Breaking

Ukraine Cyber Police is now accepting Cryptocurrency Donations

The Cyber Police Department of the National Police of Ukraine now accept crypto donations as per the martial law in the country, and have created crypto wallets for the charity. The wallets will be used for the National Guard, National Police, State Emergency Service and State Border Guard Service.

Ukraine Cyber Police creates crypto wallets

The decision comes right after Ukrainian government and the Come Back Alive NGO started accepting crypto donation from the world. As per the tweet posted by Ukraine Cyber Police on March 09, 2022 the law enforcement organization is also now open to crypto donations.

The accepted cryptocurrency includes Bitcoin (BTC), Ether (ETH), USDT Teter (USDT), Tron (TRX), Polygon (MATIC), Binance Exchange token (BNB) and Polygon (MATIC). The law+ enforcement emphasized this initiative is because of the martial law that’s in place.

How will the crypto donations help the Ukraine Cyber Police?

The donations will be used for purchasing medicines, basic necessities and to offer medical care for victims of Russian attacks. Right from the beginning of the Russian Ukraine conflict, Ukraine officials and authorities have been seeking financial assistance in multiple ways.

The Ukrainian Government has been raising funds via cryptocurrency donations, and have already received around $60.5 million in Bitcoin, USDT Tether, Ether and other virtual currencies. The donations were raised via a Decentralized Autonomous Organization, UkraineDAO which raised $6.5 million by auctioning the NFT of the Ukrainian flag.

These donations have facilitated Ukraine with the volunteer groups like Come Back Alive as well. Similarly the donations for Ukraine Cyber Police will be used for the victims of the war and for other high priority medical cases.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

4 months ago

Patch My PC: Streamlined Software Management for ConfigMgr and Intune

Patch My PC is a widely-used solution that simplifies third-party application management by automating app…

4 months ago

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

4 months ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

5 months ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

6 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

6 months ago