a ransom. This approach maximizes pressure on victim organizations. Companies face not only regulatory penalties for data exposure but also reputational damage from public disclosure. Recent Major Fintech Data Breaches (2023-2025) Company Year Attack Method Data Exposed Figure 2025 Insider-assisted hack 2.5 GB PII BlockFi 2023 Third-party vendor compromise Client contact info Celsius Network 2024 Phishing campaign Partial user database CoinLoan 2023 API vulnerability Encrypted user data Cybersecurity experts note that blockchain companies present unique attack surfaces. While distributed ledger technology provides transaction immutability, supporting infrastructure remains vulnerable. Customer databases, web servers, and employee access systems represent potential entry points. The Figure breach demonstrates that blockchain-based applications inherit traditional cybersecurity risks alongside novel technological challenges. Insider Threat Implications for Financial Technology The alleged insider involvement in Figure’s breach warrants particular attention from security professionals. Insider threats represent one of the most difficult attack vectors to detect and prevent. Malicious insiders possess legitimate access credentials and understand internal security protocols. They can bypass perimeter defenses that might stop external attackers. Financial technology companies like Figure manage particularly sensitive data. They must balance operational efficiency with stringent access controls. The principle of least privilege becomes essential in this environment. Employees should only access data necessary for their specific job functions. Additionally, robust monitoring systems must track unusual data access patterns. Blockchain lending platforms face additional complexities. They often integrate traditional banking compliance requirements with cryptocurrency innovations. This hybrid operational model creates overlapping security jurisdictions. Consequently, comprehensive security frameworks must address both conventional and novel threat vectors. Regular security audits, employee training, and incident response drills become non-negotiable components of operational resilience. Regulatory and Compliance Consequences Data breaches trigger significant regulatory obligations for financial services providers. Figure operates within multiple jurisdictional frameworks governing data protection. The company must comply with state-level regulations like the California Consumer Privacy Act. Additionally, financial regulators oversee aspects of their lending operations. Breach notification laws typically require disclosure within specific timeframes. Figure acknowledged the security incident promptly. The company stated it notified affected individuals according to legal requirements. However, the dark web publication of stolen data complicates remediation efforts. Exposed individuals now face elevated risks of identity theft and phishing attacks. Therefore, Figure likely will provide credit monitoring services to impacted customers. The blockchain lending sector operates under increasing regulatory scrutiny. Recent guidance from financial authorities emphasizes cybersecurity preparedness. Companies must demonstrate robust incident response capabilities. They should implement encryption for sensitive data both in transit and at rest. Furthermore, regular penetration testing and vulnerability assessments have become industry standards. The Figure breach may accelerate regulatory examinations of cybersecurity practices across the digital asset lending industry. Customer Impact and Response Measures Individuals affected by the Figure data breach should take immediate protective actions. Exposed personal information enables various forms of fraud. Cybercriminals may attempt account takeover attacks using stolen credentials. They might also conduct targeted phishing campaigns referencing the breach. Therefore, vigilance becomes essential for potentially impacted customers. Security experts recommend several response measures for breach victims: Monitor financial accounts for unauthorized activity Enable two-factor authentication on all financial accounts Review credit reports for suspicious inquiries or accounts Consider credit freezes with major bureaus to prevent new account fraud Use unique passwords for each online account Figure has established a dedicated response channel for affected customers. The company likely will provide specific guidance based on individual exposure levels. However, customers should independently verify any communications claiming association with Figure’s response. Attackers often exploit breach notifications to launch secondary phishing campaigns. Blockchain Security Paradox and Industry Implications The Figure breach reveals a fundamental security paradox in blockchain finance. Distributed ledger technology provides unprecedented transaction transparency and integrity. Yet, the applications built atop blockchain infrastructure remain susceptible to conventional attacks. This disconnect between protocol security and application vulnerability requires urgent industry attention. Blockchain lending platforms like Figure promise decentralized financial services. They aim to eliminate traditional intermediaries through smart contracts. However, customer onboarding, identity verification, and data storage often involve centralized components. These centralized elements become attractive targets for attackers. Therefore, the industry must develop more resilient architectural approaches. Several emerging technologies offer potential solutions. Zero-knowledge proofs could enable identity verification without exposing raw personal data. Decentralized identity systems might allow users to control their personal information. Homomorphic encryption could permit data processing without decryption. However, widespread implementation of these technologies remains years away. Meanwhile, companies must strengthen conventional cybersecurity measures while pursuing innovative approaches. Conclusion The Figure data breach represents a significant cybersecurity event with implications beyond a single company. This incident demonstrates that blockchain-based financial services face persistent threats from determined adversaries. The involvement of ShinyHunters highlights the professionalization of cybercrime targeting fintech platforms. Furthermore, the alleged insider component underscores the importance of comprehensive security frameworks addressing both external and internal threats. As the digital asset industry matures, security must become a foundational priority rather than a secondary consideration. The Figure data breach should catalyze industry-wide security enhancements. Companies must implement defense-in-depth strategies combining technological controls with human factors management. Regulatory bodies will likely increase scrutiny of cybersecurity practices across the sector. Ultimately, building trust through demonstrable security resilience will determine which blockchain financial platforms succeed in the coming years. FAQs Q1: What specific data was exposed in the Figure breach? The compromised information includes customer names, physical addresses, dates of birth, and phone numbers. The 2.5 GB dataset contained personally identifiable information but reportedly did not include financial account details or Social Security numbers according to initial assessments. Q2: How did ShinyHunters gain access to Figure’s systems? Cybersecurity investigators believe the breach involved insider assistance combined with external hacking techniques. The exact method remains under investigation, but evidence suggests credential compromise facilitated initial access before data exfiltration occurred. Q3: What should affected Figure customers do immediately? Impacted individuals should monitor their financial accounts for unusual activity, enable two-factor authentication where available, review credit reports for suspicious inquiries, and consider placing credit freezes with major bureaus to prevent identity theft. Q4: How does this breach affect Figure’s blockchain lending operations? The company continues operating its lending platform while investigating the breach. However, the incident may trigger regulatory examinations and could impact customer trust. Figure has implemented additional security measures and enhanced monitoring following the attack. Q5: Are other blockchain lending platforms at similar risk? All financial technology companies face cybersecurity threats, but specific risk profiles vary. The Figure breach highlights vulnerabilities in centralized data storage components common across many blockchain applications. The industry is likely to increase security investments following this incident. This post Blockchain Lender Figure Suffers Devastating Data Breach After Insider-Enabled Hack first appeared on BitcoinWorld .
14 Feb 2026, 13:05
When Ripple CEO Was Asked If He Can Flip the Switch for XRP

Anticipation has always shaped the psychology of emerging financial technology. Investors, builders, and observers often search for a defining instant when years of preparation suddenly translate into visible transformation. Within the XRP community, that expectation frequently centers on the idea of a single catalytic moment capable of accelerating adoption and reshaping global payment infrastructure overnight. In a recent X post, Bird revisited a striking exchange involving Brad Garlinghouse, chief executive of Ripple , during a live Spaces conversation. Bird explained that the response resonated deeply because it challenged the popular belief that one decisive action could instantly change XRP’s trajectory. Instead, the moment encouraged a broader reflection on how real financial transformation actually unfolds. The Illusion of a Single Turning Point Many market participants prefer simple narratives. A single switch, a single announcement, or a single institutional decision feels easier to understand than years of gradual coordination. However, large-scale financial systems rarely evolve through sudden events. Payment networks, regulatory frameworks, and institutional standards develop through a layered process that unfolds across jurisdictions and industries. I absolutely loved the moment on Spaces when @bgarlinghouse answered the question, “Brad, can you flip the switch?” His response really stuck with me. He basically said that if there was one single big switch to flip, he’d flip it immediately. But the reality is > it isn’t one… https://t.co/b2g4xTTh66 — Bird (@Bird_XRPL) February 13, 2026 Garlinghouse’s perspective emphasized this reality. He pointed toward complexity rather than spectacle, reinforcing the idea that meaningful change requires synchronized movement across technology, regulation, and market structure. His explanation aligned with the historical evolution of electronic trading, online banking, and real-time settlement systems, all of which matured incrementally before reaching widespread visibility. A Decade of Strategic Foundations Ripple’s development over the past decade reflects sustained, methodical execution. The company has pursued institutional partnerships , regulatory engagement, and cross-border payment innovation while navigating legal scrutiny and shifting policy environments. Each initiative represents a discrete step, yet together they form a broader infrastructure designed for long-term utility. Technical progress has followed a similar pattern. Continued enhancements to the XRP Ledger, expanding liquidity pathways, and growing ecosystem participation demonstrate steady maturation rather than headline-driven change. These advancements rarely dominate daily market discussion, but they create the structural conditions required for scalable financial adoption. We are on X, follow us to connect with us :- @TimesTabloid1 — TimesTabloid (@TimesTabloid1) June 15, 2025 Gradual Change, Sudden Recognition Financial history shows that transformation often appears slow until convergence occurs. Legacy systems decline in stages while new frameworks strengthen in parallel. Once enough components align, momentum accelerates quickly, giving the impression of an overnight shift even though preparation spanned many years. Bird’s reflection highlights this disconnect between perception and construction. Observers who wait for a dramatic switch may overlook the cumulative force of steady progress already in motion. When institutional readiness, regulatory clarity, and technological capability intersect, acceleration becomes a consequence rather than a surprise. Watching the Point of Convergence The central question surrounding XRP now concerns timing. Continued alignment across global finance could produce a moment when long-developing infrastructure finally translates into visible scale. Such convergence would not represent a sudden beginning, but the natural outcome of persistent groundwork. For the XRP community , the narrative therefore evolves from waiting for a switch to recognizing an unfolding process. Real transformation rarely announces itself loudly. Instead, it builds quietly—until movement becomes undeniable. Disclaimer : This content is meant to inform and should not be considered financial advice. The views expressed in this article may include the author’s personal opinions and do not represent Times Tabloid’s opinion. Readers are urged to do in-depth research before making any investment decisions. Any action taken by the reader is strictly at their own risk. Times Tabloid is not responsible for any financial losses. Follow us on Twitter , Facebook , Telegram , and Google News The post When Ripple CEO Was Asked If He Can Flip the Switch for XRP appeared first on Times Tabloid .
14 Feb 2026, 12:15
Southeast Asian gangs pivot to crypto to move illegal funds and conceal profits

Southeast Asian gangs involved in human trafficking have now kicked up their money laundering activities, relying on cryptocurrencies to move illegal funds and conceal profits. The move signals a shift in how these groups operate across borders, with a new report showing that digital assets have become the most preferred channel. According to the report, these illicit funds are tied to forced labor, operations carried out in scam compounds , and other criminal activities. The trend shows how easy criminal networks adapt to technology while expanding their global reach. In a report released by Chainalysis, crypto transactions linked to suspected trafficking operations jumped by 85% to hit $260 million. The metric was released in its 2026 crypto crime report, which tracks illicit activities across public blockchains. Why are Southeast Asian gangs adopting crypto? In the report released by investigators, Southeast Asian gangs are now favoring crypto. Tom McLouth, an intelligence analyst at Chainalysis, explained that the adoption of digital assets by these gang networks is because using digital assets provides them with faster remittance. He noted that transactions are carried out within seconds, and funds are moved into exchanges that are abroad at the same time. He tied most of these transactions to forced labor in scam centers. In addition, some funds were also linked to international escort services and child sexual abuse material networks. The growth is in line with the expansion of scam compounds and digital gambling platforms across the region. Aside from using digital assets for its speed, it helps them reduce their dependence on traditional banking systems. Criminals tend to avoid the delays and regulatory oversight that come with using traditional cross-border transfer systems, and scaling their operations faster. Over the past few years, Southeast Asia has seen a rise in online scam hubs and digital casinos. These operations rely on trafficked workers who have been forced to leave their countries to seek greener pastures. These networks usually advertise several fake roles to entice workers and end up holding them against their will in these compounds. The workers help the masterminds behind the operation run their scams, where they target victims worldwide and take payments using crypto wallets. Investigators report scam growth tied to crypto In the report, investigators mentioned that the criminals have been able to grow their operations using crypto. As scam centers in Southeast Asia continue to rise, crypto transactions associated with them are also increasing. In addition, these trafficking groups use multiple wallets for transactions. However, blockchain technology creates a record of every transaction. Unlike cash exchanges, digital transactions leave a trail on the blockchain. In addition, investigators are now using blockchain analytics and traditional intelligence to investigate these transactions. As a result of this, authorities can disrupt networks faster than in previous years. While trafficking networks take advantage of the speed and global reach of crypto, transparency provides an edge to investigators. Cooperation between regulations and analytics firms has also been helping enforcement efforts. In a recent update released by Interpol last November, it announced that it has designated the criminal scam compounds built in the region as a transnational criminal threat. The resolution was approved at a General Assembly meeting in Marrakech, where authorities claimed that the scam compounds have targeted victims from more than 60 countries. They claimed that these criminals target victims using voice phishing, romance scams, investment fraud, and other forms of crypto scams. Get 8% CASHBACK when you spend crypto with COCA Visa card. Order your FREE card.
14 Feb 2026, 05:48
Figure Technology confirmed a data breach after an employee was tricked by hackers into giving access to company files

Figure Technology, a prominent blockchain-based fintech company, has acknowledged a security incident involving unauthorized access to its data. In a statement, Alethea Jadick, a spokesperson for Figure Technology, said the breach occurred when an employee fell for a social engineering scam, allowing hackers to gain access to a few files. The firm confirmed that it is communicating with partners and affected parties regarding the breach. Moreover, it pointed out that complimentary credit monitoring is available to all recipients of this notice. Nonetheless, reporters claimed that Figure’s spokesperson failed to address certain questions concerning the breach details. Breach incidents in the tech industry remain a key concern The figure’s breach incident has sparked security concerns among individuals, igniting heated discussions in the industry. In this scenario, reports stressed that ShinyHunters, a notorious black-hat criminal hacking and extortion group, took credit for the breach on its dark web portal. According to the hackers, the company refused to meet their demands, prompting them to leak 2.5 gigabytes of allegedly stolen data. In response to this action, Figure stated that, “We recently found out that an employee was manipulated into giving access, which let someone download a limited number of files through their account. We took immediate action to stop the activity and hired a forensic firm to investigate which files were impacted.” Following this statement, sources declared that the approach applied in this case was Social engineering, a psychological manipulation of people into performing actions such as granting unauthorized access or divulging confidential information, acting as a form of “human hacking”. Meanwhile, to demonstrate the intensity of the situation, Chainalysis shared a report last month noting that scammers stole an estimated $17 billion in cryptocurrency last year, using AI to enhance impersonation and social engineering . Their report showed that data breaches remained a key concern in the tech industry last year, further heightening tensions this year. This was after a report from the Privacy Rights Clearinghouse, dated December 2025, revealed that regulators recorded more than 8,000 filings covering more than 4,000 distinct scenarios that significantly affected at least 374 million people. While Figure’s spokesperson provided limited details about the firm’s breach, an anonymous individual from the ShinyHunters group informed a reliable source that the breach was part of a broader campaign targeting companies that use the Okta single sign-on service. In the meantime, sources mentioned that other alleged victims were the University of Pennsylvania and Harvard University. Step Finance encounters a breach in its operation As breach incidents continue to be a significant challenge in the industry, Step Finance, a prominent DeFi platform particularly within the Solana blockchain ecosystem, announced that several of its treasury and fee wallets were compromised, prompting an investigation into the breach. Following its announcement, onchain data revealed that hackers unstaked about 261,854 SOL and moved them to an unknown address. At the moment, the blockchain security company CertiK claimed that the price of SOL was around $110, implying that these transfers accounted for almost $29 million in value. Meanwhile, in attempts to calm down the tension among its clients, Step Finance shared an X post, highlighting that, “We experienced a security breach in some of our treasury wallets a few hours ago, and we are currently looking into it… We will share more details later.” The platform also disclosed that it engaged cybersecurity experts to assist with the investigation. Nonetheless, Step Finance failed to mention the primary cause of the breach. This sparked speculation in the ecosystem, with some alleging it stemmed from a smart contract flaw and others claiming it was due to an access control issue. The main question raised at the moment was whether user funds outside the treasury were affected. These concerns prompted reporters to reach out to Step Finance for clarity on the speculations and questions raised, but it declined to respond. Earn 8% CASHBACK in USDC when you pay with COCA. Order your FREE card.
14 Feb 2026, 02:32
The Trump administration has withdrawn a list of “Chinese military companies,”

The Trump administration is under intense criticism after it briefly posted and withdrew an updated list of Chinese companies alleged to be in bed with the Chinese military. The list posted briefly on the Federal Register identifies firms, within American jurisdiction, that are deemed to be “Chinese military companies.” It was up for only a short period on February 13, 2026. US posts and deletes list The Pentagon later reportedly requested its withdrawal without any concrete explanation. Among the high-profile names on the list were BYD, the world’s largest electric car manufacturer, Alibaba , Baidu, biotech company WuXi AppTec, AI-powered robotics tech company RoboSense Technology Co Ltd, Tencent Holdings, and major battery manufacturer, CATL. The list is formally known as Section 1260H “Chinese Military Companies” list and is mandated by Congress to be compiled by the US Department of Defense and consists of companies controlled by the Chinese military or in close ties with the Chinese military. The list does not automatically mean such companies are in any form of legal trouble, but it does some form of reputational harm to such companies because it implies that the US may take punitive measures against them in the future. However, biotechnology company WuXi AppTec will have its operations affected in the US, since it was placed on the list. This is due to the Biosecure Act, passed in December 2025, that prohibits the federal government from doing business with “biotechnology companies of concern”. Any company on the 1260H list happens to fall under this category. In a surprising move, the defense department removed CXMT and YMTC – two memory chipmakers- from the list. Companies like BYD and Baidu have pushed back on the idea that they are in with the Chinese military or the Chinese government. Alibaba says it will explore legal options in response to the Pentagon’s actions. The sudden withdrawal of the PDF from the Federal Register has confounded many, as it gives mixed signals about the Trump administration’s stance on foreign policy and national security challenges. Experts believe that the upcoming summit in April between President Trump and Xi Jinping might have played a role in the sudden withdrawal. Criticism from US lawmakers. Democratic lawmakers like Senator Mark Warner, ranking member of the Senate Intelligence Committee, have accused the Trump administration of undermining US security interests by kowtowing to Beijing’s demands at such a critical juncture. He said : “The Trump administration has subordinated national security concerns to a haphazard and transactional approach, bowing to U.S. companies pursuing deals with (Chinese) companies-of-concern, granting licenses for export of sensitive U.S. technology, and permitting continued access to U.S. markets by (Chinese) national champions so long as it provides opportunities to enrich the president’s family and friends,” In a social media post, Representative Gregory Meeks stated: “This is appeasement, Trump is making Americans less safe by sacrificing technology security. “ China’s response Neither the Chinese government nor the Chinese Embassy has released a statement concerning the Pentagon’s latest moves. However, when the Biden administration caused a similar stir last year, a spokeswoman for China’s Ministry of Commerce criticized the US, saying that the US unjustifiably suppresses Chinese enterprises, and such actions severely disrupt international trade and economic order, and endanger the stability of global industry and supply chains. She continued that China urges the US to respect facts and rules, immediately cease its wrongful actions, and provide Chinese companies with fair, just and non-discriminatory treatment. The Pentagon says a revised list will be released in a few weeks, suggesting the withdrawal was nothing short of an administrative procedure. Whether this spells the beginning of a closer relationship between Beijing and Washington remains to be seen. But one thing is certain, all eyes are on the April summit between President Trump and President Xi. Earn 8% CASHBACK in USDC when you pay with COCA. Order your FREE card.










































