Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

security

Developers using Unity warned to patch games ASAP following the discovery of a serious security vulnerability
Game Updates

Developers using Unity warned to patch games ASAP following the discovery of a serious security vulnerability

by admin October 4, 2025


Developers who have created their games using Unity have been warned to patch them as soon as possible following the discovery of a security vulnerability in Unity versions 2017.1 and later.

In a statement, Unity said a “security vulnerability was identified that affects games and applications built on Unity versions 2017.1 and later for Android, Windows, Linux, and macOS operating systems”, but insisted “there is no evidence of any exploitation of the vulnerability, nor has there been any impact on users or customers.”

The “Best Deal in Gaming” Just Keeps Getting Worse.Watch on YouTube

“We have proactively provided fixes that address the vulnerability, and they are already available to all developers,” Unity continued. “The vulnerability was responsibly reported by the security researcher RyotaK, and we thank him for working with us.”

Unity just sent out an email telling everyone who released a game between 2017 and today that they need to recompile and republish their games due to a security vulnerability. Yikes. CVE-2025-59489 pic.twitter.com/uXgGFMsvFV

— George Deglin (@gdeglin) October 3, 2025

To see this content please enable targeting cookies.

Manage cookie settings

The company added that it has now released an update for each of the major and minor versions of the Unity Editor, starting with Unity 2019.1, and a binary patcher to patch already-built applications dating back to 2017.1. It also warned developers that “it is imperative that you review [its] guidance to ensure the continued safety of your users”.

As spotted by VGC, the news resulted in some developers temporarily pulling their games from sale as they work over the weekend to get the patch implemented as soon as possible, including Obsidian, which removed a number of games from digital stores while it worked on the updates.

“Unity is dedicated to the security and integrity of our platform, our customers, and the wider community,” Unity concluded. “Transparent communication is central to this commitment, and we will continue to provide updates as necessary.”





Source link

October 4, 2025 0 comments
0 FacebookTwitterPinterestEmail
You don’t have to be a coder to understand crypto security
GameFi Guides

You don’t have to be a coder to understand crypto security

by admin October 4, 2025



Disclosure: The views and opinions expressed here belong solely to the author and do not represent the views and opinions of crypto.news’ editorial.

In my interactions with people at conferences or just regular catchups, they often ask me, “Do I need to know how to code to keep my crypto safe?” To be honest, my answer is always a firm ‘no.’ Over the years, I have spent working in cryptography and wallet security, and one thing I’ve learned is that staying safe isn’t about writing code. It’s about being careful, aware, and knowing what matters.

Summary

  • Crypto security isn’t just about wallets: It’s about the rules governing how keys are stored, accessed, and used — the lock matters as much as the vault.
  • Multisig and MPC made simple: Think of them as group locks or shared approvals, reducing single points of failure and making funds harder to compromise.
  • Security goes beyond code: Policies, people, and processes — like recovery plans and oversight — are just as important as cryptography.
  • Education is key: Users don’t need to be coders; by asking the right questions and understanding basic concepts, anyone can take ownership of their crypto safety.

In fact, as digital assets enter the mainstream, whether through stablecoins, tokenized assets, or everyday wallets, understanding the basics of security is no longer optional. Just like you don’t need to be a mechanic to drive safely, you don’t need to be a coder to understand what keeps your crypto safe.

Myth #1: Security = where you store your crypto

Most new users think the security of their crypto begins and ends with “which wallet” or “which exchange” they use. But the real story is deeper.

A wallet isn’t just an app on your phone. It’s the system of rules and protections that determine how your private keys are stored, who can access them, and how transactions are approved. In simple terms, the vault is only as good as the lock, and the lock is only as good as the rules that decide who holds the keys.

Understanding this doesn’t require coding skills. It requires asking better questions:

–    Does this wallet allow multiple approvals (like multiple signatures)?

–    What happens if I lose access to my device?

–    Can a single person move funds, or is there shared control?

–    If you can ask these questions, you’re already thinking like a security architect.

Myth #2: Multisig and MPC are too technical to understand

Two of the most common terms you’ll hear in wallet security are multisig and multi-party computation. They sound intimidating, but the ideas are straightforward.

Think of the concept of multisig like a bank vault that needs three keys to open. Think of multisig like a bank vault that needs three keys to open. Different people hold different keys, and you need all or most of them together to unlock the vault.

Now, MPC is a little different. With MPC, the keys themselves are never assembled. Instead, each person contributes their part to the “action,” and the action (like approving a transaction) is completed without ever reconstructing the key. It’s like buying a group gift where nobody knows exactly how much each person paid, but the present still gets delivered.

Both models are designed to reduce single points of failure. And while the implementation is technical, the logic is something anyone can understand.

Myth #3: Security is just about code

Security in crypto isn’t only about algorithms or programming. It’s also about policies, people, and processes.

Consider this: the strongest cryptography in the world won’t help if an insider at a company has unchecked access to customer funds. Similarly, a wallet with brilliant engineering can still fail if there’s no recovery plan when a user loses access.

That’s why the most secure custody systems combine mathematics with human design. They enforce rules about who can approve what, set boundaries for how much can move at once, and provide recovery options if things go wrong.

Staying informed is another key habit. Crypto changes fast. Platforms update, new scams pop up, and new opportunities arrive daily. Following credible sources, listening to experienced voices, and asking questions can help you navigate it all. As Vitalik Buterin, Ethereum’s (ETH) co-founder, once said, “Crypto is not just about trading tokens; it’s part of a broader ethos of protecting freedom and privacy.” You don’t need to code to understand that message.

In other words, crypto security is as much about coordination and trust as it is about code. The world is moving fast. Stablecoins are being adopted by payment giants. Traditional banks are exploring tokenized deposits. Every day, people are using wallets to hold digital value, sometimes without realizing the risks involved.

In this environment, security cannot remain a “black box” reserved for engineers. Users, regulators, and institutions need to understand the principles, even if they never touch the math.

The good news is that the concepts aren’t complicated when explained in plain language. We all understand the idea of locks, safes, approvals, and shared control. Crypto security builds on these same human concepts, with cryptography as the invisible engine underneath.

Ask better questions

When you’re evaluating a wallet or custody provider, don’t just ask “is it secure?” Ask:

–    How are keys stored?

–    Who has the authority to approve transactions?

–    What happens if one party is compromised?

–    Is the system designed to fail safely?

These questions don’t require coding skills. They require curiosity and a willingness to demand transparency from the infrastructure you rely on.

The beauty of cryptography is that it takes human concepts like privacy, trust, and shared control and turns them into digital systems. But for those systems to succeed, people need to trust them. And trust comes from understanding.

You don’t have to be a coder to understand crypto security. You just need to know the right questions to ask, and the right analogies to make sense of the answers. The future of digital assets depends on making these invisible systems visible and accessible to everyone.

Sharmila S

Dr. Sharmila S is the Principal Scientist at Liminal Custody, with over 18 years of expertise in cryptography, blockchain security, and multiparty computation. She leads Liminal’s cryptography research, advancing MPC protocols, threshold cryptography, and post-quantum security. Previously, she held roles at Microsoft Research India, IIT Madras, ZebPay, and several blockchain startups. She holds a PhD in cryptographic systems, with research spanning proxy re-encryption, signcryption, and aggregated signatures, and is co-inventor on a U.S. patent for key recovery. At Liminal, Dr. Sharmila architects the MPC-TSS custody infrastructure, ensuring scalability, verifiability, and resilience. A recognized thought leader, she bridges theoretical cryptography with real-world blockchain applications, reinforcing Liminal’s mission to build secure, audit-ready, and regulation-aligned digital asset infrastructure.



Source link

October 4, 2025 0 comments
0 FacebookTwitterPinterestEmail
Shibarium Bridge Security: Here's Plan to Prevent Next Hack
Crypto Trends

Shibarium Bridge Security: Here’s Plan to Prevent Next Hack

by admin October 3, 2025


Shibarium, the layer-2 scaling solution for Shiba Inu (SHIB), has stepped up its bridge security protocol. The measure comes as a measure to prevent a repeat occurrence of the exploit it suffered around mid-September. To ensure the next hack is avoided, Shibarium is restarting bridges and services.

Shibarium rolls out new security measures

As explained in an update by Shibizens, a news platform for the community, the attacker who tried to exploit the blockchain did so by manipulating checkpoints. According to the update, they did this by staking 4.6 million BONE tokens for leverage.

However, Shibarium was able to prevent the successful completion of the attack as Heimdall, the chain’s checkpoint system, automatically froze the network. This is a measure meant to protect users’ funds.

In order to prevent a recurrence, Shibarium has decided to add “blacklisting” to the Plasma Bridge. Notably, this helps move tokens between blockchains. Additionally, the chain has decided to restart paused bridges slowly and carefully. The goal is to allow users to move assets safely again.

Shibarium Update – Quick Recap

🔸 What happened
•An attacker injected fake checkpoints and tried to take control using a huge 4.6M BONE stake.
•Heimdall (the chain checkpoint system) halted to protect funds.

🔸 What the team did
•Worked non-stop for 10+ days with Hexens… pic.twitter.com/3fTjOfR4y0

— Shibarium | SHIB.IO (@Shibizens) October 3, 2025

Other measures by Shibarium include the launch of a new official RPC, which is a network access point in collaboration with dRPC.org. It will also publish a template that would serve as a manual to handle any future attempt by malicious actors on the chain.

It is worth mentioning that when the mid-September attack happened, the Shibarium team responded proactively by moving over 100 smart contracts into safer wallets. The team also added a blacklisting feature to prevent addresses from staking.

Shibizens explained that after carrying out a recovery of the 4.6 million BONE, the Shibarium team cleaned out the chain’s ledger and rolled back to the last safe state before the exploit happened.

Community response and market impact

This update is already generating reactions from the SHIB Army. One user hailed the response of the Shibarium team. He, however, expressed concerns over the blacklisting feature, wondering if this aligns with the long-term goals of decentralization.

It would appear that the attempt to restore users’ confidence is gaining traction. Regardless, the daily transaction count on Shibarium is still at low levels. According to data, Shibarium could only record 1,970 transactions and remains a major concern as it rubs off on Shiba Inu.

As of press time, Shiba Inu is changing hands at $0.00001248, which represents a 0.88% increase in the last 24 hours. Despite the slight uptick, SHIB is underperforming the broader crypto market, largely as a result of the near collapse of Shibarium transactions.





Source link

October 3, 2025 0 comments
0 FacebookTwitterPinterestEmail
BREAKING: Binance's CZ Issues Major Security Alert About BNB Chain's X Account
Crypto Trends

BREAKING: Binance’s CZ Issues Major Security Alert About BNB Chain’s X Account

by admin October 1, 2025


Former Binance CEO Changpeng Zhao has issued a major security warning about the official X account of BNB Chain, which appears to have been compromised by hackers. 

ALERT 🚨: The @BNBCHAIN X account may have been compromised.

Please do not click on any links recently posted from this account.

The teams are investigating and will share updates as soon as possible. 🙏

— CZ 🔶 BNB (@cz_binance) October 1, 2025

Several minutes ago, the account posted “$4” alongside the phrase “FOR THE MEME.” This was accompanied by a wallet address and a picture of CZ. 

The obviously fraudulent social media post has been pinned by the attackers to gain more exposure. Notably, @BNBCHAIN boasts a whopping 3.6 million followers, which makes it one of the most popular cryptocurrency-related pages on X (and a very juicy target for attackers). 

CZ has warned against clicking any suspicious links posted from the account, adding that the team is currently investigating the issue. 

You Might Also Like

Binance’s Chinese account has also warned that the official English-language account of the BNB Chain has been hacked. 

Other recent crypto account hacks

Crypto scams have been plaguing social media networks for years. In 2025, there have been several other high-profile X hacks pulled off by crypto scammers. In February, the official account of Pump.fun was used to announce a fake governance token. 

During the same month, an account belonging to a WIRED reporter was also compromised to promote a fake WIRED-branded meme token.

Hackers are also targeting public figures. In March, the official X account of Ghana President John Mahama was compromised to promote “Solanafrica,” a fraudulent token on the Solana network. In April, the X account of UK government minister Lucy Powell was hacked to advertise a bogus “community-driven digital currency.” 





Source link

October 1, 2025 0 comments
0 FacebookTwitterPinterestEmail
DAAPrivacyRightIcon
Product Reviews

Tile trackers reportedly have a security flaw that can let stalkers track your location

by admin September 29, 2025


Researchers have discovered major security flaws with Tile tracking tags, according to a report by Wired. These flaws could allow both the company itself and tech-savvy stalkers to track a user’s location. The security issue could also let a malicious actor falsely frame a Tile owner for stalking, as the flaw can make it appear as if a particular tag is constantly in the vicinity of somebody else’s tag.

The issue pertains to how Tile tags transmit data during use. Tile tags transmit a lot of data beyond that of other trackers, including the static MAC address and the rotating ID. According to reporting, none of this stuff is encrypted. The rotating ID changes all of the time, but a MAC address doesn’t.

Researchers believe that all of this information is stored in cleartext, making it easy for hackers to get ahold of. This also would theoretically give Tile itself the ability to track its users, though the company says it doesn’t have this capability.

It gets worse. Anyone with a radio frequency scanner can allegedly intercept all of this information as it’s being transmitted, creating another potential security hole. Also, this problem might not even be solved if Tile decides to stop transmitting the MAC address. This is because the company generates its rotating ID in such a way that future codes can be reliably predicted from past ones.

“An attacker only needs to record one message from the device,” one of the researchers behind the findings said, adding that a single recorded message will “fingerprint it for the rest of its lifetime.” The researcher said this creates a risk of systemic surveillance.

The security researchers, who are involved with the Georgia Institute of Technology, reached out to Tile’s parent company Life360 in November of last year to report the findings. Wired said the company stopped communicating with the researchers in February. The company did say it has made a number of improvements to its security but didn’t elaborate further.



Source link

September 29, 2025 0 comments
0 FacebookTwitterPinterestEmail
Photo of Team Spirit after winning IEM Cologne.
Esports

CS2 crowd cheating controversy reignites debate over live event security measures

by admin September 28, 2025


The recent controversy at FISSURE Playground 2 has reignited conversations about competitive integrity in esports, with professionals across the scene demanding stronger security measures at live tournaments.

The incident unfolded during the semifinals between Team Falcons and FURIA, where Falcons player Kyxsan repeatedly wiggled his crosshair through smoke at suspected enemy positions, relying on crowd reactions to guide his decisions on Nuke. The tactic quickly spiraled out of control, forcing organizers to disable the X-ray spectator feature mid-match to prevent further abuse.

Industry voices were quick to criticize the situation. Complexity general manager Messioso made his stance clear: “Crowd cheating is one thing. Players enticing the crowd into cheating for them by wiggling their crosshair into smokes or walls is significantly worse and should be punished severely.” His words highlighted just how damaging intentional crowd manipulation can be for the credibility of top-level competition.

Mild take

Crowd cheating is one thing.

Players enticing the crowd into cheating for them by wiggling their crosshair into smokes or walls is significantly worse and should be punished severely.

Disgraceful behaviour.

— Graham Pitt (@messioso) September 20, 2025

This problem is not new to Counter-Strike. The 2018 Boston Major saw Olofmeister engage in similar antics, though back then, the community largely laughed it off. The climate in 2025 is different, with multiple CS2 events this year facing crowd-related controversies; the issue is now systemic rather than isolated.

Tournament organizers are exploring several fixes. Some events have tested separating audiences from players, while others have leaned toward stricter penalties for disruptive spectators. As seen at FISSURE, protocols now allow for cutting off spectator features like X-ray when necessary, though such measures raise concerns about the overall viewing experience.

Discussions are also emerging around standardized penalties for players who deliberately exploit crowd reactions, though the industry lacks a unified regulatory framework. With more international tournaments approaching, each boasting massive prize pools and global audiences, pressure is mounting to strike a balance between maintaining fairness and preserving the electric atmosphere that makes live esports so compelling.

IEM Chengdu is set to feature crowds during the group stage as well. Photo via ESL

Ironically, despite the controversy, FURIA pushed through the distraction, taking both the semifinal and eventually the championship. Their victory reinforced that disciplined execution can still prevail, even when external factors threaten to tip the scales. The incident, however, has left the esports community with pressing questions about how to safeguard integrity while keeping the live spectacle alive.

Dot Esports is supported by our audience. When you purchase through links on our site, we may earn a small affiliate commission. Learn more about our Affiliate Policy





Source link

September 28, 2025 0 comments
0 FacebookTwitterPinterestEmail
DAAPrivacyRightIcon
Gaming Gear

Call-recording app Neon goes offline after security flaw uncovered

by admin September 25, 2025


Neon is an call-recording app that pays users for access to the audio, which the app in turn sells to AI companies for training their models. Since its launch last week, it quickly rose in popularity, but the service was taken offline today. TechCrunch reported that it found a security flaw that allowed any logged-in user to access other accounts’ phone numbers, the phone numbers called, call recordings and transcripts. 

TechCrunch said that it contacted Neon founder Alex Kiam about the issue. “Kiam told TechCrunch later Thursday that he took down the app’s servers and began notifying users about pausing the app, but fell short of informing his users about the security lapse,” the publication reported. The app went dark “soon after” TC contacted Kiam. Neon does not appear to have a timeline about if or when the service will resume or what additional security protections it may add.

The full report from TechCrunch is here and certainly worth reading if you’ve used Neon.



Source link

September 25, 2025 0 comments
0 FacebookTwitterPinterestEmail
1Password Review (2025): Gold Standard Security
Gaming Gear

1Password Review (2025): Gold Standard Security

by admin September 20, 2025


Password managers are spotty on Android and iOS in general, and 1Password isn’t above that issue. I’d estimate somewhere around 10 to 15 percent of the fields I encounter on mobile just don’t register with 1Password, sending me out to the app to copy my password over manually. This is more of an issue with how apps categorize different fields and expose them to other apps running, and less of a 1Password-specific problem.

1Password at least attempts to get around this with linked apps. As you start signing into apps using entries in your vault, 1Password will connect your login to whatever app you’re logging into. That doesn’t eliminate autofill problems on mobile, but it helps in the cases where 1Password is looking for a specific URL to autofill, and the mobile app isn’t operating with that URL.

Outside of autofill, using 1Password on Android and iOS is a breeze. You can enter your account password each time you unlock your account if you want, but 1Password supports biometric authentication on Android and iOS, including Face ID support. After a certain amount of time has passed (you can change the amount of time in the settings), 1Password will ask you to re-enter your account password. Thankfully, if you don’t want to use biometrics, you can set up a PIN or passcode, as well.

Quick access is important because 1Password is extremely limited on mobile, and that’s a good thing. Even switching to another app or locking your phone will also lock your account, and if you swipe through your list of open apps, you’ll only see the 1Password login screen.

You’re free to change these settings, from the amount of time you need to re-enter your account password to when 1Password should clear your keyboard history. The defaults work well, but if you can’t be bothered, you can turn these extra security measures off.

Unique Security

1Password may function similarly to other password managers, but its security design is unique. The company has a white paper you can read through for all the gory details, and it maintains a list of certifications and recent penetration testing. The core of 1Password’s security, however, is a zero-knowledge approach. It’s designed in such a way that, even if 1Password wanted to, it has no means to decrypt the contents of your vault.

This works due to what 1Password calls two-secret key derivation, or 2SKD. It takes your account password and a secret key that’s generated on your device when you first sign up for 1Password, and uses them to derive a key encryption key (KEK). Also on your device, 1Password generates a public-private key pair. Your private key is encrypted with the KEK, while your public key is shared.

There are several layers of nested encryption beyond this, but what’s important is that 1Password doesn’t have a copy of your private key, nor a copy of your account password that’s necessary to derive the KEK. And when you authenticate, everything happens locally on your device, including encryption and decryption. Your KEK, master password, and private key never leave your device.



Source link

September 20, 2025 0 comments
0 FacebookTwitterPinterestEmail
Binance's CZ Issues Crucial North Korea Hackers Security Warning
GameFi Guides

Binance’s CZ Issues Crucial North Korea Hackers Security Warning

by admin September 18, 2025


  • CZ’s warning about NK hackers
  • Their methods

Changpeng Zhao, also known as CZ, has taken to his X account to publish a vital security warning for the crypto community.

CZ revealed in detail how these seasoned hackers work, warning the community to stay secure and avoid falling for their digital traps.

CZ’s warning about NK hackers

In his tweet, CZ reminded the crypto audience on X that North Korean hackers are difficult to deal with since they are “advanced, creative, and patient.” Zhao says that what he says in his tweet comes from both his personal experience and what he has heard about those cyber criminals, as he revealed the methods those hackers use to gain access to users’ personal data and crypto on exchanges and personal wallets.

Their methods

The first method they used is posing as job candidates seeking a position in a victim’s company. They thereby get their foot in the door. They usually prefer to apply for roles as developers or in positions related to the finance or cybersecurity spheres.

These North Korean hackers are advanced, creative and patient. I have seen/heard:

1. They pose as job candidates to try to get jobs in your company. This gives them a “foot in the door”. They especially like dev, security, finance positions.

2. They pose as employers and try to… https://t.co/axo5FF9YMV

— CZ 🔶 BNB (@cz_binance) September 18, 2025

The second method is that they pretend to be employers who are trying to interview victims or make an offer to employees. While conducting an “interview,” they pretend they have a problem with Zoom and offer to click on a link to download an “update.” This link usually contains a virus that helps them to gain control over the future victim’s device. Another option here is that they give a person a coding question and then send some “sample code” to them.

Another trick NK hackers love to use is posing as users having problems and sending malicious links in a letter to customer support. Those links also contain a virus.

Finally, CZ says, cyber cons can pay one’s employees or bribe them or outsource vendors to let hackers access certain crucial data. CZ mentioned that, just a short while ago, a major Indian outsourcing service suffered a hacker attack. As a result, the user data of a major U.S. exchange was leaked, and users lost more than $400 million worth of their personal crypto.

CZ concluded his tweet with a warning to all crypto exchanges and wallets: “Train your employees to not download files, and screen your candidates carefully.”





Source link

September 18, 2025 0 comments
0 FacebookTwitterPinterestEmail
chainlink, Ethereum, DeFi, Bitcoin
Crypto Trends

Symbiotic, Chainlink Join For Cross-Chain Bitcoin Security

by admin September 17, 2025


Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure

Symbiotic, Chainlink, and Lombard have unveiled their collaboration to launch the industry-first cryptoeconomic guarantee layer for secure cross-chain Bitcoin transfers.

Symbiotic, Chainlink, And Lombard Team Up

On Monday, staking protocol Symbiotic announced its partnership with decentralized oracle provider Chainlink and Bitcoin DeFi protocol Lombard to launch the industry’s first-of-its-kind guarantee layer for cross-chain Bitcoin transfers.

The collaboration integrates Chainlink’s Cross-Chain Interoperability Protocol (CCIP) to secure transfers of Lombard Staked Bitcoin (LBTC) across blockchains. Additionally, it introduces two new Symbiotic vaults, backed by a Symbiotic-powered monitoring network that verifies LBTC transfers via CCIP and issues alerts in case of discrepancies, the team detailed.

One of the staking vaults will hold up to $100 million of Chainlink’s native token, LINK, while the other will have 20 million of Lombard’s upcoming native token, BARD.

Notably, the Bitcoin DeFi protocol recently discussed the launch of its native token on X, stating, “Lombard is redefining how Bitcoin moves. At the core of this movement is BARD.” The protocol revealed that the tokenomics will be shared on September 16, while the airdrop and other participant allocation claims will take place on September 18.

The integration will introduce immediate token utility for BARD holders, the announcement explained, by enabling staking into the vault via the Lombard App to secure cross-chain LBTC transfers while earning up to 15% APY.

Moreover, Symbiotic’s modular architecture will allow Lombard and partners to dynamically customize protection levels, with value transferred and no disruption to ongoing operations, “positioning this model as foundational infrastructure for the next generation of cross-chain DeFi security.”

‘A New Standard’ For Cross-Chain Bitcoin Transfers

According to the statement, the integration will deliver a “dual-layer protection system that scales with demand while setting a new standard for cross-chain Bitcoin derivatives” by combining Symbiotic’s permissionless restaking, CCIP’s modular security, and Lombard’s Bitcoin infrastructure.

This collaboration not only reinforces LBTC’s position as the leading institutional-grade, yield-bearing Bitcoin asset trusted by top DeFi protocols, but also establishes a replicable framework for securing broader DeFi infrastructure such as oracles and settlement layers, creating systemic resilience that strengthens with network growth.

Misha Putiatin, Symbiotic’s co-founder, affirmed that the protocol “turns passive crypto assets into modular, active security infrastructure,” adding that “Integrating our restaking framework with Chainlink CCIP for cross-chain LBTC transfers showcases how decentralized collateral can be deployed quickly and permissionlessly to reinforce cross-chain value flows and deliver tangible benefits to end users.”

Meanwhile, Jacob Phillips, Lombard’s Co-founder, highlighted that LBTC is “a chain asset, meeting demand across networks rather than being confined to one.” He noted that holders seek the freedom to move their Bitcoin wherever the best opportunities are, but without compromising security.

To address that, Phillips explained that “pairing CCIP’s modular architecture with Symbiotic’s restaked collateral gives our community stronger economic guarantees through staking. Each BARD staked reinforces the robustness of LBTC, aligning incentives and strengthening the integrity of our interoperability stack.”

Bitcoin (BTC) trades at $115,371 in the one-week chart. Source: BTCUSDT on TradingView
Featured Image from Unsplash.com, Chart from TradingView.com

Editorial Process for bitcoinist is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.



Source link

September 17, 2025 0 comments
0 FacebookTwitterPinterestEmail
  • 1
  • 2
  • 3

Categories

  • Crypto Trends (1,098)
  • Esports (800)
  • Game Reviews (732)
  • Game Updates (906)
  • GameFi Guides (1,058)
  • Gaming Gear (960)
  • NFT Gaming (1,079)
  • Product Reviews (960)

Recent Posts

  • AirPods 4 Are Now 3x Cheaper Than AirPods Pro, Amazon Is Offering Entry-Level Clearance Prices
  • Wildgate Review – A Shipshape Space Race
  • Battlefield 6 physical copies are content complete and require no initial install, according to early copy holders
  • KPop Demon Hunters Uploaded A New Song, But Something’s Off
  • One of Borderlands’ most hated characters seems to have been cut from Borderlands 4

Recent Posts

  • AirPods 4 Are Now 3x Cheaper Than AirPods Pro, Amazon Is Offering Entry-Level Clearance Prices

    October 8, 2025
  • Wildgate Review – A Shipshape Space Race

    October 8, 2025
  • Battlefield 6 physical copies are content complete and require no initial install, according to early copy holders

    October 8, 2025
  • KPop Demon Hunters Uploaded A New Song, But Something’s Off

    October 8, 2025
  • One of Borderlands’ most hated characters seems to have been cut from Borderlands 4

    October 7, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • AirPods 4 Are Now 3x Cheaper Than AirPods Pro, Amazon Is Offering Entry-Level Clearance Prices

    October 8, 2025
  • Wildgate Review – A Shipshape Space Race

    October 8, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close