April’s record $600 million crypto hacks highlight the urgent need for proactive cybersecurity strategies.
Key takeaways
- April was a record-breaking month for hacking incidents in the crypto space, with 29 projects compromised and $600 million stolen.
- Investors are generally comfortable with market risks but are wary of hacking, operational, and regulatory risks.
- The rise of AI tools is contributing to an increase in hacking incidents within the crypto industry.
- A shift from defensive to offensive cybersecurity strategies could be more effective in combating cyber threats.
- The concept of privateering could empower private citizens to respond to cyberattacks, extending the defense surface.
- State-sponsored actors have significant advantages over startups in cybersecurity due to their vast resources.
- Implementing a recovery program for stolen crypto assets could attract entrepreneurs back to the US by providing a security umbrella.
- AI is expected to play a dual role in enhancing security measures and facilitating cyber threats.
- The frequency of cyber attacks is likely to increase as bad actors leverage AI tools.
- Bitcoin is expected to succeed regardless of regulatory clarity, showcasing its resilience.
- The current cybersecurity approach in crypto needs reevaluation to address the evolving threat landscape effectively.
- Empowering private citizens to hack back could be a novel strategy in modern cybersecurity.
- A proactive cybersecurity stance could mitigate the advantages held by state-sponsored actors.
- The intersection of AI and cybersecurity presents both challenges and opportunities for the crypto industry.
- A recovery program for stolen crypto could create a positive business model and enhance security for entrepreneurs.
Guest intro
Chris Perkins is the incoming Head of Crypto at Franklin Templeton, following the acquisition of his firm 250 Digital Asset Management. He specializes in crypto security and institutional adoption, with expertise in addressing the surge in crypto hacks and the intersection of geopolitics and digital asset markets. Perkins brings a deep understanding of how institutions are navigating the crypto landscape amid evolving cyber threats and regulatory developments.
The impact of hacking incidents on the crypto industry
- April was a particularly devastating month for hacking, with $600 million stolen from 29 projects. – Chris Perkins
- The scale of these incidents highlights the critical need for improved cybersecurity measures in the industry.
-
— Chris Perkins
- Investors are comfortable with market risk but not with hacking or operational risk. – Chris Perkins
-
— Chris Perkins
- Understanding the scale of these incidents is crucial for addressing the vulnerabilities in the crypto space.
- The rise in hacking incidents underscores the importance of developing robust security protocols.
- The crypto industry must prioritize cybersecurity to maintain investor confidence and market stability.
The role of AI in cybersecurity
- AI tools are contributing to an increase in hacking incidents within the crypto space. – Chris Perkins
-
— Chris Perkins
- AI presents both challenges and opportunities for enhancing security measures against cyber threats.
- The dual role of AI in facilitating and defending against cyber threats highlights its complexity.
- AI’s potential to provide “beautiful defense” against cyber threats is a promising development. – Chris Perkins
-
— Chris Perkins
- The evolving relationship between AI and cybersecurity requires ongoing attention and adaptation.
- Leveraging AI for security measures could significantly enhance the industry’s defense capabilities.
Shifting from defensive to offensive cybersecurity strategies
- The current approach to cybersecurity in crypto should shift from defense to offense. – Chris Perkins
-
— Chris Perkins
- A proactive stance could mitigate the advantages held by state-sponsored actors in cybersecurity.
- Empowering private citizens to respond to cyberattacks could extend the defense surface.
- The concept of privateering could be applied to modern cybersecurity by empowering private citizens to hack back. – Chris Perkins
-
— Chris Perkins
- A shift to offensive strategies could address the evolving threat landscape more effectively.
- Proactive measures in cybersecurity could provide a strategic advantage in combating cyber threats.
The imbalance between state actors and startups in cybersecurity
- State-sponsored actors have significant advantages over startups in cybersecurity due to their resources. – Chris Perkins
-
— Chris Perkins
- This imbalance emphasizes the need for innovative solutions to level the playing field.
- Startups face significant challenges in defending against well-resourced state actors.
- Addressing this resource imbalance is crucial for enhancing the cybersecurity of startups.
- Innovative strategies are needed to counter the advantages held by state-sponsored actors.
- The cybersecurity landscape requires adaptation to address the challenges faced by startups.
- Enhancing the capabilities of startups could improve the overall security of the crypto industry.
The potential benefits of a recovery program for stolen crypto assets
- Implementing a recovery program for stolen crypto assets could create a positive business model. – Chris Perkins
-
— Chris Perkins
- Such a program could enhance security for entrepreneurs and attract them back to the US.
- A recovery program could provide a security umbrella that encourages innovation and investment.
- The potential benefits of a recovery program highlight the importance of regulatory support.
- Entrepreneurs could be incentivized to operate within a secure and supportive environment.
- A recovery program could address the challenges faced by entrepreneurs in the crypto space.
- Enhancing security measures could foster a more robust and resilient crypto industry.
The resilience of Bitcoin amidst regulatory challenges
- Bitcoin is expected to succeed regardless of regulatory clarity. – Chris Perkins
-
— Chris Perkins
- This confidence in Bitcoin’s resilience underscores its potential as a leading digital asset.
- The regulatory environment presents challenges, but Bitcoin’s success is not solely dependent on it.
- Bitcoin’s resilience highlights its unique position within the crypto market.
- The potential for Bitcoin’s success amidst regulatory challenges reflects its robustness.
- Understanding Bitcoin’s resilience is crucial for navigating the evolving regulatory landscape.
- The future of Bitcoin remains promising despite ongoing regulatory uncertainties.
April’s record $600 million crypto hacks highlight the urgent need for proactive cybersecurity strategies.
Key takeaways
- April was a record-breaking month for hacking incidents in the crypto space, with 29 projects compromised and $600 million stolen.
- Investors are generally comfortable with market risks but are wary of hacking, operational, and regulatory risks.
- The rise of AI tools is contributing to an increase in hacking incidents within the crypto industry.
- A shift from defensive to offensive cybersecurity strategies could be more effective in combating cyber threats.
- The concept of privateering could empower private citizens to respond to cyberattacks, extending the defense surface.
- State-sponsored actors have significant advantages over startups in cybersecurity due to their vast resources.
- Implementing a recovery program for stolen crypto assets could attract entrepreneurs back to the US by providing a security umbrella.
- AI is expected to play a dual role in enhancing security measures and facilitating cyber threats.
- The frequency of cyber attacks is likely to increase as bad actors leverage AI tools.
- Bitcoin is expected to succeed regardless of regulatory clarity, showcasing its resilience.
- The current cybersecurity approach in crypto needs reevaluation to address the evolving threat landscape effectively.
- Empowering private citizens to hack back could be a novel strategy in modern cybersecurity.
- A proactive cybersecurity stance could mitigate the advantages held by state-sponsored actors.
- The intersection of AI and cybersecurity presents both challenges and opportunities for the crypto industry.
- A recovery program for stolen crypto could create a positive business model and enhance security for entrepreneurs.
Guest intro
Chris Perkins is the incoming Head of Crypto at Franklin Templeton, following the acquisition of his firm 250 Digital Asset Management. He specializes in crypto security and institutional adoption, with expertise in addressing the surge in crypto hacks and the intersection of geopolitics and digital asset markets. Perkins brings a deep understanding of how institutions are navigating the crypto landscape amid evolving cyber threats and regulatory developments.
The impact of hacking incidents on the crypto industry
- April was a particularly devastating month for hacking, with $600 million stolen from 29 projects. – Chris Perkins
- The scale of these incidents highlights the critical need for improved cybersecurity measures in the industry.
-
— Chris Perkins
- Investors are comfortable with market risk but not with hacking or operational risk. – Chris Perkins
-
— Chris Perkins
- Understanding the scale of these incidents is crucial for addressing the vulnerabilities in the crypto space.
- The rise in hacking incidents underscores the importance of developing robust security protocols.
- The crypto industry must prioritize cybersecurity to maintain investor confidence and market stability.
The role of AI in cybersecurity
- AI tools are contributing to an increase in hacking incidents within the crypto space. – Chris Perkins
-
— Chris Perkins
- AI presents both challenges and opportunities for enhancing security measures against cyber threats.
- The dual role of AI in facilitating and defending against cyber threats highlights its complexity.
- AI’s potential to provide “beautiful defense” against cyber threats is a promising development. – Chris Perkins
-
— Chris Perkins
- The evolving relationship between AI and cybersecurity requires ongoing attention and adaptation.
- Leveraging AI for security measures could significantly enhance the industry’s defense capabilities.
Shifting from defensive to offensive cybersecurity strategies
- The current approach to cybersecurity in crypto should shift from defense to offense. – Chris Perkins
-
— Chris Perkins
- A proactive stance could mitigate the advantages held by state-sponsored actors in cybersecurity.
- Empowering private citizens to respond to cyberattacks could extend the defense surface.
- The concept of privateering could be applied to modern cybersecurity by empowering private citizens to hack back. – Chris Perkins
-
— Chris Perkins
- A shift to offensive strategies could address the evolving threat landscape more effectively.
- Proactive measures in cybersecurity could provide a strategic advantage in combating cyber threats.
The imbalance between state actors and startups in cybersecurity
- State-sponsored actors have significant advantages over startups in cybersecurity due to their resources. – Chris Perkins
-
— Chris Perkins
- This imbalance emphasizes the need for innovative solutions to level the playing field.
- Startups face significant challenges in defending against well-resourced state actors.
- Addressing this resource imbalance is crucial for enhancing the cybersecurity of startups.
- Innovative strategies are needed to counter the advantages held by state-sponsored actors.
- The cybersecurity landscape requires adaptation to address the challenges faced by startups.
- Enhancing the capabilities of startups could improve the overall security of the crypto industry.
The potential benefits of a recovery program for stolen crypto assets
- Implementing a recovery program for stolen crypto assets could create a positive business model. – Chris Perkins
-
— Chris Perkins
- Such a program could enhance security for entrepreneurs and attract them back to the US.
- A recovery program could provide a security umbrella that encourages innovation and investment.
- The potential benefits of a recovery program highlight the importance of regulatory support.
- Entrepreneurs could be incentivized to operate within a secure and supportive environment.
- A recovery program could address the challenges faced by entrepreneurs in the crypto space.
- Enhancing security measures could foster a more robust and resilient crypto industry.
The resilience of Bitcoin amidst regulatory challenges
- Bitcoin is expected to succeed regardless of regulatory clarity. – Chris Perkins
-
— Chris Perkins
- This confidence in Bitcoin’s resilience underscores its potential as a leading digital asset.
- The regulatory environment presents challenges, but Bitcoin’s success is not solely dependent on it.
- Bitcoin’s resilience highlights its unique position within the crypto market.
- The potential for Bitcoin’s success amidst regulatory challenges reflects its robustness.
- Understanding Bitcoin’s resilience is crucial for navigating the evolving regulatory landscape.
- The future of Bitcoin remains promising despite ongoing regulatory uncertainties.
Loading more articles…
You’ve reached the end
Add us on Google
`;
}
function createMobileArticle(article) {
const displayDate = getDisplayDate(article);
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const captionHtml = article.imageCaption ? `
${article.imageCaption}
` : ”;
const authorHtml = article.isPressRelease ? ” : `
`;
return `
${captionHtml}
${article.subheadline ? `
${article.subheadline}
` : ”}
${createSocialShare()}
${authorHtml}
${displayDate}
${article.content}
${article.isPressRelease ? ” : article.isSponsored ? `
` : `
`}
`;
}
function createDesktopArticle(article, sidebarAdHtml) {
const editorSlug = article.editor ? article.editor.toLowerCase().replace(/\s+/g, ‘-‘) : ”;
const displayDate = getDisplayDate(article);
const captionHtml = article.imageCaption ? `
${article.imageCaption}
` : ”;
const categoriesHtml = article.categories.map((cat, i) => {
const separator = i < article.categories.length – 1 ? ‘|‘ : ”;
return `${cat}${separator}`;
}).join(”);
const desktopAuthorHtml = article.isPressRelease ? ” : `
`;
return `
${categoriesHtml}
${article.subheadline}
` : ”}
${desktopAuthorHtml}
${displayDate}
${createSocialShare()}
${captionHtml}
${article.isPressRelease ? ” : article.isSponsored ? `
` : `
`}
`;
}
function loadMoreArticles() {
if (isLoading || !hasMore) return;
isLoading = true;
loadingText.classList.remove(‘hidden’);
// Build form data for AJAX request
const formData = new FormData();
formData.append(‘action’, ‘cb_lovable_load_more’);
formData.append(‘current_post_id’, lastLoadedPostId);
formData.append(‘primary_cat_id’, primaryCatId);
formData.append(‘before_date’, lastLoadedDate);
formData.append(‘loaded_ids’, loadedPostIds.join(‘,’));
fetch(ajaxUrl, {
method: ‘POST’,
body: formData
})
.then(response => response.json())
.then(data => {
isLoading = false;
loadingText.classList.add(‘hidden’);
if (data.success && data.has_more && data.article) {
const article = data.article;
const sidebarAdHtml = data.sidebar_ad_html || ”;
// Check for duplicates
if (loadedPostIds.includes(article.id)) {
console.log(‘Duplicate article detected, skipping:’, article.id);
// Update pagination vars and try again
lastLoadedDate = article.publishDate;
loadMoreArticles();
return;
}
// Add to mobile container
mobileContainer.insertAdjacentHTML(‘beforeend’, createMobileArticle(article));
// Add to desktop container with fresh ad HTML
desktopContainer.insertAdjacentHTML(‘beforeend’, createDesktopArticle(article, sidebarAdHtml));
// Update tracking variables
loadedPostIds.push(article.id);
lastLoadedPostId = article.id;
lastLoadedDate = article.publishDate;
// Execute any inline scripts in the new content (for ads)
const newArticle = desktopContainer.querySelector(`article[data-article-id=”${article.id}”]`);
if (newArticle) {
const scripts = newArticle.querySelectorAll(‘script’);
scripts.forEach(script => {
const newScript = document.createElement(‘script’);
if (script.src) {
newScript.src = script.src;
} else {
newScript.textContent = script.textContent;
}
document.body.appendChild(newScript);
});
}
// Trigger Ad Inserter if available
if (typeof ai_check_and_insert_block === ‘function’) {
ai_check_and_insert_block();
}
// Trigger Google Publisher Tag refresh if available
if (typeof googletag !== ‘undefined’ && googletag.pubads) {
googletag.cmd.push(function() {
googletag.pubads().refresh();
});
}
} else if (data.success && !data.has_more) {
hasMore = false;
endText.classList.remove(‘hidden’);
} else if (!data.success) {
console.error(‘AJAX error:’, data.error);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
}
})
.catch(error => {
console.error(‘Fetch error:’, error);
isLoading = false;
loadingText.classList.add(‘hidden’);
hasMore = false;
endText.textContent=”Error loading more articles”;
endText.classList.remove(‘hidden’);
});
}
// Set up IntersectionObserver
const observer = new IntersectionObserver(function(entries) {
if (entries[0].isIntersecting) {
loadMoreArticles();
}
}, { threshold: 0.1 });
observer.observe(loadingTrigger);
})();
All content is for informational purposes only and does not constitute investment advice. CryptoBriefing does not provide recommendations to buy, sell, or hold any asset or contract. See our Disclaimer & Risk Disclosure.
© Decentral Media and Crypto Briefing® 2026.
Source: https://cryptobriefing.com/chris-perkins-april-saw-600-million-stolen-in-record-hacking-incidents-ai-tools-are-both-a-threat-and-a-defense-and-a-shift-to-offensive-cybersecurity-is-crucial-the-pomp-podcast/








