Part 1 Beginner Why long-term crypto holders borrow against assets instead of selling A strategic guide to liquidity management, capital preservation, and the real tradeoff between selling and borrowing crypto Open guide
CryptoGamesFollow the latest crypto headlines, top categories, and market-moving stories.
JPMorgan’s $30 billion Strategy call exposes Bitcoin’s new market fault line Digital Asset Treasuries May 14, 2026 Explore why savvy investors borrow against crypto instead of selling, with insights on liquidity, capital preservation, and portfolio strategy.
Part 1 Beginner Why long-term crypto holders borrow against assets instead of selling A strategic guide to liquidity management, capital preservation, and the real tradeoff between selling and borrowing crypto Open guide
Part 2 Beginner Why collateral reuse is the hidden risk in crypto lending Rehypothecation is a core risk in crypto lending. Learn how collateral reuse works, why it has amplified past failures, and how to evaluate safer platforms. Open guide Explore CryptoSlate’s Institutional Playbook, a 3-part guide series on exchange due diligence, crypto-as-a-service, and token listing strategy for institutional teams.
Part 1 Advanced The Market Maker’s Exchange Checklist (Liquidity, Latency, and Risk Controls) Market makers and HFT desks: evaluate exchanges on execution quality, liquidity, latency, fees, margin, and security — with a WhiteBIT walkthrough. Open guide
Part 2 Advanced Crypto-as-a-Service Playbook: How Banks, Telcos, and Fintechs Launch Crypto Products Fast, Safely, and Compliantly An institutional playbook for launching crypto via CaaS: architecture, phased rollout, security, compliance, payments, KPIs, and vendor diligence. Open guide
Part 3 Advanced Token Listing Playbook — How Projects Prepare for a CEX Listing and Sustain Healthy Liquidity A practical playbook for crypto teams to prepare for a CEX listing: readiness, integration, liquidity, market making, launch comms, and post-listing ops. Open guide Browse trusted reviews across exchanges, casinos, wallets, cards, and more.
Company resources, help, legal information, and ways to follow CryptoSlate.
JPMorgan’s $30 billion Strategy call exposes Bitcoin’s new market fault line Digital Asset Treasuries Neutral May 14, 2026
Trump’s CEO-filled China visit can decide whether Bitcoin’s $80,000 risk rally survives this week Macro Neutral May 13, 2026
Global financial crisis fears grow as bond yields hit 1998 levels and Bitcoin drops below $80,000 Macro Bearish May 13, 2026
Wall Street is buying XRP while Binance traders keep betting against it Market Neutral May 13, 2026
Buy Borrow Die Why long-term crypto holders borrow against assets instead of selling
Buy Borrow Die Why collateral reuse is the hidden risk in crypto lending
Institutional Playbook The Market Maker’s Exchange Checklist (Liquidity, Latency, and Risk Controls)
Institutional Playbook Crypto-as-a-Service Playbook: How Banks, Telcos, and Fintechs Launch Crypto Products Fast, Safely, and Compliantly
Institutional Playbook Token Listing Playbook — How Projects Prepare for a CEX Listing and Sustain Healthy Liquidity Reports on sanctions, cybercrime, and alleged state-linked hacks targeting digital assets.
N. Korean hackers employ thousands of shadow workers that pose as recruiters or potential employees to infiltrate crypto firms.
Monika Ghosh 2 min read
OFAC sanctioned six addresses belonging to Kim Sang Man.
Since 2017, the North Korea-backed hackers stole $721 million from Japan — equating to 30% of their illicit wealth.
The accused allegedly laundered funds from exchange thefts and foreign workers.
Coin Center warns of the potential for US authorities to block, restrict, and ban entire asset classes — including cryptocurrency.
The group carries out phishing attacks, steals credentials, and relies on cloud mining.
Euler Labs warned its exploiter not to open the encrypted message under any circumstance, urging him to return the stolen funds.
Euler Labs CEO Michael Bentley tweeted on March 17 that the DeFi protocol's exploited lines of codes were previously audited.
The majority of $234 million stolen in the attack was already laundered. The recent movements involved funds that were dormant for 4.5 years.