News
Stay up to date on the latest crypto trends with our expert, in-depth coverage.

1Amazon is Considering a $9 Billion Deal to Acquire Satellite Communications Company Globalstar. Here's Why Amazon, Apple, and Tesla Investors Should Pay Attention.2Exxon’s Guyana-Permian Engine Fuels 21% Earnings Growth—Is the 24 P/E Already Discounting a Squeeze?3Bitcoin’s Movement Compared to Oil’s Rally: Evaluating a Risk-Off Scenario
Nutrien's Stock Falls to 428th in Volume Amid Earnings Miss and Buyback Plan
101 finance·2026/03/04 00:33
Enbridge Jumps 0.69% After Robust Earnings, Places 424th with $330M in Trading Volume
101 finance·2026/03/04 00:33
Garmin's Earnings Spark Rally But 374th-Ranked 380M Volume Can't Sustain Gains as Stock Dips 1.75%
101 finance·2026/03/04 00:31
Fastly’s Highest Earnings Contrast with a Modest $0.35B Volume, Placing at 402nd
101 finance·2026/03/04 00:31
argenx Shares Dip 1.06% Amid $340M Volume Surge Ranking 415th in Daily Trading Activity
101 finance·2026/03/04 00:30
Modine's 10.98% Plunge Amid Surging Volume Ranks 397th in Trading Activity
101 finance·2026/03/04 00:24
BrightSpring Health Shares Fall 2.24% While Trading Volume Soars 203.74%, Moving to 378th in Market Ranking
101 finance·2026/03/04 00:21
Flash
11:35
Monad co-founder releases a 10-point protocol security self-checklist, highlighting key risks in multi-signature and permission management.According to Odaily, Monad co-founder Keone Hon published a protocol security self-checklist on X, focusing on core issues such as administrative authority, fund security, and multisig mechanism design. The main points include the following ten items: 1. Clearly identify which admin functions may lead to fund loss; 2. Ensure all relevant operations have timelock settings; 3. Establish a real-time monitoring mechanism; 4. Issue timely alerts when admin functions are called; 5. Review all privileged accounts and adopt a multisig (k-of-n) structure whenever possible; 6. Clearly define signature threshold parameters; 7. Multisig signers should use independent cold devices strictly for signing operations and follow best practices (such as independently verifying transaction hashes); 8. Set withdrawal rate limits and ensure they are not controlled by the same multisig group; 9. Ensure employee devices have malware detection and management capabilities; 10. Preset extreme scenarios where multisig signers are compromised, reverse engineer potential attack paths from an attacker's perspective, and optimize system design accordingly to increase the cost and complexity of attacks.
11:30
Mitsui O.S.K. Lines, a Japanese shipping company, said an LNG carrier passed through the Strait of HormuzBlockBeats News, April 3rd, according to Reuters, Japan's shipping company Mitsui O.S.K. Lines said on Friday that one of its Japanese liquefied natural gas carriers has passed through the Strait of Hormuz.
A spokesperson for Mitsui O.S.K. Lines said that the crew on board the Panama-flagged vessel "SOHAR LNG" is currently safe, but did not disclose the specific time of passage through the strait or whether any form of negotiation had taken place regarding the passage.
11:25
CertiK: 46 security incidents recorded in March with losses of approximately 39.8 million dollars, the highest since November 2024Foresight News reported, according to CertiK monitoring, a total of 46 security incidents (excluding phishing) were recorded in March 2026, with total losses amounting to approximately $39.8 million. This is the highest number of recorded security incidents in a single month since November 2024. CertiK stated that after reaching a low point in Q3 2025, security incidents increased again in Q4 2025 and Q1 2026, with code vulnerabilities being increasingly exploited over the past two quarters.
Trending news
MoreNews