Hello and welcome back to Equity, a podcast about the business of startups where we unpack the numbers and nuance behind the headlines. As is tradition on the show, we used the last episode of the year to make predictions about the next year. To continue an annual tradition, Grace and Chris joined Natasha and Mary
Month: December 2021
A previously unknown rootkit has been found setting its sights on Hewlett-Packard Enterprise’s Integrated Lights-Out (iLO) server management technology to carry out in-the-wild attacks that tamper with the firmware modules and completely wipe data off the infected systems. The discovery, which is the first instance of real-world malware in iLO firmware, was documented by Iranian
by Paul Ducklin If you create any sort of online content at all – even if you’re just a once-in-a-while blogger or an occasional social media user – you almost certainly know how easy it is for other people to rip off your material and present it as their own. We’re not talking about links,
A man from Virginia has admitted cyber-stalking a United States Army recruiter for two years. Braxton Louis Danley, a 26-year-old resident of Luray, began harassing the female victim after failing to pass the army’s entrance exam. Prosecutors said Danley’s first contact with the victim occurred in February 2018 when he sent her an email asking for information
There is often a mistaken impression that covering the enterprise is kind of dull when compared to the consumer side of the house, but having followed the space for a couple of decades now, I can tell you that nothing could be further from the truth. For one thing, there’s big money in the enterprise,
As we usher in the New Year, let’s take a look at some statistics that will help you stay up-to-date on recent cybersecurity trends As the rollercoaster of a ride that was 2021 comes to a close and we’re entering a more hopeful new year, we thought it apt to compile a list of impactful
Two years ago, the African tech ecosystem saw newfound attention from global players that translated to the continent’s best year of receiving venture capital. From varying sources, it is estimated up to $2 billion went into African tech startups in 2019. With high-profile visits from the most famous Jacks (Ma and Dorsey), a long-awaited first
An ongoing crypto mining campaign has upgraded its arsenal while adding new defense evasion tactics that enable the threat actors to conceal the intrusions and fly under the radar, new research published today has revealed. Since first detected in 2019, a total of 84 attacks against its honeypot servers have been recorded to date, four
by Paul Ducklin Are you a sysadmin who managed to get your Log4Shell mitigations done in time for the US Government’s cybersecurity deadline of 24 December 2021? If so, you may have enjoyed a Christmas mini-vacation along with much of the rest of the world… …only to return to the fray this week and find
Unique cyber-attacks declined for the first time in nearly three years in Q3 2021, according to new data from Positive Technologies. The researchers observed a 4.8% decline in unique attacks in Q3 compared to the previous quarter, the first time they have recorded a reduction since the end of 2018. They said that this trend was primarily by
To get a roundup of TechCrunch’s biggest and most important stories delivered to your inbox every day at 3 p.m. PST, subscribe here. Hello again friends, and welcome to Daily Crunch for December 29, 2021. This is going to be the last Daily Crunch for the year, as the news machine seems to be winding
The COVID-19 pandemic continued to challenge cybersecurity professionals in 2021. While security teams were busy protecting hybrid work models, threat actors were even busier conducting ransomware attacks and targeting vulnerabilities. It’s no surprise then that many of the top trending articles on SearchSecurity this year were linked — directly or inadvertently — to security implications
The past twelve months in cybersecurity have been a rough ride. In cybersecurity, everything is broken — it’s just a matter of finding it — and this year felt like everything broke at once, especially towards the end of the year. But for better or worse, we end the year knowing more than we did
The Apache Software Foundation (ASF) on Tuesday rolled out fresh patches to contain an arbitrary code execution flaw in Log4j that could be abused by threat actors to run malicious code on affected systems, making it the fifth security shortcoming to be discovered in the tool in the span of a month. Tracked as CVE-2021-44832,
A federal grand jury has charged Uber’s former chief security officer (CSO) with three counts of wire fraud for reportedly failing to inform several hundred thousand Uber drivers that their driver’s licenses had been exposed during a 2016 breach. The superseding charges made to Joe Sullivan, 52, who served as Uber’s CSO from April 2015 through November
GlobalBees, which raised one of the largest Series A financing rounds in India earlier this year, has entered the unicorn club as the New Delhi-headquartered firm scales its Thrasio-like house of brands. Premji Invest, the investment firm controlled by Indian tycoon Azim Premji, led the nine-month-old startup’s Series B financing round, the young firm disclosed
Information security management encompasses many areas — from perimeter protection and encryption to application security and disaster recovery. IT security is made more challenging by compliance regulations, such as HIPAA, PCI DSS, Sarbanes-Oxley and global standards, such as GDPR. This is where IT security frameworks and standards can be helpful. Knowledge of regulations, standards and
If you’ve visited a crypto company’s website recently, you’ve probably visited a URL ending in “.xyz” instead of its cheugier counterpart, .com. From fintech Block, formerly known as Square, to venture firm Paradigm, to blockchain startups like Mirror, .xyz has become the go-to URL ending for many web3 companies. But what does it mean, and
As we close out another year like no other, let’s look back at some of the most notable cybersecurity stories that shaped 2021 Unsurprisingly, 2021 has seen no shortage of notable cybersecurity moments, so much so that it’s no mean feat to whittle the long list down to just a few stories that rocked (not
A number of security flaws have been uncovered in a networking component in Garrett Metal Detectors that could allow remote attackers to bypass authentication requirements, tamper with metal detector configurations, and even execute arbitrary code on the devices. “An attacker could manipulate this module to remotely monitor statistics on the metal detector, such as whether
German logistics provider Hellmann Worldwide Logistics has warned customers social engineering attacks could target them after being hit by a ransomware attack earlier this month. In an update on the incident, which forced the company to take its IT systems temporarily offline on December 9, Hellmann confirmed that the attackers extracted data. While it is still investigating what type
Sean Fanning Contributor Sean Fanning is a vice president on OpenView’s Investment team. Before that, he led the firm’s Proactive Portfolio Management function and acted as director of corporate development, supporting the portfolio on inorganic and balance sheet related initiatives. The flow of capital in SaaS is becoming increasingly bifurcated. There are the “haves” (public
The internet provides plenty of fun and exciting opportunities for you and your family, from sharing on social media to online shopping. To help you enjoy every minute of it, though, it’s good to be aware of what less savory characters are up to. And they sure have been busy. In fact, the U.S. Federal
Laura E. Thomas Contributor Laura E. Thomas is the senior director of National Security Solutions at quantum sensing and computing company ColdQuanta. She is a former Central Intelligence Agency case officer and Chief of Base who built and led sensitive programs at CIA headquarters and abroad in multiple international assignments. The TechCrunch Global Affairs Project examines the
Researchers have discovered a new Android banking malware that targets Brazil’s Itaú Unibanco with the help of lookalike Google Play Store pages to carry out fraudulent financial transactions on victim devices without their knowledge. “This application has a similar icon and name that could trick users into thinking it is a legitimate app related to
The state of New York has passed a law that makes it a crime to falsify information on a COVID-19 vaccination card. New York governor Kathy Hochul signed new legislation on Wednesday that makes falsifying information on a COVID-19 vaccination card a Class D felony comparable under the New York Penal Law to promoting a sexual performance
Naren Gupta, a venture capitalist who co-founded Nexus Venture Partners to help plant Indian SaaS startups on the world map, died on Saturday. He was 73. Gupta, who moved to the U.S. to pursue higher education in late 1960s, co-founded Integrated Systems, a software firm that was ultimately sold to Intel. After leaving the firm,
We’re online more than ever, in large part because it allows us to take advantage of online conveniences like bill pay and booking appointments. But these many benefits might also leave us exposed to risks, like identity theft. Identity theft is characterized by one person using another’s personal or financial data for their benefit. Cybercriminals
A key challenge for CISOs and other security professionals is enabling effective cybersecurity asset management. The more general IT asset management (ITAM) is the process of discovering, inventorying, managing and tracking a company’s assets. Assets include hardware, software, data and devices. A subset of ITAM, cybersecurity asset management focuses on the discovery, inventory, management and
Dr. Samantha Hoffman Contributor Dr. Samantha Hoffman is a senior analyst at the Australian Strategic Policy Institute’s International Cyber Policy Centre and an independent consultant. The TechCrunch Global Affairs Project examines the increasingly intertwined relationship between the tech sector and global politics. Recent prominent data breach incidents, such as hacks of the Office of Personnel Management, airline
- 1
- 2
- 3
- …
- 7
- Next Page »