Technology ❯ Cryptocurrency ❯ Stablecoins ❯ Security
Security firms describe an isolated wallet compromise rather than a platform exploit, and the method of the key exposure remains under investigation.