A startup that enables businesses to set up and manage their billing, subscription, revenue operations and compliance has become the newest firm to earn the much coveted unicorn status. Chennai and San Francisco-headquartered Chargebee said on Tuesday it has raised $125 million in its Series G financing round led by Sapphire Ventures and existing investors
Philip Choo
In a recent episode of McAfee’s SOCwise Series, guest security expert Chris Crowley revealed findings of his recent survey of security efforts within SOCs. His questions were designed to gain insight into all things SOC, including how SOCs can accomplish their full potential and how they assess their ability to keep up with security technology. Hosts Ismael Valenzuela and Michael Leland tapped into Chris’ security operations expertise as
by Paul Ducklin We investigate the controversy that was stirred up recently when the FBI in the US used malware to fight malware. The Feds accessed remote access webshells left behind after the recent Hafnium attacks to remove the webshells themselves, after a court order said they could. As helpful and as community-minded as this
The concept of “passwordless” authentication has been gaining significant industry and media attention. And for a good reason. Our digital lives are demanding an ever-increasing number of online accounts and services, with security best practices dictating that each requires a strong, unique password in order to ensure data stays safe. Who wouldn’t want an easier
An American company with ambitions to “help build a better internet” is to open its first ever office in Canada. On April 19, security, performance, and reliability company Cloudflare announced its plans to expand northward and open an office in Toronto. Cloudflare’s co-founder, president, and COO, Michelle Zatlyn, who is Canadian but currently resides in San Francisco, California,
Fintech startup Payhawk has raised a $20 million funding round. QED Investors is leading the round with existing investor Earlybird Digital East also participating. Payhawk is building a unified system to manage all the money that is going in and out. Essentially, companies switching to Payhawk can replace several services they already use and that
NASA has marked a major milestone in its extraterrestrial exploration program, with the first powered flight of an aircraft on Mars. The flight occurred very early this morning, and NASA received telemetry confirming that the ‘Ingenuity’ helicopter it sent to Mars with its Perseverance rover. This is a major achievement, in no small part because
People talk about the cybersecurity job market like it’s a monolith, but there are a number of different roles within cybersecurity, depending not only on your skill level and experience but on what you like to do. In fact, Cybercrime Magazine came up with a list of 50 cybersecurity job titles, while CyberSN, a recruiting
Ohio PKI-as-a-Service pioneer Keyfactor and Swedish PKI solutions provider PrimeKey have announced their intention to merge. Plans for the companies to come together under the Keyfactor brand “while committing to increased investments across all product lines” were shared on April 15. PrimeKey was established 19 years ago by the company’s CTO, Tomas Gustavsson, who developed an interest in computer code as a
Six-year-old Bangalore-based fintech Razorpay topped a $1 billion valuation late last year, becoming the first Y Combinator-backed Indian startup to reach the much sought after unicorn status. In less than six months since, the Indian startup has tripled its valuation and is preparing to launch in the Southeast Asian markets. Razorpay said on Monday it
The vast majority of network administrators would not be able to do their jobs without SSH. The protocol has replaced insecure mechanisms, such as Telnet and FTP, to become the de facto standard for remote access and administration. SSH not only ensures confidentiality and integrity for data exchanged between networks and systems, but it also
Welcome back to The TechCrunch Exchange, a weekly startups-and-markets newsletter. It’s broadly based on the daily column that appears on Extra Crunch, but free, and made for your weekend reading. If you want it in your inbox every Saturday morning, sign up here. Ready? Let’s talk money, startups and spicy IPO rumors. This week, Scale
“It’s alive! It’s alive!” Even if you haven’t seen the 1931 film Frankenstein, you are more than likely familiar with the story of the “monster” created by Victor Frankenstein. You may associate this cry from its titular character with the image of what Victor conjured finally opening its eyes and slowly lurching off the table.
by Paul Ducklin Sometimes, cybercrooks claim to speak from a higher authority than just a missed home delivery… …sometimes they masquerade as an official government body, complete with all the right logos, the right terminology and even a realistic-looking website carefully cloned from the real deal. Learn more about “government” scams and how to avoid
A high-level manager and systems administrator associated with the FIN7 threat actor has been sentenced to 10 years in prison, the U.S. Department of Justice announced Friday. Fedir Hladyr, a 35-year-old Ukrainian national, is said to have played a crucial role in a criminal scheme that compromised tens of millions of debit and credit cards,
America has issued a cybersecurity advisory that urges organizations to patch vulnerabilities it says are being exploited by Russian Foreign Intelligence Service (SVR) actors. The warning was jointly issued on April 15 by the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI), as the US
Almost exactly a month ago, Peloton CEO John Foley wrote an open letter about the the company’s treadmill. “I’m reaching out to you today because I recently learned about a tragic accident involving a child and the Tread+, resulting in, unthinkably, a death,” it begins. “While we are aware of only a small handful of
Other common and easily hackable password choices include the names of relatives and sports teams, a UK study reveals As many as 15% of Brits use their pets’ names as passwords to “protect” their online accounts, according to the United Kingdom’s National Cyber Security Center (NCSC). The agency cited figures from a survey that revealed
What is endpoint detection and response (EDR)? Endpoint detection and response (EDR) is a system to gather and analyze security threat-related information from computer workstations and other endpoints, with the goal of finding security breaches as they happen and facilitating a quick response to discovered or potential threats. The term “endpoint detection and response” only
Third-party hardware integration can be a tricky thing. Peloton this week raised some eyebrows by dropping Apple GymKit compatibility for its Bike Bootcamp program. Users were, naturally, quick to react. The situation left some wondering whether the move was a direct response to Apple’s recent entry into the home exercise market with Fitness+. A Peloton
Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your digital stuff too. Whether it’s indeed spring where you are or not, you can give your devices, apps, and online accounts a good decluttering. Now’s the time. Cleaning them up can protect your privacy and
by Paul Ducklin Sophos cybersecurity expert Chester Wisniewski provides excellent, topical and timely commentary on the FBI’s recent use of a malware-like method to forcibly clean up hundreds of servers still infected in the Hafnium aftermath. With Paul Ducklin and Chester Wisniewski Intro and outro music by Edith Mudge. LISTEN NOW Click-and-drag on the soundwaves
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued an advisory warning of multiple vulnerabilities in the OpENer EtherNet/IP stack that could expose industrial systems to denial-of-service (DoS) attacks, data leaks, and remote code execution. All OpENer commits and versions prior to February 10, 2021, are affected, although there are no known public
The United States has indicted two Pakistani men on suspicion of operating an illegal online store that sold false identification documents on the dark web. Karachi residents 34-year-old Mohsin Raza and 33-year-old Mujtaba Raza were charged in a six-count federal indictment unsealed in the District of New Jersey on April 15. Each man is charged with conspiracy to
Here are some quick and easy tips to help you clean up your cyber-clutter and keep your digital footprint tidy You’ve probably heard the phrase “digital footprint” before, but do you really know what it is? Your social media content, various online payment transactions, location history, emails sent, messages sent through instant messaging platforms, and
Squarespace is going public, Apple shares some music payment details and Twitter bans the founder of the right-wing media organization Project Veritas. This is your Daily Crunch for April 16, 2021. The big story: Squarespace files to go public Squarespace has filed to go public via direct listing on the New York Stock Exchange, under
Facebook is to be sued in Europe over the major leak of user data that dates back to 2019 but which only came to light recently after information on 533M+ accounts was found posted for free download on a hacker forum. Today Digital Rights Ireland (DRI) announced it’s commencing a “mass action” to sue Facebook, citing
Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and Monero to cash in on the recent gold rush. Bitcoin’s meteoric rise in value is making coin mining an appealing hobby or even a whole new career. Coin mining software is the main tool in a prospector’s belt. Some coin miners, also known as cryptocurrency miners, are tempted by the dark side of the industry and resort to nefarious means to
Authorities step in to thwart attacks leveraging the recently-disclosed Microsoft Exchange Server vulnerabilities The United States’ Federal Bureau of Investigation (FBI) has carried out a court-approved operation to “copy and remove” malicious web shells from hundreds of systems across the US that were compromised through the mass exploitation of zero-day flaws in Microsoft Exchange Server
by Paul Ducklin We look at the big-money hacks from the 2021 Pwn2Own competition. We investigate the difficulties of hiring an assassin via the dark web. We wrestle with some of the privacy issues relating to COVID-19 infection tracking apps. With Kimberly Truong, Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge.
- 1
- 2
- 3
- …
- 192
- Next Page »