โŒ

Reading view

The $32B acquisition that one VC is calling the โ€˜Deal of the Decadeโ€™

According to Index Ventures Partner Shardul Shah, cybersecurity startup Wiz sits โ€œat the center of three tailwinds: AI, cloud, and security spend.โ€ Those tailwinds powered what just became the largest venture-backed acquisition in history โ€” Googleโ€™s $32 billion deal, finalized after a declined 2024 offer, antitrust review on both sides of the Atlantic, and an [โ€ฆ]

How to watch Jensen Huangโ€™s Nvidia GTC 2026 keynote

GTC โ€” which stands for GPU Technology Conference โ€” is Nvidia's flagship annual event, where the chipmaker typically uses the spotlight to announce new products, champion partnerships, and lay out its vision for the future of computing. Huang's keynote will focus on Nvidia's role in the future of computing and AI.

Law enforcement shuts down botnet made of tens of thousands of hacked routers

An international law enforcement operation shut down a service called SocksEscort, which allegedly helped cybercriminals all over the world launch ransomware and DDoS attacks, as well as distribute child sexual abuse material.

Poppiย founder on TikTok, Super Bowl ads, and her return to Shark Tank

For years, venture capitalists have beenย skeptical of beverage startups, citing thin margins and brutal distribution as reasons most brands never break out. But a new wave of โ€œfunctional sodaโ€ companies has been challenging that assumption, includingย Poppi, the prebiotic soda brand that grew from a kitchen experiment into aย $1.95 billionย acquisition by PepsiCo.ย  On this episode of [โ€ฆ]

DOGE employee stole Social Security data and put it on a thumb drive, report says

A whistleblower is accusing a former DOGE member of stealing a large number of Americansโ€™ personal data while he was working at the Social Security Administration, with the plan of using it at his new job.

US military contractor likely built iPhone hacking tools used by Russian spies in Ukraine

Google found a series of hacking tools they said were used by a Russian espionage group and a cybercriminal group in China. Sources from a U.S. government defense contractor said some of those hacking tools were theirs.
โŒ