Market Pulse Nov 13th, 2025 by Mahdi BML – founder of Cryptomentor Academy and AMWAJ
How El Salvador protects its Bitcoin reserve against a quantum threat
The government redistributed roughly 6,274 BTC (around $678 million at publication time) from one address into 14 fresh addresses, each capped at 500 BTC, as a precautionary security measure.
Federal Reserve Rate Cut on September 17th, 2025: Market Reactions and Strategic Outlook
The Federal Reserve has initiated its first interest rate cut in nine months, reducing the federal funds rate by 25 basis points to a range of 4.00%â4.25%.
Trust Walletâs Next Era: A New Roadmap and Renewed Vision for TWT
Trust Wallet Token (TWT) is a BEP-20 utility token designed to support growth, loyalty, and user engagement within the Trust Wallet ecosystem. This litepaper describes potential approaches to strategy, distinct utilities, a tiered engagement system, and a roadmap for aligning platform and token utility to enhance the user experience and community participation.
Scareware Blocker
Scareware is a type of online scam that displays fake virus alerts or security warnings to trick you into thinking your computer is infected or damaged. The goal is to scare you into calling a fake tech support number, where scammers may try to steal your personal data, gain remote access to your device, or charge you for ârepairsâ that arenât needed. A Scareware blocker, like the one in Microsoft Edge, detects these scam sites and warns you before any harm is done.
What Is Scareware?
Scareware is a cyberattack technique that plays on fear. It appears as alarming pop-ups, urgent messages, or fake system scans claiming your device is damaged or under attack. These scare tactics often:
- Warn you of non-existent viruses or critical system errors.
- Push you to call a âsupportâ hotline immediately.
- Redirect you to sites selling fake antivirus software.
Once the scammer has your attention, they may request:
- Remote access to your computer (allowing them to steal files or install malware).
- Payment for unnecessary or fake ârepairs.â
- Personal information that can be used for identity theft.
How Does a Scareware Blocker Work?
Microsoft Edgeâs Scareware blocker is designed to automatically detect and stop these scams before they cause damage. Hereâs how it works:
- Detection: Edge monitors known tech scam sites and suspicious pop-up behavior.
- Warning: If you land on a flagged site, a warning message appears.
- Escape Option: Youâre given the choice to leave the page immediately and return to safety.
Why You Should Turn It On
Even experienced internet users can be fooled by realistic-looking Scareware messages. Turning on the blocker can:
- Prevent scammers from gaining control of your device.
- Protect your financial accounts and personal information.
- Save you from paying for fake technical support.
Extra Safety Tips
While the Scareware blocker is a powerful defense, itâs best to combine it with smart browsing habits:
- Never trust unsolicited tech support calls â real companies like Microsoft or Apple will never call you about security issues.
- Close suspicious pop-ups using Task Manager or your browserâs âForce Quitâ feature.
- Keep your software updated to patch vulnerabilities.
- Use reputable antivirus software as an extra layer of protection.
Frequently Asked Questions (FAQ)
Q1: What is Scareware and how is it dangerous?
Scareware is a scam that uses fake alerts to make you think your computer is infected. Itâs dangerous because it can lead to identity theft, malware infection, and financial loss.
Q2: How does Microsoft Edge protect against Scareware?
Edgeâs Scareware blocker detects known scam sites and warns you before you engage with them.
Q3: Can Scareware install viruses on my computer?
Yes, some Scareware pages try to install malware disguised as security tools.
Q4: What should I do if I see a Scareware pop-up?
Close the browser tab or use Task Manager to exit. Never click buttons inside the pop-up.
Bottom Line
Scareware is one of the most manipulative forms of cybercrime, preying on fear and urgency. By enabling the Scareware blocker in Microsoft Edge and following good security practices, you can browse with greater confidence â and avoid falling victim to these deceptive tactics.
Cybersecurity Concepts and Fundamentals
Table of contents
- What is cybersecurity?
- Why cybersecurity matters
- Core attack types (with quick defenses)
- Emerging threats to watch
- Modern defense strategies and checklists
- Cybersecurity for crypto users
- Cybersecurity for Forex Traders and Market Professionals
- FAQs on cybersecurity
đ What is cybersecurity?
Cybersecurity is the practice of protecting devices, networks, applications, and data from unauthorized access, disruption, or manipulation. It blends technology, processes, and people to reduce risk and ensure confidentiality, integrity, and availability.
- Answer-ready definition: Cybersecurity protects people and systems from digital attacks by preventing unauthorized access and data loss.
â±ïž Why cybersecurity matters
Attackers increasingly use automation and AI to scale phishing, deepfakes, and account takeovers. Hybrid work and cloud adoption expanded attack surfaces. Meanwhile, data stolen today may be decrypted later as computing advances.
- Answer-ready summary: Cybersecurity is critical in 2025 because AI makes attacks faster and more believable, and connected systems multiply the impact.
đ§š Core attack types (with concise defenses)
đ 51% attack (blockchain)
- What it is: A single entity gains majority control over a blockchainâs compute, enabling double-spends or censorship.
- Defend fast: Prefer chains with strong decentralization, finality checkpoints, alerts for reorgs, and multiâsig treasury controls.
đ§ Sideâchannel attack (energy/EM âlisteningâ)
- What it is: Extracting secrets by observing power usage, electromagnetic emissions, timing, or cache patterns.
- Defend fast: Use hardware wallets with certified shielding, keep devices updated, enable PIN/passphrase, and avoid untrusted peripherals.
⥠Fault injection (tampering midâoperation)
- What it is: Glitching voltage/clock/laser to force chips into errors that leak secrets or bypass checks.
- Defend fast: Choose hardware with fault detection, enable secure boot/attestation, and physically secure critical devices.
đ§ Software attacks (inputs and logic abuse)
- What it is: Exploiting code flaws, unsafe input handling, dependencies, or misconfigurations to read, alter, or destroy data.
- Defend fast: Patch rapidly, apply least privilege, use WAF/RASP, SBOM + dependency scanning, and threatâmodel critical paths.
đ Brute force and credential stuffing
- What it is: Guessing passwords at scale or replaying leaked credentials across sites.
- Defend fast: Passwordless (FIDO2/passkeys), MFA, rate limiting, IP/device risk, credential leak detection, and unique passwords.
đš Scareware â Fear as a Weapon in Cyberattacks
Scareware is a manipulative form of malware that uses fear, urgency, and deception to trick users into taking harmful actions â usually by convincing them their device is infected or compromised. It often appears as an alarming popâup or fullâscreen browser alert with messages like âCritical Virus Detected!â or âYour system will be locked!â, sometimes paired with fake system scans or audio warnings. The goal? Push the victim into clicking a link, calling a fraudulent tech support number, or downloading rogue âsecurity softwareâ that is actually malicious. Modern scareware campaigns use social engineering, fake antivirus brands, and even deepfake audio to add credibility. To defend against scareware, close suspicious windows via task manager (never click âOKâ or âCancelâ), keep browsers and security software updated, use reputable antiâmalware tools, and remember: legitimate security alerts never demand urgent payment or phone calls.
đš Emerging threats
- AIâdriven social engineering: Deepfake voices, live video spoofs, and synthetic emails that mimic style and timing.
- Supplyâchain compromises: A single vendor/update can infect many downstream organizations.
- Ransomware evolution: Data theft before encryption, leak extortion, and targeted backups destruction.
- âHarvest now, decrypt laterâ: Adversaries exfiltrate encrypted data today to decrypt in the future.
- CAPTCHA evasion: Bots emulate human behavior; legacy challenges no longer suffice.
- API abuse: Token theft, permissive scopes, and insufficient rate limits expose sensitive data.
| Threat Vector | Why Itâs Urgent | Example |
|---|---|---|
| AIâDriven Attacks | Automates phishing, vulnerability scanning, deepfake scams | $25M deepfake CFO fraud case |
| Supply Chain Exploits | One vendor breach can ripple to thousands of customers | 2024 CDK Global auto dealer outage |
| ZeroâDay Vulnerabilities | Growing market for unpatched flaws | 11 of top 15 CVEs exploited in 2023 were zeroâday |
| IoT Exploitation | Billions of devices with weak security | Smart home camera hijacks for botnets |
| Quantum Threats | May break RSA/ECC in future | Governments funding postâquantum R&D |
| Generative AI Social Engineering | Hyperârealistic deepfake calls, docs, videos | Political misinformation & fraud |
đĄïž Modern defense strategies and checklists
Zero Trust essentials
- Verify explicitly (users, devices, services).
- Enforce least privilege and justâinâtime access.
- Segment networks and apply conditional policies.
Identity and access
- Passwordless + MFA on all critical accounts.
- Admin accounts isolated with hardware keys.
- Automated offboarding and periodic access reviews.
Email and social engineering
- DMARC/DKIM/SPF enforced; banner external mail.
- Phishing simulations and justâinâtime training.
- Highârisk workflows require callâbacks to known numbers.
Data protection and recovery
- Classify data; encrypt at rest/in transit.
- 3â2â1 backups with immutable copies; drill recovery.
- DLP for sensitive exfiltration paths.
Cloud and API security
- CSPM + CIEM; leastâprivileged service roles.
- API gateways with authZ, schema validation, and rate limits.
- Secrets management; no longâlived tokens.
Application and supply chain
- SBOM; pin dependencies; sign builds and artifacts.
- SAST/DAST/IAST + dependency and container scanning.
- Incident playbooks for vendor compromise.
Detection and response
- Centralized logging; UEBA and anomaly detection.
- EDR/XDR with automated containment.
- Tabletop exercises and purple teaming.
đȘ Cybersecurity for crypto users (quick wins)
- Use hardware wallets; enable PIN + optional passphrase.
- Store seed phrases offline on durable media; never share.
- Verify dApp URLs and contract addresses; avoid blind approvals.
- Separate wallets for trading vs. longâterm cold storage.
- Turn on transaction notifications and spending limits.
đč Cybersecurity for Forex Traders and Market Professionals
In the fastâpaced world of forex, commodities, and CFD trading, cybersecurity is as critical as market analysis. Trading platforms, VPS connections, and account credentials are prime targets for attackers who aim to hijack sessions, manipulate transactions, or steal capital. Traders should secure their edge by:
- Using a reputable VPS or dedicated server with firewalls, updated antivirus, and encrypted connections to reduce latency without sacrificing security.
- Enabling twoâfactor authentication (2FA) for broker logins and trading apps to block unauthorized access, even if passwords are compromised.
- Choosing regulated, wellâaudited brokers with transparent security policies, DDoS protection, and secure payment gateways.
- Avoiding public WiâFi for live trades â instead, use a private, VPNâsecured network to prevent session hijacking.
- Monitoring account activity daily and setting up instant alerts for withdrawals or trade executions you did not authorize.
- Segmenting devices: keep your trading terminal separate from personal browsing or email to lower crossâinfection risk.
A wellâplanned cyber hygiene routine not only preserves your capital but also ensures trade execution integrity â because in volatile markets, even a few seconds of disruption can mean the difference between profit and loss.
đ§ Actionable quick checklists
- Personal: passkeys/MFA, password manager, OS/browser updates, encrypted device backups, phishing skepticism.
- Small business: Zero Trust starter, email auth, EDR, backups with drills, vendor risk basics, incident plan with contacts.
- Dev teams: secure SDLC, threat modeling, SBOM, secrets vault, signed releases, API security tests.
â Cybersecurity FAQs (featured snippetâready)
What is cybersecurity in simple terms?
Cybersecurity is how we protect devices, data, and networks from digital attacks and unauthorized access.
What are the most common cybersecurity threats today?
Phishing and deepfakes, credential stuffing, ransomware, vulnerable thirdâparty software, and misconfigured cloud or APIs.
How can I improve my cybersecurity quickly?
Turn on MFA or passkeys, update your software, use a password manager, back up important data, and be cautious with unexpected links.
What is Zero Trust in cybersecurity?
Zero Trust means no user or device is trusted by default; everything is verified continuously with leastâprivilege access.
Do I need antivirus in 2025?
Yesâuse reputable endpoint protection with behavior detection, and pair it with OS hardening and browser protections.
How do I secure my crypto assets?
Use a hardware wallet, protect your seed phrase offline, verify dApps/contracts, and separate hot and cold wallets.
What is credential stuffing?
Attackers try leaked username/password pairs on other sites. Use unique passwords and MFA to stop it.
What is âharvest now, decrypt laterâ?
Attackers steal encrypted data today, planning to decrypt it in the future as computing power improves.
3 Catalysts pushing crypto forward in 2024
2024 is starting where 2023 left off. Momentum keeps driving crypto forward, with certain pockets benefitting in particular. Let’s dive into these key narratives and what 2024 may have in store for them.
1- Bitcoin ETF Launch – More than 10 years after the first Bitcoin ETF spot application, it appears we are primed for it to launch this month. Multiple applications from some of the largest asset managers are expected to receive a response regarding their approval as soon as today, January 5.

Source: IntoTheBlockâs Bitcoin ETF Perspectives
Will the Bitcoin ETF Finally be Approved? The answer to this question can vary significantly based on the person answering
- In a Bitwise report surveying financial advisors in Q4 showed that only 39% of advisors expected a spot Bitcoin ETF to launch in 2024
- On the other hand, Bloomberg ETF analysts have consistently been point at 90% odds of approval for the ETF, while a senior crypto reporter at TechCrunch pointed to the approval for multiple firms, “expecting something tomorrow” (January 5)
- While traditional finance companies were still skeptical of the Bitcoin ETF approval, people familiar with the matter suggest the approval to be imminent
Is an Approval Priced In? Given the seemingly high odds of approval, is the market move from the ETF already factored in by market participants?
- Following a hypothetical approval announcement, a poll from crypto anon Hsaka suggests that 50% of respondents believe prices will be at least 5% higher within 48 hours, with just 22% voting it would drop by 5% and the remainder voting for it to remain rangebound. Though not extremely bullish, it does show a positive consensus, opening things up for a potential downside surprise
- In a recent interview, Jim Bianco also noted that traders have been front-running the potential inflows from an ETF by investing into Bitcoin proxies such as Coinbase’s stock, MicroStrategy and GBTC, all which outperformed Bitcoin in the last quarter
What’s Next? The next week should be interesting as the final decisions are announced
If the ETF is approved, then the market’s attention is likely to shift to whether it’s an initial “sell the news” event first
The next parameter to watch will be just how much volume these ETFs are able to attract within the first days of trading. If these disappoint, there is potential risk for the market, which has been overly optimistic
Regardless of the outcome, the Bitcoin ETFs are likely to continue being a major catalyst affecting crypto in Q1 of 2024
2- Ethereum’s Dencun Upgrade Impact on L2s – After being delayed a few months, Ethereum is on track to deploy its next major upgrade in late Q1 or early Q2. EIP-4844, also known as protodank sharding, is one of the most anticipated changes coming, bringing down transaction costs on layer 2s by 10x or more

Source: IntoTheBlockâs Arbitrum Incentives Program dashboard
Accelerating L2 Growth – The main layer 2s have been seeing sharp growth in prices and key metrics
- Optimism’s OP token is up 180% over the last 90 days, while Arbitrum’s ARB has increased by 130% within the same period
- As we discussed in 2023 On-Chain, the number of transactions on these Ethereum L2s has climbed by more than 90x in the last two years
- The reduction in transaction costs is expected to attract further economic activity into L2s due to reduced friction
Arbitrum’s Moment – Although OP has outperformed over the last three months, Arbitrum metrics are showing signs of progress in 2024
- The total amount of trading volume on Arbitrum surpassed that of Ethereum Mainnet on January 4 for the first time, per DeFi Llama data
- Arbitrum’s incentive program has increased TVL on the L2 by nearly 50%, as shown in ITB’s dashboard
Overall, Ethereum’s transition to L2s has been in motion already, and is set to accelerate following the implementation of the Dencun upgrade. As such, the L2 ecosystem and their tokens are a main area of focus going into 2024.
3- Restaking & Liquid Staking – In terms of new products, EigenLayer’s launch is set to be one of the most anticipated releases of 2024. EigenLayer is an infrastructure layer that will enable “restaking”, or using Ethereum’s existing staked funds in order to validate additional features for applications building on top of it. Its launch is set to bring forth new applications, while benefitting the existing liquid staking protocols.

Source: IntoTheBlockâs Ethereum Liquid Staking Perspectives
Impact of Restaking on LSTs – Restaking on EigenlLayer will provide higher yields on top of the existing staking rate
- Users of EigenLayer can deposit liquid staking tokens, such as Lido’s stETH, and earn extra yield from the actively validated services (AVSs) they choose to validate
- Prior to their main launch, EigenLayer has already attracted over $1B in deposits, through their points program
- Over 70% of deposits into EigenLayer have come through liquid staking, pointing to large role these are likely to play as the launch approaches
- Building both restaking and data availability services, EigenLayer is also likely to offer one of the largest airdrops in crypto history, as evidenced by the funds they have managed to attract just off of their points system
Just a week into the year, chatter around restaking has grown as EigenLayer reached its cap of the amount of ETH staked into the product. Liquid staking projects governance tokens such as LDO have also been favored by the market, appreciating by over 10% year to date. Ultimately, the launch of this new primitive is expected to be one of the key narratives shaping crypto throughout the year.
The Hidden Dangers of Telegram Mods on Google Play
The Google Play Store, a hub for millions of apps, has been recently targeted by malicious Telegram clones, jeopardizing the security of thousands. These mods, eerily similar to the original and laden with spyware capabilities, pose a substantial threat to individual and business users alike.
Telegram, an encrypted messaging application, allows and encourages the development of âmodsâ â modified versions of the original software to enhance user experience. While most mods are developed with user benefits in mind, this openness has inadvertently given cybercriminals an opportunity to exploit unsuspecting users.
Masquerading as âfasterâ alternatives to the conventional Telegram app, these malignant clones have successfully eluded Google Playâs security measures. They predominantly target Chinese-speaking users, with app descriptions available in traditional Chinese, simplified Chinese, and the Uyghur language. A particular subset of these deceptive apps goes by âPaper Airplane,â which entices users with the promise of faster performance, attributing it to a global network of data centers.
The malevolent clones are distinguished from the genuine Telegram app by an embedded module â a powerful spyware that tracks all messenger activities, from collecting contacts to intercepting messages.
The staggering number of downloads â more than 60,000 â highlights the severity of the issue. The Uyghur-targeted version is especially alarming, considering the past surveillance and persecution faced by this ethnic minority by government agencies.
These revelations raise concerns for businesses, especially in light of the growth of mobile spyware and the vast personal and corporate data housed in smartphones. With businesses now leaning heavily on messenger apps for day-to-day communication, such findings serve as a stark reminder of the omnipresent cyber threats.
In response to these findings, Google initiated the removal of these deceptive Telegram clones from its store. Some of these apps had accumulated up to 10,000 downloads before their eventual removal. Nonetheless, concerns persist as not all versions of the malicious apps have been eradicated from the Play store.
Counterfeit apps have long been a staple in the hackerâs toolkit. Recent revelations exposed another scheme where hackers circulated bogus versions of Signal and Telegram through legitimate app stores to implant information-stealing malware. Another spyware-infused version of Telegram, labeled âFlyGram,â was identified on both Google Play and the Samsung Galaxy Store, as was a trojanized version of the Signal app, named Signal Plus Messenger.
Businesses, to safeguard their interests, are being advised to caution employees about the risks of third-party apps, even when sourced from reputed app stores. Users are encouraged to be vigilant, paying attention to details like the developer and negative user reviews, not just the appâs name.
7 Crypto News of the Week â Sep 28th Arzakhbar
1. SEC Delays Decision on ARK 21 Shares Bitcoin ETF to Next Year
The U.S. Securities and Exchange Commission (SEC) has delayed its decision on the spot Bitcoin exchange-traded fund (ETF) application of Ark/21Shares and GlobalX. The decision has been postponed for the third time, and the SEC now has until early 2024 to make a final decision. This delay is seen as the SEC’s continued reluctance to approve a spot bitcoin ETF. The delay has been attributed to various factors, including the likely federal government shutdown.
2. 95% of Celsius Creditors Vote to Accept Restructuring Plan
More than 95% of creditors across all eligible classes voted to accept the restructuring plan proposed by Celsius. This acceptance is seen as a major milestone in the context of the bankruptcy proceedings. The plan will see funds returned to the creditors and equity distributed through a new company. Confirmation hearings for the plan are scheduled to begin on October 2, 2023.
3. Ben Armstrong spends night in jail with prowling, simple assault charges
Crypto influencer Ben “BitBoy” Armstrong was arrested and spent a night in jail on charges of loitering and simple assault. He was taken into custody while livestreaming outside a former associate’s house. Armstrong was released on bail after about 8 hours in jail. He was charged with “loitering/prowling” and “simple assault by placing another in fear,” with a bond amount of $2,600 along with $40 of fees.
4. Curve Founder Michael Egorov Repays All Debt on Aave
Michael Egorov, the founder of Curve Finance, has deposited 68 million CRV tokens, worth $35 million, to settle his entire debt position on the DeFi lending platform Aave. After depositing CRV, Egorov converted 10.77 million crvUSD to tether (USDT) to repay all of the debt on Aave. CRV is currently trading at 53 cents, having risen by 3.48% in the past 24 hours.
In August, Egorov raised $42 million through over-the-counter (OTC) sales of CRV tokens to pay off $80 million of on-chain debt. This came after a market-wide tumble in asset prices which put Egorov’s CRV positions on DeFi lenders dangerously close to liquidation. In the event of liquidation, Aave would have had to sell the CRV put up as collateral to the open market, which would have had a cascading effect due to a lack of liquidity. Now, Egorov has 253.67 million CRV tokens ($132.52 million) in collateral and $42 million in debt across four DeFi lenders.
5. Arbitrum Odyssey Relaunched With The First Weekâs Tasks Are Now Available In GMX
The Arbitrum Odyssey campaign has been relaunched, and the first week’s tasks are now available in GMX. The campaign’s first task, hosted on GMX, kicked off on September 26 and will run until October 1. Participants are invited to undertake activities such as leveraged trading on the GMX V2 market and sharing GMX referral links across various social media platforms
6. Taiwan Implements Stricter Regulations, Bans Unregistered Foreign Crypto Exchanges from Operating
Taiwan’s Financial Supervisory Commission (FSC) has introduced a set of stringent rules, effectively banning unregistered foreign cryptocurrency exchanges from operating within the country. This action occurs as part of Taiwan’s commitment to enhancing investor protection and promoting responsible practices within the crypto industry. Foreign cryptocurrency firms seeking to operate in Taiwan or serve Taiwanese customers must always register with the regulator and demonstrate their adherence to anti-money laundering regulations.
7. Chinese Tech Giant Tencent Joins CBDC Interoperability Pilot
Chinaâs Tencent, the operator of the WeChat and WeChat Pay platforms, will join central bank-led digital yuan and CBDC interoperability pilots. WeChatPay, along with its rival Alipay, has cornered some 15% of the Chinese payments market. But in recent years, Tencent has moved to align with the Peopleâs Bank of China (PBoC)âs CBDC adoption drive.













