Is USDC Surpassing USDT in the Stablecoin Market?

For many years, Tether’s USDT has been the stablecoin of choice in the cryptocurrency market, enjoying a formidable market share. Emerging as the third-largest cryptocurrency by market capitalization, USDT was valued at $110.64 billion and commanded a 69% slice of the stablecoin market landscape. However, recent developments indicate that a substantial shift is underway. Circle’s USDC, once the underdog in comparison to USDT’s might, is witnessing a transaction volume on a brisk upward trajectory, signaling a potential change in the stablecoin hierarchy.

This shift isn’t a mere blip on the radar but represents a robust trend, as data since January reveals. According to a metric by Visa and Allium Labs, USDC’s transaction volume has surged to a groundbreaking $456 billion. Yes, you read that right—USDC is outpacing USDT, which logged a transaction volume of $89 billion over the same period. The new metric introduced by Visa aims to cut through the noise and discount activities that could artificially inflate numbers to provide a truer representation of the state of affairs in the stablecoin domain.

The Underlying Reasons for the Shift

Tether’s USDT has long reigned supreme in the stablecoin arena, boasting a whopping 69% market share and a colossal market cap of $110.64 billion, making it the third-largest cryptocurrency. Lately, however, a challenger has been making waves. Circle’s USDC is rapidly gaining ground with a notable surge in transaction volume that hints at a possible upset in the stablecoin balance of power.

Since January, USDC has clocked an impressive $456 billion in transactions, leapfrogging the $89 billion recorded by USDT, based on metrics provided by Visa and Allium Labs. This measurement method was crafted to more accurately reflect true market activity by filtering out potentially misleading data that could skew perceptions of stablecoin usage.

This significant uptick in USDC’s transaction volume could suggest a shift in user preference and has implications for the future hierarchy within the stablecoin market. The torch of the stablecoin giant may soon be passing, with USDC nipping at the heels of the long-standing frontrunner, USDT.

Explore more

Unlinked: Bridging Gaps in Data Governance Strategies

Imagine a sprawling organization with cutting-edge technology, vast data resources, and ambitious goals, yet it struggles to achieve its strategic objectives due to hidden disconnects in its data governance framework, a scenario far too common in today’s fast-paced business landscape. Data serves as the backbone of decision-making, and many enterprises invest heavily in strategies and systems, but the execution often

DragonForce Claims Belk Data Breach in Retail Cyber Wave

What happens when a trusted retail name, a cornerstone of shopping in the southeastern United States, falls prey to a ruthless cybercriminal cartel? Picture thousands of customers’ personal details exposed, a company’s reputation hanging by a thread, and an unseen enemy gloating over stolen data. This is the reality for Belk, a North Carolina-based department store chain with nearly 300

GLOBAL GROUP RaaS Unleashes AI-Driven Ransomware Threat

In an era where digital threats evolve at an alarming pace, a new ransomware-as-a-service (RaaS) operation known as GLOBAL GROUP has emerged as a formidable challenge to global cybersecurity, targeting critical industries with unprecedented sophistication. Having surfaced in June of the current year, this operation rapidly established itself as a significant player in the cybercrime landscape by claiming numerous victims

WhatsApp Zero-Click Exploit – Review

Imagine a scenario where a simple notification on a messaging app like WhatsApp could silently compromise an entire device, executing malicious code without the user ever tapping a button or opening a message. This chilling possibility is not science fiction but a real threat known as the zero-click exploit, a vulnerability so stealthy that it has become a top priority

How Does SHUYAL Malware Threaten Your Browser Security?

What if the very tool used to navigate the digital world—your web browser—became a gateway for cybercriminals to steal your most private information? In an age where online security is paramount, a menacing new threat known as SHUYAL has emerged, silently infiltrating 19 popular browsers, from Google Chrome to privacy-focused options like Tor. This malware doesn’t just lurk in the