Bybit Web3 Expands Token Offerings with Solana-Focused Strategy
Bybit has significantly enhanced its Web3 platform by integrating eight new tokens, enabling seamless on-chain trading directly from Unified Trading Accounts without the need for external wallets. The newly listed assets—Ava AI (AVA), TROLL (TROLL), The Spirit of Gambling (Tokabu), Housecoin (House), unstable coin (USDUC), Uranus (URANUS), PYTHIA (PYTHIA), and Illusion of Life (SPARK)—can be traded against major pairs like USDT, USDC, SOL, or bbSOL. This MOVE underscores Bybit's commitment to simplifying decentralized trading while expanding its Solana-focused strategy, offering users streamlined access to innovative digital assets. The update reflects the exchange's bullish stance on Web3 adoption and its efforts to bridge centralized and decentralized finance ecosystems.
Bybit Web3 Expands Token Listings, Simplifies On-Chain Trading
Bybit has integrated eight new tokens into its Web3 platform, enabling direct trading from Unified Trading Accounts without external wallets. The listed assets—Ava AI (AVA), TROLL (TROLL), The Spirit of Gambling (Tokabu), Housecoin (House), unstable coin (USDUC), Uranus (URANUS), PYTHIA (PYTHIA), and Illusion of Life (SPARK)—can be traded against USDT, USDC, SOL, or bbSOL.
The exchange's Solana-focused strategy provides streamlined access to trending assets while merging CEX efficiency with on-chain innovation. Proceeds auto-settle to UTAs, eliminating gas token management—a move aligning with Bybit's push to bridge centralized and decentralized markets for its 70M users.
ZachXBT Exposes North Korean Hackers' Crypto Infiltration Tactics
North Korean hackers are deploying sophisticated methods to infiltrate Web3 startups, according to a report by crypto investigator ZachXBT. Small teams of five operatives manage over 30 fake identities, using forged government IDs and purchased Upwork/LinkedIn accounts to secure developer roles. Their success hinges on the negligence of crypto projects.
The Bybit hack earlier this year marked the beginning of a surge in such attacks. ZachXBT's findings reveal a systematic approach: these groups blend into the crypto workforce, exploiting weak vetting processes to gain access to sensitive systems. The investigator warns that this trend poses a growing threat to decentralized projects.