Author: TechBrunch

Naukri.com, a popular Indian employment website, fixed a bug that used the platform to publish recruiter email addresses to search and hire talent online. The issue, discovered by security researcher Lohith Gowda, affected the APIs Naukri used in Android and iOS apps. The API has released the email addresses of recruiters who will visit the profiles of potential candidates on Naukri's platform. This issue does not appear to affect the company's website. “The email ID of an exposed recruiter can be used for targeted phishing attacks, and recruiters can receive excessive unsolicited emails and spam,” Gowda told TechCrunch. He added…

Read More

Venture capitalists have always focused on investing in companies that use technology to disrupt established industries or create whole new business categories. However, some VCs are beginning to turn their scripts upside down in their investment style. Rather than funding startups, they acquire mature businesses such as call centres, accounting firms and other specialized services companies, optimizing them with artificial intelligence to serve more customers through automation. Often compared to private equity rollups, this strategy has been adopted by companies such as General Catalyst, Thrive Capital and Solo VC Elad Gil. The general catalysts promoting this as a new asset…

Read More

According to the Wall Street Journal, Apple CEO Tim Cook reportedly made changes to Texas Gov. Greg Abbott and changed or rejected the state's newly passed laws requiring that the age of the device's owner be verified. Abbott has not signed the bill yet. But Apple, alongside Google, is working with interest groups to fight legislation. In particular, Apple argues that the implementation of the Texas bill could pose a threat to user privacy. The bill requires that if a minor uses the device and their app store account is tied up by their parents, parents will be notified of…

Read More

Digg, a link aggregator in the Web 2.0 era, Digg is currently given a second chance in his life and is open to buying Pocket, Mozilla's reading app. On Thursday, Mozilla announced it would close its pockets on July 8th. Shortly afterwards, Digg's original owner Kevin Rose, alongside Reddit co-founder Alexis Ohanian, posted to X that his company was interested in getting a Pocket from Mozilla. Rose tagged both Mozilla and Pocket, saying, “We love pockets with @digg. We've taken it and will continue to support your users for years to come!” The post was further tagged with Betaworks founding…

Read More

Ethical interests are no longer theoretical because generative AI is faster, cheaper and more persuasive. What happens when deceiving tools become widely accessible? And how do you build a powerful system? TechCrunch Sessions: AI, held June 5th at Zellerbach Hall in Artemis Seaford, Zellerbach Hall in Barkley, California, ElevenLabs' AI Safety Director and Databricks co-founder Ion Stoica, a professor at US Berkeley, will be a major stage to unlock today's AI ethical agenda. Their conversations are cut to the heart of one of the most urgent questions in technology. What will we unleash? How Seaford and Stoicka are addressing AI's…

Read More

Time has increased – save big before the price jumps in 3 days! Save up to $900 on individual TechCrunch tickets for 2025 TechCrunch or double the impact until May 25th at 11:59pm. These trades disappear quickly – lock them now. We will step into the future of technology from October 27th to 29th in Moscone West, San Francisco. Join a global gathering of over 10,000 tech leaders, investors and innovators to witness in-depth sessions, expert insights, unparalleled networking and the iconic startup battlefield 200. The 2025 Confusion is Your Launchpad Whether you build something new or scale quickly, it…

Read More

More than a decade ago, researchers at antivirus company Kaspersky identified suspicious internet traffic of what they thought was a known government-backed group, based on similar targeting and its phishing techniques. Soon, the researchers realized they had found a much more advanced hacking operation that was targeting the Cuban government, among others. Eventually the researchers were able to attribute the network activity to a mysterious — and at the time completely unknown — Spanish-speaking hacking group that they called Careto, after the Spanish slang word (“ugly face” or “mask” in English), which they found buried within the malware’s code.  Careto…

Read More

Klarna CEO Sebastian Siemiatkowski posted an astonishing message to X after Sam Altman and Jony Ive announced Wednesday that Openai was buying Ive's company IO in all-stock deals worth $6.5 billion. Flat Capital, the family investment office at Siemiatkowski, had bought stocks at IO six months ago, he said. As this is a total storage agreement, these IO shares will be converted into shares of Openai's for-profit stock. “I was excited that @flatcapital is an investor in IO and will receive more shares at Openai for an investment he made six months ago,” tweeted Siemiatkowski. This post generated so much…

Read More

On Thursday, Blueski quietly opened the door to those who want to be verified with social networking services. In a post published by the Bluesky Safety account, the company announced that “prominent and authentic” accounts will be able to apply for verification through a new online form. Additionally, organizations can request that they become trusted verifiers in order to receive access to tools that can validate others. Bluesky began testing the feature last month, starting testing in a small number of organizations, including The New York Times, Wired and The Athletic. For some on Bluesky, the blue verification badge is…

Read More

Microsoft and law enforcement have announced the court-authorized Takedown of Lumma, a manipulation of prolific information steeler malware found in more than 394,000 Windows PCS worldwide, primarily in Brazil, Europe and the United States. The tech giant has filed a civil lawsuit and asked federal court to seize 2,300 domains that serve as networks of malware command and control servers. The Department of Justice has also seized five domains used to operate the Lumma infrastructure. Lumma Password Stealer is found in dangerous games and cracked apps downloaded from the internet. Once infected, the malware steals logins, passwords, credit cards and…

Read More