Author: user

October 29, 2025Ravi LakshmananVulnerabilities/Malware According to an alert issued by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and VulnCheck, attackers are actively exploiting multiple security flaws affecting Dassault Systèmes’ DELMIA Apriso and XWiki. The vulnerabilities are listed below. CVE-2025-6204 (CVSS score: 8.0) – A code injection vulnerability in Dassault Systèmes DELMIA Apriso could allow an attacker to execute arbitrary code. CVE-2025-6205 (CVSS Score: 9.1) – A missing authorization vulnerability in Dassault Systèmes DELMIA Apriso could allow an attacker to gain privileged access to the application. CVE-2025-24893 (CVSS score: 9.8) – Improper invalidation of input in XWiki’s dynamic evaluation call…

Read More

simple factsMilestone: first computer-to-computer communicationDate and time: October 29, 1969, 10:30 p.m.Location: Los Angeles to Menlo Park, CaliforniaPeople: From graduate student Charlie Klein to computer engineer Bill Duvall.Late one evening, UCLA graduate student Charlie Klein sat down at a computer the size of a refrigerator and sent the message “lo” to a rack of computers hundreds of miles away operated by Bill Duvall, a systems engineer at Stanford Research Institute (SRI).The message itself was nothing special. This was meant to say “login”, but the system crashed before it could complete. However, this transmission was revolutionary because it formed the basis…

Read More

On Monday, researchers at cybersecurity giant Kaspersky Lab released a report identifying a new piece of spyware called Dante that they say is targeting Windows victims in Russia and neighboring Belarus. Dante spyware is made by Milan-based surveillance technology maker Memento Labs, which was founded in 2019 after earlier spyware maker Hacking Team was acquired and taken over by new owners, researchers said. Memento CEO Paolo Lezzi confirmed to TechCrunch that the spyware captured by Kaspersky was indeed Memento’s. In the call, Lezzi accused one of his company’s government customers of exposing Dante, saying that the customer was using an…

Read More

Indian auto giant Tata Motors has fixed a series of security flaws that exposed sensitive internal data including customer personal information, company reports and dealer-related data. Security researcher Eaton Zuber told TechCrunch that he discovered the flaw in Tata Motors’ E-Dukaan division, an e-commerce portal for purchasing spare parts for Tata commercial vehicles. Tata Motors, headquartered in Mumbai, produces passenger cars as well as commercial and defense vehicles. The company has a presence in 125 countries and seven assembly facilities, according to its website. Zuber found that the portal’s web source code contained private keys to access and modify data…

Read More

After two days filled with live demos and pitches, it’s time to announce the five finalists for this year’s Startup Battlefield. These finalists were initially selected from thousands of applicants, and TechCrunch’s editorial team narrowed the field to 200 companies that participated here at Disrupt, with the top 20 competing on the Disrupt stage. The finalists were selected based on feedback from expert judges. Finalists will take the stage once again on Wednesday at 11:30 a.m. Pacific Time to compete for the grand prize of $100,000 in equity-free funding and temporary custody of the Startup Battlefield Cup. You can watch…

Read More

Private tutoring is one of the most effective tools for improving a child’s education, yet very few children in the United States are privately tutored. A 2023 study of the nation’s largest school districts found that less than 10% of students received tutoring. One factor is that tutoring is too expensive for many families, often costing hundreds or thousands of dollars a month. Tim Novikov, a former Google product manager and educator, wants to change that. His startup, Super Teacher, offers an AI-powered tutoring app for elementary school students for $15 a month, or $10 for an annual plan. Super…

Read More

Scientists have discovered, for the first time, the complex building blocks of life in the ice surrounding a star in the Milky Way.Using the James Webb Space Telescope (JWST), researchers detected five large carbon-based compounds around protostars in the Large Magellanic Cloud, a small galaxy that orbits close to the Milky Way. The discovery could help scientists learn how complex molecules formed in the early universe, according to research published Oct. 20 in Astrophysical Journal Letters.The Large Magellanic Cloud is a dwarf galaxy 160,000 light-years from Earth that is part of the Local Group, a collection of gravitationally bound galaxies…

Read More

Astronomers recently pointed their telescopes over Manciano, Italy, and captured something incredible. A bright comet appeared to be wrapped in a corkscrew trail of meteors, shining like a cosmic barber’s pole in the same part of the sky.Because there are millions of miles between the meteor in the foreground and the comet in the background, the odds of capturing such a chance shot were (excuse the pun) astronomically low.”In this photo, the meteor’s afterglow appears wrapped around the comet’s ion tail, a miracle of pure perspective,” astronomer Gianluca Masi, founder of the Virtual Telescope Project and the photographer who took…

Read More

Speaking at the TechCrunch Disrupt 2025 conference on Tuesday, Netflix said it is looking to vertical video as a way to experiment with new content types. The executive said the company doesn’t intend to compete directly with apps like TikTok or other short-form drama apps, but acknowledged there are other ways Netflix could leverage the mobile platform. In response to a question about the competitive landscape on mobile, Stone agreed that while sometimes consumers are looking for what Netflix offers, such as TV shows, movies and games, there are also times when they want “more snack-y stuff.” In this context,…

Read More

October 28, 2025Ravi LakshmananEncryption/Hardware Security A group of academic researchers from Georgia Tech, Purdue University, and Synchronix has developed a side-channel attack called TEE.Fail that can extract secrets from trusted execution environments (TEEs) on a computer’s main processor, such as Intel’s Software Guard eXtensions (SGX) and Trust Domain Extensions (TDX) and AMD’s Secure Encrypted Virtualization with Secure Nested Paging. (SEV-SNP) and ciphertext hiding. The core of this attack involves the use of an intervention device built using off-the-shelf electronics that costs less than $1,000 and allows for physical inspection of all memory traffic within a DDR5 server. “This makes it…

Read More