Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Author: TechBrunch
TechCrunch's 2025 is round the corner, with more than 10,000 startups and VC leaders heading to West Moscone in San Francisco on October 27th-29th to Expo Hall connects and business accomplishments. If you were thinking of introducing your company, think of this your nudge – the spots of exhibitors fill up quickly, and once they are gone, they will disappear. Not only is it to exhibit with Discrupt, but also to have a table, but to put the startup in front of the most important people. Whether you're looking to connect with investors, report on spark media, hire top talent,…
AI-driven browsers aren't near the easy future they promise when they can perform complex multi-step tasks for you. However, makers of these browsers are trying to make life easier for users by adding a simple way to repeat prompts for frequently performed tasks. The new DIA browser from the browser company already has skill features. This allows users to ask the browser to run the command, or create code snippets based on the prompt. For example, you can ask your browser to have an interesting event occurring in the nearest few days. You can save the prompt for future use…
India's largest crypto exchange CoindCX confirmed that one of its internal operating accounts was compromised in a recent security breaches, allowing hackers to gain millions of security with crypto. On Saturday, CoindCX co-founder and CEO Sumit Gupta revealed in a post by X that the internal account was breached during the hack that “it is only used for liquidity provisioning in partner exchanges.” The executive ensured that the incident did not affect client funds and that all customer assets remained safe. Earlier in the day, Crypto Security Researcher ZachxBT reported that approximately $44.2 million had been emitted from CoindCX's financial…
US federal government and cybersecurity researchers say a newly discovered security bug found in Microsoft's SharePoint is under attack. The US cybersecurity agency CISA issued an alarm this weekend that hackers are actively using bugs. Microsoft has yet to provide patches for all affected SharePoint versions, and customers around the world can barely defend against ongoing intrusions. Microsoft said the bug, officially known as CVE-2025-53771, affects the version of SharePoint that companies configure and manage on their own servers. SharePoint companies can store, share and manage internal files. Microsoft said it is working on security fixes to prevent hackers from…
Following a report from Pro Publica that Microsoft uses Chinese engineers to maintain the US Department of Defense's cloud computing system, the company said it has made changes to prevent this from happening any more. The existing systems reportedly relied on “digital escorts” to oversee China-based engineers. However, according to Pro Publica, these escorts — US citizens with security clearance — may lack the technical expertise to properly monitor engineers. In response to the report, Defense Secretary Pete Hegses wrote to X that “of course, no country should be allowed to maintain or access the DOD system,” including China. On…
When Vultron announced its $22 million funding round earlier this week, the AI startup came to highlight its leading investor, Craft Ventures. The announcement raised questions about the Trump administration's conflict of interest, in which Sack serves as both AI and Crypto Czar, while maintaining his role in the craft venture. Sacks was able to secure not one but two ethics exemptions, and shape federal government policies while maintaining economic interests in the very industries he oversees. The first 11-page document from March covers his crypto investments. The second, published in June, deals in particular with his AI Holdings. Together,…
Most founders have to pitch their ventures in the hopes of raising capital in the end. NEA partner Tiffany Luck took the stage at the all-stage event at TechCrunch in Boston and answered how to create the perfect one. “I like to think of VC pitch as the first way to assess the suitability of founders' investors,” she told the crowd before jumping into the presentation. One of the most important slides on the pitch is to say “what” and to mean “what are you building?” Then “why” you are the right person for the job and why you have…
Over the past 30 years or so, cybersecurity has become an industry that is estimated to be worth more than $170 billion, created by a community of hackers across the globe. Second, industry growth and notable hacking have become mainstream for cybersecurity and hacking, including Sony breaches in 2015, US election hacks and leak operations in 2016, colonial pipeline ransomware attacks, and a seemingly endless list of Chinese government hacking. Pop culture has embraced hackers with hit TV shows like Mr. Robot and movies like Leave the World. But perhaps the most prolific medium for cybersecurity stories – based on…
AI is for some reason forced on us in almost every aspect of life, from phones and apps to search engines and even drive-thru. The fact that you currently have a web browser with an AI assistant burning chatbots indicates that the way some people use the internet to search and consume information today is very different from a few years ago. However, AI tools are increasingly seeking total level of access to personal data, pretending they need to work. This type of access is not normal and does not need to be normalized. Until recently, it would be right…
Security researchers say they caught surveillance companies in the Middle East. They say they can take advantage of a new attack that allows phone operators to disclose the location of cell subscribers. This attack relies on the security protections that intruders have been implemented to protect intruders from accessing SS7 or signaling system 7. This is a private set of protocols used by global telephone personnel to route calls and text messages for subscribers around the world. SS7 also allows carriers to request information about the cell tower to which the subscriber's phone is connected. It is usually used to…