DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 8

Traders Buying Upside Calls on Oil Via BNO As Conflict Insurance Rather Than Directional Bets

0

Traders aren’t piling into upside calls, out-of-the-money call options that profit if oil prices rise sharply because they’re convinced the next big move is higher. Instead, they’re treating them as conflict insurance—a hedge against a potential escalation in the Iran situation. This is defensive positioning, not directional conviction.

Declining futures open interest + falling volume: Speculative longs are actually exiting or reducing exposure. That collapsing open interest signals the market isn’t loading up for a sustained oil-price rally—it’s just buying protection in case things flare up again.

Implied volatility (IV) at 72.80%

This is elevated IV percentile ~88% recently, meaning options are pricing in the possibility of big daily swings, roughly ±4–5% moves in a single day aren’t out of the question. The IV rank being only ~50% shows this kind of volatility has been a persistent feature all year because of the war, not a fresh spike.

Call skew is the giveaway: When upside calls are in higher demand than downside puts or priced with richer IV, it reflects asymmetric fear of a supply-shock tail event. Classic behavior during geopolitical flare-ups. Oil prices spiked hard earlier in the conflict but have since pulled back from war highs as some de-escalation signals like ceasefire talks, potential reopening of shipping lanes emerged.

Yet the market remains on edge—hence the insurance buying. BNO itself has been trading in the $48–$55 range recently, still up massively year-to-date but well off its peak. This isn’t a bullish oil to the moon signal. It’s the market saying, We don’t know how bad the next headline could be, so we’re paying up for protection just in case.

High IV also makes selling volatility attractive to some institutions, but retail traders should treat these options as expensive insurance policies—great for hedging, risky for naked directional bets. Geopolitical risks like this can reverse fast, but the options market is clearly telling you the unknown unknown upside risk is what everyone’s most worried about right now.

This flow signals asymmetric fear of an upside tail risk; sharp supply disruption if Iran-related talks break down or the Strait of Hormuz sees renewed issues without broad bullish conviction on sustained higher oil prices. Collapsing futures open interest and declining volume reinforce that speculators are reducing net long exposure overall.

The calls act more like portfolio protection; similar to buying insurance against a black swan than a bet that oil must go higher. Call skew being elevated is classic in geopolitical flare-ups: the market pays up for protection against sudden spikes, even as the base case leans toward de-escalation or partial normalization. Oil can remain range-bound or grind lower on ceasefire hopes, but any negative headline could trigger a violent rebound. High IV prices in big potential daily moves, making options expensive but reflective of real uncertainty.

Even temporary disruptions to ~20% of global seaborne oil via Hormuz raise fuel, transport, and goods costs. This is a supply-side shock that can feed into higher CPI/PCE readings, complicating central bank decisions. Prolonged $100+ oil would amplify stagflationary risks—higher prices with potential growth drag. Airlines, shipping, and consumer discretionary sectors face margin pressure from higher fuel and insurance costs. Refiners may see mixed effects. Energy producers and related infrastructure benefit.

If the shock persists, it could slow global activity especially import-dependent economies in Europe/Asia, though the U.S. is relatively more insulated as a net exporter. Markets have shown resilience so far, with equities rallying on de-escalation signals despite the oil volatility.

Pure-play energy  such as BNO, USO, energy stocks like XOM, defense, and certain shipping and insurance names. Oil traders thrive on volatility itself. Airlines/cruises (fuel costs), broad equities especially growth and tech if inflation fears rise, and EM currencies tied to energy imports. Gold and other safe-havens can see mixed moves. Broader equity volatility (VIX) often correlates with oil swings during these episodes.

Energy stocks have been strong YTD but can whipsaw on headlines—e.g., sharp drops on ceasefire news even if fundamentals remain supportive long-term. High IV means buying those upside calls is costly. Better as a hedge in a diversified portfolio than a standalone directional trade. Some institutions are now shorting volatility as peace hopes build, betting on mean-reversion in IV. Ceasefire durability and Strait of Hormuz reopening (even partial and toll-based reopening could ease pressure, but insurance premiums and caution may linger).

Shifts in open interest and volume—any resurgence in longs would flip the insurance only narrative. Inflation prints, Fed signals, and global demand indicators. Geopolitical events resolve faster than markets often price, but unknown unknowns justify keeping some dry powder or protective structures. Avoid over-leveraging naked options in this environment. The setup points to persistent but potentially transient volatility rather than a new secular bull market in oil.

It keeps a lid on aggressive risk-taking across assets while creating opportunities in energy and vol-related trades. If de-escalation sticks, expect IV compression and oil to ease; if talks falter, the insurance buyers get paid off handsomely on the upside.This remains highly headline-driven—monitor U.S.-Iran developments closely, as even rumors can swing prices 5%+ intraday.

U.S. Weighs Controlled Rollout of Anthropic Mythos as Cybersecurity Enters a New Phase

0

The U.S. government is moving to place one of the most powerful new cybersecurity tools yet developed into the hands of federal agencies, even as officials acknowledge that the same technology could introduce a new class of risk to already fragile digital systems.

The new tool is Mythos, a frontier model developed by Anthropic, which is being tested under a restricted program known as Project Glasswing. The initiative allows select organizations to access an early version of the system for defensive purposes, reflecting a broader shift in how governments are beginning to operationalize advanced artificial intelligence in national security.

What distinguishes Mythos is not simply its ability to write code or analyze systems, but the speed and scale at which it can uncover weaknesses. According to people familiar with its early use, the model has already identified thousands of vulnerabilities across widely used software, from operating systems to web infrastructure. In conventional cybersecurity workflows, such discoveries would take months, sometimes years, to surface through manual audits or fragmented testing processes.

That compression of time is precisely what makes the tool both valuable and potentially destabilizing.

In a communication to senior officials, the White House Office of Management and Budget indicated that it is working with industry partners and intelligence agencies to establish safeguards before allowing broader access to a modified version of the system. The message, sent by federal chief information officer Gregory Barbaccia, stopped short of confirming when or how agencies would begin using the model, but made clear that preparations are underway.

“We’re working closely with model providers, other industry partners, and the intelligence community to ensure the appropriate guardrails and safeguards are in place before potentially releasing a modified version of the model to agencies,” Barbaccia said.

The careful phrasing pinpoints the dilemma facing policymakers. Tools like Mythos could fundamentally change how governments defend critical infrastructure. By automating the discovery of software flaws and mapping potential attack paths, they offer the possibility of shifting cybersecurity from a reactive discipline, responding to breaches after they occur, to a more anticipatory one, where vulnerabilities are identified and addressed before they can be exploited.

But that same capability raises uncomfortable questions. A system that can rapidly identify and simulate exploitation of weaknesses could, in the wrong hands, accelerate the development of sophisticated cyberattacks. The concern is not theoretical. Security analysts have long warned that advances in automation could tilt the balance toward offense, particularly if defensive measures fail to keep pace.

This is why the U.S. government appears to be proceeding with unusual caution. Officials are exploring a controlled deployment, likely with restrictions on how the system can be queried, what data it can access, and how its outputs are monitored, rather than releasing the model broadly. The goal is to capture the defensive benefits while limiting the risk of misuse or unintended leakage.

The stakes are high

Federal agencies oversee vast networks of legacy and modern systems, many of which underpin essential services ranging from financial infrastructure to national defense. These systems are often complex, interconnected, and difficult to secure comprehensively. A tool capable of scanning such environments at scale could expose weaknesses that have gone undetected for years.

At the same time, the initiative reflects a growing recognition that the threat landscape is evolving faster than traditional defenses. State-backed actors and organized cyber groups are already experimenting with automation and machine-assisted attacks. In that context, withholding advanced tools from defenders may no longer be a viable strategy. The calculus is shifting toward controlled adoption, even if it introduces new layers of risk.

The move also highlights the changing dynamics between Washington and the private sector. Anthropic has been in discussions with the Trump administration over the deployment of Mythos, even as its relationship with the Pentagon has faced strain following a contract dispute. Treasury and Fed chiefs had earlier warned banks executives about deploying Mythos.The engagement offers Anthropic an opportunity to position itself at the center of a rapidly expanding market for AI-driven cybersecurity tools, one that is likely to attract sustained government and enterprise spending.

For the government, it is a test of whether emerging technologies can be harnessed without outpacing the institutions meant to regulate and control them.

Beyond immediate deployment questions, the introduction of systems like Mythos signals a deeper transformation. Cybersecurity is moving away from incremental improvements toward a model defined by asymmetry and speed, where the ability to process vast amounts of code and system data in real time becomes a decisive advantage. In such an environment, the distinction between defense and offense becomes increasingly blurred, and the margin for error narrows.

The absence of a clear rollout timeline indicates that officials are acutely aware of these dynamics.

Slash Financial Raises $100M in a Series C Round at $1.4B Valuation

0

Slash Financial, a business banking and payments platform, has raised $100 million in a Series C round at a $1.4 billion valuation, achieving unicorn status.

The round was led by Ribbit Capital, with Khosla Ventures and Goodwater Capital which led the prior Series B co-leading. Returning investors included New Enterprise Associates (NEA) and Y Combinator participating for the fourth time. This brings Slash’s total funding to about $160 million. The $1.4B post-money valuation is a significant increase from the ~$370M valuation in its Series B about 16 months earlier, when it raised $41M.

The company reports nearly $300 million in annualized revenue and claims to be profitable. It serves around 5,000 businesses, including fast-growing companies. Victor Cardenas and Kevin Bai, now 24-year-olds and college dropouts former Stanford students and Thiel Fellows. They started the company as teenagers. Slash provides an all-in-one business banking platform with accounts, corporate cards, treasury management, payments, and transfers.

It positions itself as a modern alternative to traditional banks and competitors like Ramp and Brex, emphasizing real-time financial visibility, automation, and tools tailored for businesses including support for crypto and stablecoins in some contexts. Alongside the funding announcement, Slash launched Twin, described as an AI-powered banking assistant. It can autonomously handle tasks like payments, invoices, expense management, and even control corporate cards on behalf of users—framed as agentic payments or letting AI agents transact independently.

The company originally focused on vertical banking for sneaker resellers and similar niches but pivoted after market disruptions including impacts tied to Kanye West’s Yeezy-related issues, which affected that ecosystem. It has since broadened into general business finance with heavy AI integration. This round reflects strong investor confidence in AI-driven fintech for corporate spend management, especially amid competition in the space.

The involvement of top-tier VCs like Ribbit, Khosla, and Goodwater highlights the bet on scalable, automated business banking tools. Valuation nearly quadrupled from ~$370M in the Series B just 16 months prior, validating rapid growth and the pivot from niche sneaker-reseller banking to a generalist AI-powered business banking platform.

Adds ~$100M (total funding now >$160M) for product development, global expansion, and accelerating AI automation. The company reports ~$300M annualized revenue, profitability, ~5,000 business customers, and strong stablecoin payment volume > $1B annualized in some reports.

Launch of Twin enables conversational finance management, autonomous tasks like payments, invoices, card control, insights, and agentic workflows. This positions Slash as more than a bank — an intelligent financial OS. Intensified competition in spend management and corporate cards directly challenges Ramp, valued much higher at ~$32B and Brex recently acquired by Capital One at a steep discount.

Slash emphasizes AI agents, stablecoin support, and real-time automation as edges against legacy banks and incumbents. Highlights investor appetite for automation in back-office finance. Reinforces a broader 2026 trend of larger, concentrated fintech deals focused on profitability + AI, amid stablecoin growth and non-bank competition. Two 24-year-old college dropouts scaling to unicorn status underscores shifting investor openness to young, adaptable teams over traditional credentials — especially after surviving a near-death pivot.

Slash’s heavy processing of stablecoin payments for businesses turns crypto infrastructure into practical, boring corporate finance tools. Positive for late-stage fintech in a selective funding environment; larger rounds are going to profitable, high-growth players integrating AI deeply.

Circle USDC Faces Class-action Suit Over its Handling of Drift Protocol Hack

0

A class-action lawsuit has been filed against Circle Internet Group (issuer of USDC) over its handling of the April 1 Drift Protocol hack on Solana.

On April 1, 2026, hackers widely attributed by blockchain analytics firm Elliptic to North Korean state-sponsored actors, likely Lazarus Group exploited Drift Protocol, a Solana-based DeFi platform, draining roughly $280–285 million in user funds—mostly in USDC and other assets from trading, lending, and vaults. This ranks as one of the largest crypto exploits of 2026.

The attackers then converted and moved a significant portion—approximately $230 million in stolen USDC—from Solana to Ethereum. They did this via Circle’s own Cross-Chain Transfer Protocol (CCTP) in over 100 transactions spanning 6–8 hours during U.S. business hours. Circle did not freeze the funds during this window.
ccn.com

The lawsuit filed in U.S. District Court in Massachusetts by Gibbs Mura, A Law Group. Lead plaintiff is Drift investor Joshua McCollum, representing a proposed class of over 100 affected users. Circle had the technical and contractual ability through its USDC policies and CCTP to freeze the stolen funds but failed to act. This allegedly allowed the hackers to launder the proceeds, deepening investor losses.

Claims include negligence and aiding and abetting conversion of stolen property. Plaintiffs argue Circle’s inaction was especially glaring because it has frozen civilian wallets quickly in the past when directed by authorities. Drift Protocol itself has signaled it may abandon USDC for settlements post-hack possibly switching to USDT. Circle has consistently stated it only freezes USDC upon a valid law enforcement request or court order—not unilaterally.

CEO Jeremy Allaire and Chief Strategy Officer Dante Disparte have defended this publicly after the hack, calling unilateral action a moral quandary that could expose the company to legal risks and undermine trust in stablecoins as rule-of-law assets. They’ve advocated for clearer regulatory frameworks and liability protections for issuers. Critics contrasted this with faster freezes by Tether in similar cases and pointed out Circle’s CCTP infrastructure was actively used by the attackers.

Circle’s Cross-Chain Transfer Protocol (CCTP) is a permissionless, on-chain messaging protocol designed specifically for moving native USDC between supported blockchains. It uses a burn-and-mint mechanism instead of traditional lock-and-mint bridges, eliminating liquidity pools, wrapped tokens, custodians, or third-party fillers. This keeps the total USDC supply constant and unified across chains while minimizing capital inefficiency and bridge-related risks.

CCTP is currently on V2; the canonical version as of 2026. V1 is legacy, limited to slower Standard transfers only, and is scheduled for full deprecation; contracts paused after July 31, 2026. V2 adds Fast Transfers, programmable Hooks, broader chain support including Solana, Ethereum, Arbitrum, Base, Avalanche, Polygon, and others, and improved speed and composability.

 

USDC’s blacklisting and freeze capability is a feature for compliance; anti-money laundering, sanctions but creates liability if not used aggressively enough in hacks. This suit tests where the line is. North Korea lnk: If confirmed, it ties into broader U.S. concerns about state-sponsored crypto theft funding regimes. A win for plaintiffs could pressure all stablecoin issuers to act faster on hacks—or face lawsuits. It also highlights tensions in centralized vs. decentralized finance.

Circle has not yet issued a public comment specifically on the new lawsuit filing. The case is in early stages—expect motions to dismiss and details on what real-time alerts Circle received from investigators or law enforcement. This is classic crypto drama: innovation meets real-world legal accountability. The outcome could shape how stablecoin issuers balance compliance, user protection, and operational speed in future exploits.

Dangote to Open 10% of Refinery to Public Markets Across Africa

0

Africa’s most prominent industrial conglomerate is preparing for a partial opening of its flagship energy asset, a move that signals both confidence in its operational turnaround and a shift toward capital recycling for an aggressive expansion programme spanning refining, petrochemicals, and mining.

Aliko Dangote confirmed in Washington that about 10% of Dangote Petroleum Refinery and Petrochemicals FZE will be listed across African exchanges, with advisers including Stanbic IBTC Capital, Vetiva Advisory Services, and FirstCap already engaged in structuring what could become a benchmark transaction for the continent’s energy sector.

The listing is being framed as a minority float, but its implications extend far beyond the size of the stake being sold. Dangote said the refinery will pay dividends in dollars, a design choice that directly addresses one of the most persistent constraints in African capital markets: currency risk. For institutional investors, dollar-denominated returns effectively insulate earnings from local currency volatility, making the asset more comparable to global energy peers than typical regional industrial firms.

“We will list as much as possible, maybe 10 per cent or so,” Dangote said, offering limited detail on valuation but underscoring flexibility in timing and structure.

The decision to list comes at a moment when the refinery is transitioning from construction-led execution to steady-state production. The 650,000-barrels-per-day facility has reached full operational capacity after a difficult ramp-up phase marked by logistics constraints, feedstock alignment challenges, and commissioning delays. Its current output profile is now shifting toward export growth, particularly in diesel and jet fuel, with shipments already reaching markets in West Africa and parts of Europe.

That export momentum is structurally important as it signals that the refinery is not only displacing imports in Nigeria but beginning to behave as a regional balancing supplier, stepping into gaps created by tighter European refining capacity and shifting global trade flows. This means it is moving from a domestic infrastructure project to a participant in global fuel arbitrage.

The planned IPO is tightly interwoven with a broader capital programme estimated at $40 billion over the next five years. That programme spans upstream refining expansion, petrochemical scaling, and diversification into resource processing in mineral-rich African economies. The refinery itself is expected to more than double capacity to about 1.4 million barrels per day, a scale that would place it among the largest single-site refining complexes globally if fully realized.

Parallel expansions in petrochemicals are equally significant. Polypropylene output is projected to rise from 900,000 metric tons annually to 2.4 million tons, a shift that would deepen downstream integration and reduce exposure to imported industrial inputs across West Africa’s manufacturing base. This vertical expansion strategy reflects a broader industrial logic to capture value across the entire hydrocarbon chain rather than concentrating on refining margins alone.

The financing architecture behind this expansion is already unusually diversified for a privately controlled African industrial group. Support from the African Export-Import Bank, which underwrote $2.5 billion of a $4 billion syndicated loan, alongside equipment financing from XCMG Construction Machinery Co., Ltd., highlights the blended public-private, local-global funding model underpinning the project. The planned equity listing adds a third leg, shifting part of the capital burden from debt markets to equity investors.

That transition is notably structural. It is believed that by introducing public shareholders, the refinery would gain a market valuation benchmark, increased disclosure obligations, and a new discipline around capital allocation. At the same time, it opens exposure to investor sentiment cycles that could influence expansion pacing and capital deployment decisions.

The choice of multiple African exchanges rather than a single listing venue is also seen as a reflection of both regulatory fragmentation and an attempt to broaden investor participation across jurisdictions where the refinery’s output already has commercial relevance. It may also help deepen liquidity in regional markets that have historically struggled to support large-scale listings of industrial assets.

However, the transaction has posed a broader question about how African megaprojects are financed. Large-scale infrastructure has traditionally relied on sovereign balance sheets, development finance institutions, and syndicated debt. A partial IPO introduces a different model: one in which private industrial assets are progressively financialized and distributed across public markets.

That shift carries both opportunity and exposure as it allows capital recycling into new sectors such as fertilizer, mining, and upstream industrial inputs. Also, it subjects long-cycle infrastructure to shorter-term market expectations, particularly in environments where macroeconomic volatility remains high.

But as the refinery grows into a regional supplier, it becomes increasingly sensitive to global pricing dynamics, shipping arbitrage, and geopolitical disruptions in fuel markets. Its competitiveness will depend not only on production efficiency but also on logistics reliability, feedstock security, and foreign exchange management.

That will create structural implications for Nigeria. Domestic refining capacity at this scale reduces import dependence, alters foreign exchange demand for fuel purchases, and shifts the country’s position in regional energy trade flows. Over time, it could convert Nigeria from a structural importer of refined products into a net exporter, with downstream effects on trade balances and industrial input costs.

The IPO, therefore, sits at the intersection of industrial policy and capital market development. Experts see it not as a liquidity event but a test case for whether large, vertically integrated African industrial assets can be absorbed into public equity markets without losing momentum or strategic coherence.