Month: December 2021

Hello and welcome back to Equity, a podcast about the business of startups where we unpack the numbers and nuance behind the headlines. As is tradition on the show, we used the last episode of the year to make predictions about the next year. To continue an annual tradition, Grace and Chris joined Natasha and Mary
A previously unknown rootkit has been found setting its sights on Hewlett-Packard Enterprise’s Integrated Lights-Out (iLO) server management technology to carry out in-the-wild attacks that tamper with the firmware modules and completely wipe data off the infected systems. The discovery, which is the first instance of real-world malware in iLO firmware, was documented by Iranian
A man from Virginia has admitted cyber-stalking a United States Army recruiter for two years.  Braxton Louis Danley, a 26-year-old resident of Luray, began harassing the female victim after failing to pass the army’s entrance exam. Prosecutors said Danley’s first contact with the victim occurred in February 2018 when he sent her an email asking for information
Two years ago, the African tech ecosystem saw newfound attention from global players that translated to the continent’s best year of receiving venture capital. From varying sources, it is estimated up to $2 billion went into African tech startups in 2019. With high-profile visits from the most famous Jacks (Ma and Dorsey), a long-awaited first
The COVID-19 pandemic continued to challenge cybersecurity professionals in 2021. While security teams were busy protecting hybrid work models, threat actors were even busier conducting ransomware attacks and targeting vulnerabilities. It’s no surprise then that many of the top trending articles on SearchSecurity this year were linked — directly or inadvertently — to security implications
A federal grand jury has charged Uber’s former chief security officer (CSO) with three counts of wire fraud for reportedly failing to inform several hundred thousand Uber drivers that their driver’s licenses had been exposed during a 2016 breach. The superseding charges made to Joe Sullivan, 52, who served as Uber’s CSO from April 2015 through November
GlobalBees, which raised one of the largest Series A financing rounds in India earlier this year, has entered the unicorn club as the New Delhi-headquartered firm scales its Thrasio-like house of brands. Premji Invest, the investment firm controlled by Indian tycoon Azim Premji, led the nine-month-old startup’s Series B financing round, the young firm disclosed
Information security management encompasses many areas — from perimeter protection and encryption to application security and disaster recovery. IT security is made more challenging by compliance regulations, such as HIPAA, PCI DSS, Sarbanes-Oxley and global standards, such as GDPR. This is where IT security frameworks and standards can be helpful. Knowledge of regulations, standards and
If you’ve visited a crypto company’s website recently, you’ve probably visited a URL ending in “.xyz” instead of its cheugier counterpart, .com. From fintech Block, formerly known as Square, to venture firm Paradigm, to blockchain startups like Mirror, .xyz has become the go-to URL ending for many web3 companies. But what does it mean, and
A number of security flaws have been uncovered in a networking component in Garrett Metal Detectors that could allow remote attackers to bypass authentication requirements, tamper with metal detector configurations, and even execute arbitrary code on the devices. “An attacker could manipulate this module to remotely monitor statistics on the metal detector, such as whether
German logistics provider Hellmann Worldwide Logistics has warned customers social engineering attacks could target them after being hit by a ransomware attack earlier this month. In an update on the incident, which forced the company to take its IT systems temporarily offline on December 9, Hellmann confirmed that the attackers extracted data. While it is still investigating what type
Sean Fanning Contributor Sean Fanning is a vice president on OpenView’s Investment team. Before that, he led the firm’s Proactive Portfolio Management function and acted as director of corporate development, supporting the portfolio on inorganic and balance sheet related initiatives. The flow of capital in SaaS is becoming increasingly bifurcated. There are the “haves” (public
The internet provides plenty of fun and exciting opportunities for you and your family, from sharing on social media to online shopping. To help you enjoy every minute of it, though, it’s good to be aware of what less savory characters are up to. And they sure have been busy. In fact, the U.S. Federal
Laura E. Thomas Contributor Laura E. Thomas is the senior director of National Security Solutions at quantum sensing and computing company ColdQuanta. She is a former Central Intelligence Agency case officer and Chief of Base who built and led sensitive programs at CIA headquarters and abroad in multiple international assignments. The TechCrunch Global Affairs Project examines the
The state of New York has passed a law that makes it a crime to falsify information on a COVID-19 vaccination card. New York governor Kathy Hochul signed new legislation on Wednesday that makes falsifying information on a COVID-19 vaccination card a Class D felony comparable under the New York Penal Law to promoting a sexual performance
We’re online more than ever, in large part because it allows us to take advantage of online conveniences like bill pay and booking appointments. But these many benefits might also leave us exposed to risks, like identity theft. Identity theft is characterized by one person using another’s personal or financial data for their benefit. Cybercriminals
A key challenge for CISOs and other security professionals is enabling effective cybersecurity asset management. The more general IT asset management (ITAM) is the process of discovering, inventorying, managing and tracking a company’s assets. Assets include hardware, software, data and devices. A subset of ITAM, cybersecurity asset management focuses on the discovery, inventory, management and
Dr. Samantha Hoffman Contributor Dr. Samantha Hoffman is a senior analyst at the Australian Strategic Policy Institute’s International Cyber Policy Centre and an independent consultant. The TechCrunch Global Affairs Project examines the increasingly intertwined relationship between the tech sector and global politics. Recent prominent data breach incidents, such as hacks of the Office of Personnel Management, airline