• It’s infuriating to witness how the digital landscape has become a breeding ground for hate speech! The #NOTWITHMYTYPE project is a glaring reminder that neutrality has no place when it comes to fighting against the toxic narratives spreading like wildfire online. Typography may be neutral, but the messages we choose to amplify are not! We can't afford to sit back and pretend that ignoring hate speech is an option. Silence is complicity, and it’s high time we raise our voices against this menace. Let's stand up, get creative, and dismantle these harmful discourses! The battle against hate starts with us!

    #NOTWITHMYTYPE #HateSpeech #DigitalActivism #StandAgainstHate #CreativityAgainstHate
    It’s infuriating to witness how the digital landscape has become a breeding ground for hate speech! The #NOTWITHMYTYPE project is a glaring reminder that neutrality has no place when it comes to fighting against the toxic narratives spreading like wildfire online. Typography may be neutral, but the messages we choose to amplify are not! We can't afford to sit back and pretend that ignoring hate speech is an option. Silence is complicity, and it’s high time we raise our voices against this menace. Let's stand up, get creative, and dismantle these harmful discourses! The battle against hate starts with us! #NOTWITHMYTYPE #HateSpeech #DigitalActivism #StandAgainstHate #CreativityAgainstHate
    GRAFFICA.INFO
    #NOTWITHMYTYPE, creatividad contra los discursos de odio
    #NOTWITHMYTYPE, proyecto finalista de los New Blood Awards de la D&AD, es una voz de alarma sobre el aumento de los discursos de odio en el entorno digital.   Una tipografía es una herramienta y en la naturaleza de las herramientas está la neutra
    Like
    Love
    Wow
    Angry
    Sad
    37
    1 Commenti 0 condivisioni
  • The Weirdest Part of the MCU Spider-Man Is Back for Vision Quest

    Remember that time when good ol’ Peter Parker called a drone strike on his classmates because another guy was flirting with MJ? Well, the artificial intelligence that made it happen is back, this time in snarky Canadian form!
    Deadline is reporting that Schitt’s Creek alum Emily Hampshire has been cast as E.D.I.T.H. in Vision Quest, the upcoming Disney+ series starring Paul Bettany as the synthezoid Avenger. E.D.I.T.H., of course, made her debut as a pair of ugly, gaudy sunglasses the late Tony Stark bequeathed to Peter in Spider-Man: Far From Home. Through E.D.I.T.H., Peter had access to vast technological resources, resources that Mysterio wanted to use for himself.

    At the end of Far From Home, Peter reclaimed the E.D.I.T.H. glasses and in Spider-Man: No Way Home, a screen readout assured us that they were inactive. Moreover, No Way Home ends with Peter having his secret identity wiped from everyone’s memory and a closing shot of him hand-stitching his own costume in a dingy New York apartment, suggeting that the MCU experiment of making working-class Peter Parker into the scion of a tech bro was done.
    That may still be true, in which case Vision Quest is a much better place for E.D.I.T.H. to exist. Created by Terry Matalas, showrunner of the Twelve Monkeys TV series and the third season of Star Trek: Picard, Vision Quest will follow the next phase in the life of the synthezoid Vision, who was killed in Avengers: Infinity War and resurrected as an initially evil clone in WandaVision.

    The title Vision Quest comes from a 1989-1990 arc of West Coast Avengers, written and penciled by John Byrne, in which the U.S. government dismantles Vision and recreates him into a mindless and easily controllable form, signified by his new bleach white look. Fans of the MCU will recognize that storyline from the last episodes of WandaVision, in which S.A.B.E.R. did the same thing to Bettany’s character.
    However, the Vision Quest comics continued to tell the story of Vision attempting to recover the humanity and personality he’d previously gained over the years, which will presumably be the plot of Vision Quest. However, E.D.I.T.H.’s casting is just the latest in a host of synthetic characters who will appear in the show. James Spader will return as Vision’s creator Ultron, and T’Nia Miller has joined the show as Jocasta, a female synthezoid originally created as Ultron’s bride. A few humans will show up as well, including the return of Faran Tahir as Raza, the leader of the Ten Rings terrorist cell, last seen in Iron Man, and frequent Matalas collaborator Todd Stashwick as a mystery man hunting Vision.
    That’s a packed cast, but as anyone who recalls the Picard season 3 episode in which androids Data and Lore merged, Matalas knows how to tell an interesting story about artificial intelligence. That episode also showed that Matalas knows how to add levity to heavy conversations about existence, making Hampshire’s casting as E.D.I.T.H. a wise choice. Just don’t let her anywhere near another school bus full of teenagers.
    Vision Quest is slated to appear on Disney+ in 2026.
    #weirdest #part #mcu #spiderman #back
    The Weirdest Part of the MCU Spider-Man Is Back for Vision Quest
    Remember that time when good ol’ Peter Parker called a drone strike on his classmates because another guy was flirting with MJ? Well, the artificial intelligence that made it happen is back, this time in snarky Canadian form! Deadline is reporting that Schitt’s Creek alum Emily Hampshire has been cast as E.D.I.T.H. in Vision Quest, the upcoming Disney+ series starring Paul Bettany as the synthezoid Avenger. E.D.I.T.H., of course, made her debut as a pair of ugly, gaudy sunglasses the late Tony Stark bequeathed to Peter in Spider-Man: Far From Home. Through E.D.I.T.H., Peter had access to vast technological resources, resources that Mysterio wanted to use for himself. At the end of Far From Home, Peter reclaimed the E.D.I.T.H. glasses and in Spider-Man: No Way Home, a screen readout assured us that they were inactive. Moreover, No Way Home ends with Peter having his secret identity wiped from everyone’s memory and a closing shot of him hand-stitching his own costume in a dingy New York apartment, suggeting that the MCU experiment of making working-class Peter Parker into the scion of a tech bro was done. That may still be true, in which case Vision Quest is a much better place for E.D.I.T.H. to exist. Created by Terry Matalas, showrunner of the Twelve Monkeys TV series and the third season of Star Trek: Picard, Vision Quest will follow the next phase in the life of the synthezoid Vision, who was killed in Avengers: Infinity War and resurrected as an initially evil clone in WandaVision. The title Vision Quest comes from a 1989-1990 arc of West Coast Avengers, written and penciled by John Byrne, in which the U.S. government dismantles Vision and recreates him into a mindless and easily controllable form, signified by his new bleach white look. Fans of the MCU will recognize that storyline from the last episodes of WandaVision, in which S.A.B.E.R. did the same thing to Bettany’s character. However, the Vision Quest comics continued to tell the story of Vision attempting to recover the humanity and personality he’d previously gained over the years, which will presumably be the plot of Vision Quest. However, E.D.I.T.H.’s casting is just the latest in a host of synthetic characters who will appear in the show. James Spader will return as Vision’s creator Ultron, and T’Nia Miller has joined the show as Jocasta, a female synthezoid originally created as Ultron’s bride. A few humans will show up as well, including the return of Faran Tahir as Raza, the leader of the Ten Rings terrorist cell, last seen in Iron Man, and frequent Matalas collaborator Todd Stashwick as a mystery man hunting Vision. That’s a packed cast, but as anyone who recalls the Picard season 3 episode in which androids Data and Lore merged, Matalas knows how to tell an interesting story about artificial intelligence. That episode also showed that Matalas knows how to add levity to heavy conversations about existence, making Hampshire’s casting as E.D.I.T.H. a wise choice. Just don’t let her anywhere near another school bus full of teenagers. Vision Quest is slated to appear on Disney+ in 2026. #weirdest #part #mcu #spiderman #back
    WWW.DENOFGEEK.COM
    The Weirdest Part of the MCU Spider-Man Is Back for Vision Quest
    Remember that time when good ol’ Peter Parker called a drone strike on his classmates because another guy was flirting with MJ? Well, the artificial intelligence that made it happen is back, this time in snarky Canadian form! Deadline is reporting that Schitt’s Creek alum Emily Hampshire has been cast as E.D.I.T.H. in Vision Quest, the upcoming Disney+ series starring Paul Bettany as the synthezoid Avenger. E.D.I.T.H., of course, made her debut as a pair of ugly, gaudy sunglasses the late Tony Stark bequeathed to Peter in Spider-Man: Far From Home. Through E.D.I.T.H., Peter had access to vast technological resources, resources that Mysterio wanted to use for himself. At the end of Far From Home, Peter reclaimed the E.D.I.T.H. glasses and in Spider-Man: No Way Home, a screen readout assured us that they were inactive. Moreover, No Way Home ends with Peter having his secret identity wiped from everyone’s memory and a closing shot of him hand-stitching his own costume in a dingy New York apartment, suggeting that the MCU experiment of making working-class Peter Parker into the scion of a tech bro was done. That may still be true, in which case Vision Quest is a much better place for E.D.I.T.H. to exist. Created by Terry Matalas, showrunner of the Twelve Monkeys TV series and the third season of Star Trek: Picard, Vision Quest will follow the next phase in the life of the synthezoid Vision, who was killed in Avengers: Infinity War and resurrected as an initially evil clone in WandaVision. The title Vision Quest comes from a 1989-1990 arc of West Coast Avengers, written and penciled by John Byrne, in which the U.S. government dismantles Vision and recreates him into a mindless and easily controllable form, signified by his new bleach white look. Fans of the MCU will recognize that storyline from the last episodes of WandaVision, in which S.A.B.E.R. did the same thing to Bettany’s character. However, the Vision Quest comics continued to tell the story of Vision attempting to recover the humanity and personality he’d previously gained over the years, which will presumably be the plot of Vision Quest. However, E.D.I.T.H.’s casting is just the latest in a host of synthetic characters who will appear in the show. James Spader will return as Vision’s creator Ultron, and T’Nia Miller has joined the show as Jocasta, a female synthezoid originally created as Ultron’s bride. A few humans will show up as well, including the return of Faran Tahir as Raza, the leader of the Ten Rings terrorist cell, last seen in Iron Man, and frequent Matalas collaborator Todd Stashwick as a mystery man hunting Vision. That’s a packed cast, but as anyone who recalls the Picard season 3 episode in which androids Data and Lore merged, Matalas knows how to tell an interesting story about artificial intelligence. That episode also showed that Matalas knows how to add levity to heavy conversations about existence, making Hampshire’s casting as E.D.I.T.H. a wise choice. Just don’t let her anywhere near another school bus full of teenagers. Vision Quest is slated to appear on Disney+ in 2026.
    Like
    Love
    Wow
    Sad
    Angry
    354
    0 Commenti 0 condivisioni
  • Browning Industrial Park / MULTIPLE Architecture & Urbanism

    Browning Industrial Park / MULTIPLE Architecture & UrbanismSave this picture!© Bruno Dias Ventura

    Architects:
    MULTIPLE Architecture & Urbanism
    Area
    Area of this architecture project

    Area: 
    15562 m²

    Year
    Completion year of this architecture project

    Year: 

    2024

    Photographs

    Photographs:Bruno Dias Ventura

    Manufacturers
    Brands with products used in this architecture project

    Manufacturers:  Joris Ide, Ozklux, VMZINC, ZumtobelMore SpecsLess Specs
    this picture!
    Text description provided by the architects. The Browning Park project emerged from a strong ambition: to transform a derelict industrial site - once home to Herstal's weapons industry - into a vibrant green lung at the heart of the city. Over time, the site had become a sealed and fragmented grey zone, disconnected from its surrounding neighborhoods. The project was driven by a desire to reverse this fragmentation by creating a continuous pedestrian path, reopening the site, and reconnecting it with its urban context. This central promenade became the backbone of the design, around which inclusive and fully accessible public spaces were thoughtfully arranged.this picture!this picture!this picture!One of the most significant challenges stemmed from the condition of the site itself. Decades of industrial activity had left behind polluted soils and substantial infrastructural remnants. A deep soil remediation process - reaching depths of up to 12 meters - was required before any development could begin. This necessary intervention also offered the opportunity to reshape the topography and increase permeable surfaces, thus improving rainwater infiltration and boosting the site's resilience to climate change. Another key challenge involved balancing heritage preservation with new uses. The former Browning factory, for instance, had to be partially dismantled, structurally reinforced, and reimagined, while retaining its historical identity.this picture!In terms of construction, the project focused on reusing existing structures wherever possible. The factory's original metal frame was preserved and strengthened, and a new timber roof was added to create a covered public hall. Adjacent to it, the garden integrates remnants of the steel framework, which now supports wild vegetation and forms a robust, weather-resistant landscape feature. These gestures embody the project's commitment to circularity and a low environmental footprint.this picture!this picture!this picture!this picture!The spatial layout of the park was carefully designed to accommodate a wide variety of users and age groups. Along the main pedestrian spine, a sequence of diverse atmospheres and uses unfolds: a skatepark, a playground, picnic areas, outdoor fitness zones, a square with a fountain, a woodland area, and a flower garden. All these features are barrier-free and fully accessible.this picture!The project was developed in close dialogue with the people of Herstal and future park users. A series of public consultations and co-creation workshops were held throughout the design process, ensuring the park would reflect local needs and aspirations. The involvement of municipal services, which will oversee the long-term maintenance of the park, the hall, and the intergenerational house, was also crucial to ensuring the project's durability and success.this picture!

    Project gallerySee allShow less
    Project locationAddress:Herstal, BelgiumLocation to be used only as a reference. It could indicate city/country but not exact address.About this office
    MaterialSteelMaterials and TagsPublished on June 05, 2025Cite: "Browning Industrial Park / MULTIPLE Architecture & Urbanism" 05 Jun 2025. ArchDaily. Accessed . < ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否
    You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    #browning #industrial #park #multiple #architecture
    Browning Industrial Park / MULTIPLE Architecture & Urbanism
    Browning Industrial Park / MULTIPLE Architecture & UrbanismSave this picture!© Bruno Dias Ventura Architects: MULTIPLE Architecture & Urbanism Area Area of this architecture project Area:  15562 m² Year Completion year of this architecture project Year:  2024 Photographs Photographs:Bruno Dias Ventura Manufacturers Brands with products used in this architecture project Manufacturers:  Joris Ide, Ozklux, VMZINC, ZumtobelMore SpecsLess Specs this picture! Text description provided by the architects. The Browning Park project emerged from a strong ambition: to transform a derelict industrial site - once home to Herstal's weapons industry - into a vibrant green lung at the heart of the city. Over time, the site had become a sealed and fragmented grey zone, disconnected from its surrounding neighborhoods. The project was driven by a desire to reverse this fragmentation by creating a continuous pedestrian path, reopening the site, and reconnecting it with its urban context. This central promenade became the backbone of the design, around which inclusive and fully accessible public spaces were thoughtfully arranged.this picture!this picture!this picture!One of the most significant challenges stemmed from the condition of the site itself. Decades of industrial activity had left behind polluted soils and substantial infrastructural remnants. A deep soil remediation process - reaching depths of up to 12 meters - was required before any development could begin. This necessary intervention also offered the opportunity to reshape the topography and increase permeable surfaces, thus improving rainwater infiltration and boosting the site's resilience to climate change. Another key challenge involved balancing heritage preservation with new uses. The former Browning factory, for instance, had to be partially dismantled, structurally reinforced, and reimagined, while retaining its historical identity.this picture!In terms of construction, the project focused on reusing existing structures wherever possible. The factory's original metal frame was preserved and strengthened, and a new timber roof was added to create a covered public hall. Adjacent to it, the garden integrates remnants of the steel framework, which now supports wild vegetation and forms a robust, weather-resistant landscape feature. These gestures embody the project's commitment to circularity and a low environmental footprint.this picture!this picture!this picture!this picture!The spatial layout of the park was carefully designed to accommodate a wide variety of users and age groups. Along the main pedestrian spine, a sequence of diverse atmospheres and uses unfolds: a skatepark, a playground, picnic areas, outdoor fitness zones, a square with a fountain, a woodland area, and a flower garden. All these features are barrier-free and fully accessible.this picture!The project was developed in close dialogue with the people of Herstal and future park users. A series of public consultations and co-creation workshops were held throughout the design process, ensuring the park would reflect local needs and aspirations. The involvement of municipal services, which will oversee the long-term maintenance of the park, the hall, and the intergenerational house, was also crucial to ensuring the project's durability and success.this picture! Project gallerySee allShow less Project locationAddress:Herstal, BelgiumLocation to be used only as a reference. It could indicate city/country but not exact address.About this office MaterialSteelMaterials and TagsPublished on June 05, 2025Cite: "Browning Industrial Park / MULTIPLE Architecture & Urbanism" 05 Jun 2025. ArchDaily. Accessed . < ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否 You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream #browning #industrial #park #multiple #architecture
    WWW.ARCHDAILY.COM
    Browning Industrial Park / MULTIPLE Architecture & Urbanism
    Browning Industrial Park / MULTIPLE Architecture & UrbanismSave this picture!© Bruno Dias Ventura Architects: MULTIPLE Architecture & Urbanism Area Area of this architecture project Area:  15562 m² Year Completion year of this architecture project Year:  2024 Photographs Photographs:Bruno Dias Ventura Manufacturers Brands with products used in this architecture project Manufacturers:  Joris Ide, Ozklux, VMZINC, ZumtobelMore SpecsLess Specs Save this picture! Text description provided by the architects. The Browning Park project emerged from a strong ambition: to transform a derelict industrial site - once home to Herstal's weapons industry - into a vibrant green lung at the heart of the city. Over time, the site had become a sealed and fragmented grey zone, disconnected from its surrounding neighborhoods. The project was driven by a desire to reverse this fragmentation by creating a continuous pedestrian path, reopening the site, and reconnecting it with its urban context. This central promenade became the backbone of the design, around which inclusive and fully accessible public spaces were thoughtfully arranged.Save this picture!Save this picture!Save this picture!One of the most significant challenges stemmed from the condition of the site itself. Decades of industrial activity had left behind polluted soils and substantial infrastructural remnants. A deep soil remediation process - reaching depths of up to 12 meters - was required before any development could begin. This necessary intervention also offered the opportunity to reshape the topography and increase permeable surfaces, thus improving rainwater infiltration and boosting the site's resilience to climate change. Another key challenge involved balancing heritage preservation with new uses. The former Browning factory, for instance, had to be partially dismantled, structurally reinforced, and reimagined, while retaining its historical identity.Save this picture!In terms of construction, the project focused on reusing existing structures wherever possible. The factory's original metal frame was preserved and strengthened, and a new timber roof was added to create a covered public hall. Adjacent to it, the garden integrates remnants of the steel framework, which now supports wild vegetation and forms a robust, weather-resistant landscape feature. These gestures embody the project's commitment to circularity and a low environmental footprint.Save this picture!Save this picture!Save this picture!Save this picture!The spatial layout of the park was carefully designed to accommodate a wide variety of users and age groups. Along the main pedestrian spine, a sequence of diverse atmospheres and uses unfolds: a skatepark, a playground, picnic areas, outdoor fitness zones, a square with a fountain, a woodland area, and a flower garden. All these features are barrier-free and fully accessible.Save this picture!The project was developed in close dialogue with the people of Herstal and future park users. A series of public consultations and co-creation workshops were held throughout the design process, ensuring the park would reflect local needs and aspirations. The involvement of municipal services, which will oversee the long-term maintenance of the park, the hall, and the intergenerational house, was also crucial to ensuring the project's durability and success.Save this picture! Project gallerySee allShow less Project locationAddress:Herstal, BelgiumLocation to be used only as a reference. It could indicate city/country but not exact address.About this office MaterialSteelMaterials and TagsPublished on June 05, 2025Cite: "Browning Industrial Park / MULTIPLE Architecture & Urbanism" 05 Jun 2025. ArchDaily. Accessed . <https://www.archdaily.com/1030623/browning-industrial-park-multiple-architecture-and-urbanism&gt ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否 You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    Like
    Love
    Wow
    Sad
    Angry
    207
    0 Commenti 0 condivisioni
  • North America takes the bulk of AI VC investments, despite tough political environment

    Despite what some experts have characterized as an environment increasingly hostile to AI R&D, North America continues to receive the bulk of AI venture dollars, according to data from investment tracker PitchBook.
    Between February and May of this year, VCs poured billion into North America-based AI and machine learning startups across 1,528 deals. That’s compared with billion that VC firms invested in European AI ventures across 742 deals across the same period.
    Asia-based startups have fared a bit worse than their European counterparts, according to PitchBook. Between February and May, VCs invested just billion in Asia-based AI startups across 515 deals.
    Under President Donald Trump, the U.S. has dramatically cut funding to scientific grants related to basic AI research, made it more difficult for foreign students specializing in AI to study in the U.S., and threatened to dismantle university-housed AI labs by freezing billions of dollars in federal funds. The administration’s trade policies, meanwhile, including its retaliatory tariffs, have led to a chaotic market unfavorable for risky new AI ventures.
    In a post on X in March, AI pioneer and Nobel Laureate Geoffrey Hinton called for billionaire Elon Musk, who until recently advised Trump’s cost-cutting group, the Department of Government Efficiency, to be expelled from the British Royal Society “because of the huge damage he is doing to scientific institutions in the U.S.”
    One might expect that Europe, which has pledged to become a global leader in AI, would attract more venture capital in light of Trump’s controversial policies in the U.S., which have created uncertainty and confusion for founders, investors, and researchers alike. Moreover, the EU has committed hundreds of billions of euros to support the development of AI within its member countries and already has a number of successful, well-funded AI startups in its ranks.
    But that anticipated shift in global investment hasn’t come to pass. There isn’t any sign of a mass VC exodus to the bloc, or of significant upticks in AI funding overseas — at least not yet.

    Techcrunch event

    now through June 4 for TechCrunch Sessions: AI
    on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5.

    Exhibit at TechCrunch Sessions: AI
    Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last.

    Berkeley, CA
    |
    June 5

    REGISTER NOW

    The same is true for China, which has spawned high-profile AI startups like DeepSeek and Butterfly Effect — the company behind the agentic platform Manus — but where VC activity in the country and the broader Asian region remains relatively austere.In 2024, North American startups secured 75.6% of all VC AI funding — billion. That share has only increased this year. So far in 2025, North American AI investments represent 86.2%of all VC funding for AI globally.
    It paints a somewhat surprising picture. Even amid mounting political and regulatory headwinds under Trump’s second term, the U.S. remains the undisputed center for AI capital, meaning investors, fatigued as they may be by the administration’s unpredictability, are still counting on U.S. innovation to deliver the biggest returns, at least for now.
    #north #america #takes #bulk #investments
    North America takes the bulk of AI VC investments, despite tough political environment
    Despite what some experts have characterized as an environment increasingly hostile to AI R&D, North America continues to receive the bulk of AI venture dollars, according to data from investment tracker PitchBook. Between February and May of this year, VCs poured billion into North America-based AI and machine learning startups across 1,528 deals. That’s compared with billion that VC firms invested in European AI ventures across 742 deals across the same period. Asia-based startups have fared a bit worse than their European counterparts, according to PitchBook. Between February and May, VCs invested just billion in Asia-based AI startups across 515 deals. Under President Donald Trump, the U.S. has dramatically cut funding to scientific grants related to basic AI research, made it more difficult for foreign students specializing in AI to study in the U.S., and threatened to dismantle university-housed AI labs by freezing billions of dollars in federal funds. The administration’s trade policies, meanwhile, including its retaliatory tariffs, have led to a chaotic market unfavorable for risky new AI ventures. In a post on X in March, AI pioneer and Nobel Laureate Geoffrey Hinton called for billionaire Elon Musk, who until recently advised Trump’s cost-cutting group, the Department of Government Efficiency, to be expelled from the British Royal Society “because of the huge damage he is doing to scientific institutions in the U.S.” One might expect that Europe, which has pledged to become a global leader in AI, would attract more venture capital in light of Trump’s controversial policies in the U.S., which have created uncertainty and confusion for founders, investors, and researchers alike. Moreover, the EU has committed hundreds of billions of euros to support the development of AI within its member countries and already has a number of successful, well-funded AI startups in its ranks. But that anticipated shift in global investment hasn’t come to pass. There isn’t any sign of a mass VC exodus to the bloc, or of significant upticks in AI funding overseas — at least not yet. Techcrunch event now through June 4 for TechCrunch Sessions: AI on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW The same is true for China, which has spawned high-profile AI startups like DeepSeek and Butterfly Effect — the company behind the agentic platform Manus — but where VC activity in the country and the broader Asian region remains relatively austere.In 2024, North American startups secured 75.6% of all VC AI funding — billion. That share has only increased this year. So far in 2025, North American AI investments represent 86.2%of all VC funding for AI globally. It paints a somewhat surprising picture. Even amid mounting political and regulatory headwinds under Trump’s second term, the U.S. remains the undisputed center for AI capital, meaning investors, fatigued as they may be by the administration’s unpredictability, are still counting on U.S. innovation to deliver the biggest returns, at least for now. #north #america #takes #bulk #investments
    TECHCRUNCH.COM
    North America takes the bulk of AI VC investments, despite tough political environment
    Despite what some experts have characterized as an environment increasingly hostile to AI R&D, North America continues to receive the bulk of AI venture dollars, according to data from investment tracker PitchBook. Between February and May of this year, VCs poured $69.7 billion into North America-based AI and machine learning startups across 1,528 deals. That’s compared with $6.4 billion that VC firms invested in European AI ventures across 742 deals across the same period. Asia-based startups have fared a bit worse than their European counterparts, according to PitchBook. Between February and May, VCs invested just $3 billion in Asia-based AI startups across 515 deals. Under President Donald Trump, the U.S. has dramatically cut funding to scientific grants related to basic AI research, made it more difficult for foreign students specializing in AI to study in the U.S., and threatened to dismantle university-housed AI labs by freezing billions of dollars in federal funds. The administration’s trade policies, meanwhile, including its retaliatory tariffs, have led to a chaotic market unfavorable for risky new AI ventures. In a post on X in March, AI pioneer and Nobel Laureate Geoffrey Hinton called for billionaire Elon Musk, who until recently advised Trump’s cost-cutting group, the Department of Government Efficiency, to be expelled from the British Royal Society “because of the huge damage he is doing to scientific institutions in the U.S.” One might expect that Europe, which has pledged to become a global leader in AI, would attract more venture capital in light of Trump’s controversial policies in the U.S., which have created uncertainty and confusion for founders, investors, and researchers alike. Moreover, the EU has committed hundreds of billions of euros to support the development of AI within its member countries and already has a number of successful, well-funded AI startups in its ranks (see Mistral, H, and Aleph Alpha, to name a few). But that anticipated shift in global investment hasn’t come to pass. There isn’t any sign of a mass VC exodus to the bloc, or of significant upticks in AI funding overseas — at least not yet. Techcrunch event Save now through June 4 for TechCrunch Sessions: AI Save $300 on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW The same is true for China, which has spawned high-profile AI startups like DeepSeek and Butterfly Effect — the company behind the agentic platform Manus — but where VC activity in the country and the broader Asian region remains relatively austere. (Export controls impacting the ability of certain Asian countries to procure AI chips are almost certainly a factor.) In 2024, North American startups secured 75.6% of all VC AI funding — $106.24 billion. That share has only increased this year. So far in 2025, North American AI investments represent 86.2% ($79.74 billion) of all VC funding for AI globally. It paints a somewhat surprising picture. Even amid mounting political and regulatory headwinds under Trump’s second term, the U.S. remains the undisputed center for AI capital, meaning investors, fatigued as they may be by the administration’s unpredictability, are still counting on U.S. innovation to deliver the biggest returns, at least for now.
    Like
    Love
    Wow
    Sad
    Angry
    253
    0 Commenti 0 condivisioni
  • The hidden time bomb in the tax code that's fueling mass tech layoffs: A decades-old tax rule helped build America's tech economy. A quiet change under Trump helped dismantle it

    For the past two years, it’s been a ghost in the machine of American tech. Between 2022 and today, a little-noticed tweak to the U.S. tax code has quietly rewired the financial logic of how American companies invest in research and development. Outside of CFO and accounting circles, almost no one knew it existed. “I work on these tax write-offs and still hadn’t heard about this,” a chief operating officer at a private-equity-backed tech company told Quartz. “It’s just been so weirdly silent.”AdvertisementStill, the delayed change to a decades-old tax provision — buried deep in the 2017 tax law — has contributed to the loss of hundreds of thousands of high-paying, white-collar jobs. That’s the picture that emerges from a review of corporate filings, public financial data, analysis of timelines, and interviews with industry insiders. One accountant, working in-house at a tech company, described it as a “niche issue with broad impact,” echoing sentiments from venture capital investors also interviewed for this article. Some spoke on condition of anonymity to discuss sensitive political matters.Since the start of 2023, more than half-a-million tech workers have been laid off, according to industry tallies. Headlines have blamed over-hiring during the pandemic and, more recently, AI. But beneath the surface was a hidden accelerant: a change to what’s known as Section 174 that helped gut in-house software and product development teams everywhere from tech giants such as Microsoftand Metato much smaller, private, direct-to-consumer and other internet-first companies.Now, as a bipartisan effort to repeal the Section 174 change moves through Congress, bigger questions are surfacing: How did a single line in the tax code help trigger a tsunami of mass layoffs? And why did no one see it coming? For almost 70 years, American companies could deduct 100% of qualified research and development spending in the year they incurred the costs. Salaries, software, contractor payments — if it contributed to creating or improving a product, it came off the top of a firm’s taxable income.AdvertisementThe deduction was guaranteed by Section 174 of the IRS Code of 1954, and under the provision, R&D flourished in the U.S.Microsoft was founded in 1975. Applelaunched its first computer in 1976. Googleincorporated in 1998. Facebook opened to the general public in 2006. All these companies, now among the most valuable in the world, developed their earliest products — programming tools, hardware, search engines — under a tax system that rewarded building now, not later.The subsequent rise of smartphones, cloud computing, and mobile apps also happened in an America where companies could immediately write off their investments in engineering, infrastructure, and experimentation. It was a baseline assumption — innovation and risk-taking subsidized by the tax code — that shaped how founders operated and how investors made decisions.In turn, tech companies largely built their products in the U.S. AdvertisementMicrosoft’s operating systems were coded in Washington state. Apple’s early hardware and software teams were in California. Google’s search engine was born at Stanford and scaled from Mountain View. Facebook’s entire social architecture was developed in Menlo Park. The deduction directly incentivized keeping R&D close to home, rewarding companies for investing in American workers, engineers, and infrastructure.That’s what makes the politics of Section 174 so revealing. For all the rhetoric about bringing jobs back and making things in America, the first Trump administration’s major tax bill arguably helped accomplish the opposite.When Congress passed the Tax Cuts and Jobs Act, the signature legislative achievement of President Donald Trump’s first term, it slashed the corporate tax rate from 35% to 21% — a massive revenue loss on paper for the federal government.To make the 2017 bill comply with Senate budget rules, lawmakers needed to offset the cost. So they added future tax hikes that wouldn’t kick in right away, wouldn’t provoke immediate backlash from businesses, and could, in theory, be quietly repealed later.AdvertisementThe delayed change to Section 174 — from immediate expensing of R&D to mandatory amortization, meaning that companies must spread the deduction out in smaller chunks over five or even 15-year periods — was that kind of provision. It didn’t start affecting the budget until 2022, but it helped the TCJA appear “deficit neutral” over the 10-year window used for legislative scoring.The delay wasn’t a technical necessity. It was a political tactic. Such moves are common in tax legislation. Phase-ins and delayed provisions let lawmakers game how the Congressional Budget Office— Congress’ nonpartisan analyst of how bills impact budgets and deficits — scores legislation, pushing costs or revenue losses outside official forecasting windows.And so, on schedule in 2022, the change to Section 174 went into effect. Companies filed their 2022 tax returns under the new rules in early 2023. And suddenly, R&D wasn’t a full, immediate write-off anymore. The tax benefits of salaries for engineers, product and project managers, data scientists, and even some user experience and marketing staff — all of which had previously reduced taxable income in year one — now had to be spread out over five- or 15-year periods. To understand the impact, imagine a personal tax code change that allowed you to deduct 100% of your biggest source of expenses, and that becoming a 20% deduction. For cash-strapped companies, especially those not yet profitable, the result was a painful tax bill just as venture funding dried up and interest rates soared.AdvertisementSalesforce office buildings in San Francisco.Photo: Jason Henry/BloombergIt’s no coincidence that Meta announced its “Year of Efficiency” immediately after the Section 174 change took effect. Ditto Microsoft laying off 10,000 employees in January 2023 despite strong earnings, or Google parent Alphabet cutting 12,000 jobs around the same time.Amazonalso laid off almost 30,000 people, with cuts focused not just on logistics but on Alexa and internal cloud tools — precisely the kinds of projects that would have once qualified as immediately deductible R&D. Salesforceeliminated 10% of its staff, or 8,000 people, including entire product teams.In public, companies blamed bloat and AI. But inside boardrooms, spreadsheets were telling a quieter story. And MD&A notes — management’s notes on the numbers — buried deep in 10-K filings recorded the change, too. R&D had become more expensive to carry. Headcount, the leading R&D expense across the tech industry, was the easiest thing to cut.AdvertisementIn its 2023 annual report, Meta described salaries as its single biggest R&D expense. Between the first and second years that the Section 174 change began affecting tax returns, Meta cut its total workforce by almost 25%. Over the same period, Microsoft reduced its global headcount by about 7%, with cuts concentrated in product-facing, engineering-heavy roles.Smaller companies without the fortress-like balance sheets of Big Tech have arguably been hit even harder. Twilioslashed 22% of its workforce in 2023 alone. Shopifycut almost 30% of staff in 2022 and 2023. Coinbasereduced headcount by 36% across a pair of brutal restructuring waves.Since going into effect, the provision has hit at the very heart of America’s economic growth engine: the tech sector.By market cap, tech giants dominate the S&P 500, with the “Magnificent 7” alone accounting for more than a third of the index’s total value. Workforce numbers tell a similar story, with tech employing millions of Americans directly and supporting the employment of tens of millions more. As measured by GDP, capital-T tech contributes about 10% of national output.AdvertisementIt’s not just that tech layoffs were large, it’s that they were massively disproportionate. Across the broader U.S. economy, job cuts hovered around in low single digits across most sectors. But in tech, entire divisions vanished, with a whopping 60% jump in layoffs between 2022 and 2023. Some cuts reflected real inefficiencies — a response to over-hiring during the zero-interest rate boom. At the same time, many of the roles eliminated were in R&D, product, and engineering, precisely the kind of functions that had once benefitted from generous tax treatment under Section 174.Throughout the 2010s, a broad swath of startups, direct-to-consumer brands, and internet-first firms — basically every company you recognize from Instagram or Facebook ads — built their growth models around a kind of engineered break-even.The tax code allowed them to spend aggressively on product and engineering, then write it all off as R&D, keeping their taxable income close to zero by design. It worked because taxable income and actual cash flow were often notGAAP accounting practices. Basically, as long as spending counted as R&D, companies could report losses to investors while owing almost nothing to the IRS.But the Section 174 change broke that model. Once those same expenses had to be spread out, or amortized, over multiple years, the tax shield vanished. Companies that were still burning cash suddenly looked profitable on paper, triggering real tax bills on imaginary gains.AdvertisementThe logic that once fueled a generation of digital-first growth collapsed overnight.So it wasn’t just tech experiencing effects. From 1954 until 2022, the U.S. tax code had encouraged businesses of all stripes to behave like tech companies. From retail to logistics, healthcare to media, if firms built internal tools, customized a software stack, or invested in business intelligence and data-driven product development, they could expense those costs. The write-off incentivized in-house builds and fast growth well outside the capital-T tech sector. This lines up with OECD research showing that immediate deductions foster innovation more than spread-out ones.And American companies ran with that logic. According to government data, U.S. businesses reported about billion in R&D expenditures in 2019 alone, and almost half of that came from industries outside traditional tech. The Bureau of Economic Analysis estimates that this sector, the broader digital economy, accounts for another 10% of GDP.Add that to core tech’s contribution, and the Section 174 shift has likely touched at least 20% of the U.S. economy.AdvertisementThe result? A tax policy aimed at raising short-term revenue effectively hid a time bomb inside the growth engines of thousands of companies. And when it detonated, it kneecapped the incentive for hiring American engineers or investing in American-made tech and digital products.It made building tech companies in America look irrational on a spreadsheet.A bipartisan group of lawmakers is pushing to repeal the Section 174 change, with business groups, CFOs, crypto executives, and venture capitalists lobbying hard for retroactive relief. But the politics are messy. Fixing 174 would mean handing a tax break to the same companies many voters in both parties see as symbols of corporate excess. Any repeal would also come too late for the hundreds of thousands of workers already laid off.And of course, the losses don’t stop at Meta’s or Google’s campus gates. They ripple out. When high-paid tech workers disappear, so do the lunch orders. The house tours. The contract gigs. The spending habits that sustain entire urban economies and thousands of other jobs. Sandwich artists. Rideshare drivers. Realtors. Personal trainers. House cleaners. In tech-heavy cities, the fallout runs deep — and it’s still unfolding.AdvertisementWashington is now poised to pass a second Trump tax bill — one packed with more obscure provisions, more delayed impacts, more quiet redistribution. And it comes as analysts are only just beginning to understand the real-world effects of the last round.The Section 174 change “significantly increased the tax burden on companies investing in innovation, potentially stifling economic growth and reducing the United States’ competitiveness on the global stage,” according to the tax consulting firm KBKG. Whether the U.S. will reverse course — or simply adapt to a new normal — remains to be seen.
    #hidden #time #bomb #tax #code
    The hidden time bomb in the tax code that's fueling mass tech layoffs: A decades-old tax rule helped build America's tech economy. A quiet change under Trump helped dismantle it
    For the past two years, it’s been a ghost in the machine of American tech. Between 2022 and today, a little-noticed tweak to the U.S. tax code has quietly rewired the financial logic of how American companies invest in research and development. Outside of CFO and accounting circles, almost no one knew it existed. “I work on these tax write-offs and still hadn’t heard about this,” a chief operating officer at a private-equity-backed tech company told Quartz. “It’s just been so weirdly silent.”AdvertisementStill, the delayed change to a decades-old tax provision — buried deep in the 2017 tax law — has contributed to the loss of hundreds of thousands of high-paying, white-collar jobs. That’s the picture that emerges from a review of corporate filings, public financial data, analysis of timelines, and interviews with industry insiders. One accountant, working in-house at a tech company, described it as a “niche issue with broad impact,” echoing sentiments from venture capital investors also interviewed for this article. Some spoke on condition of anonymity to discuss sensitive political matters.Since the start of 2023, more than half-a-million tech workers have been laid off, according to industry tallies. Headlines have blamed over-hiring during the pandemic and, more recently, AI. But beneath the surface was a hidden accelerant: a change to what’s known as Section 174 that helped gut in-house software and product development teams everywhere from tech giants such as Microsoftand Metato much smaller, private, direct-to-consumer and other internet-first companies.Now, as a bipartisan effort to repeal the Section 174 change moves through Congress, bigger questions are surfacing: How did a single line in the tax code help trigger a tsunami of mass layoffs? And why did no one see it coming? For almost 70 years, American companies could deduct 100% of qualified research and development spending in the year they incurred the costs. Salaries, software, contractor payments — if it contributed to creating or improving a product, it came off the top of a firm’s taxable income.AdvertisementThe deduction was guaranteed by Section 174 of the IRS Code of 1954, and under the provision, R&D flourished in the U.S.Microsoft was founded in 1975. Applelaunched its first computer in 1976. Googleincorporated in 1998. Facebook opened to the general public in 2006. All these companies, now among the most valuable in the world, developed their earliest products — programming tools, hardware, search engines — under a tax system that rewarded building now, not later.The subsequent rise of smartphones, cloud computing, and mobile apps also happened in an America where companies could immediately write off their investments in engineering, infrastructure, and experimentation. It was a baseline assumption — innovation and risk-taking subsidized by the tax code — that shaped how founders operated and how investors made decisions.In turn, tech companies largely built their products in the U.S. AdvertisementMicrosoft’s operating systems were coded in Washington state. Apple’s early hardware and software teams were in California. Google’s search engine was born at Stanford and scaled from Mountain View. Facebook’s entire social architecture was developed in Menlo Park. The deduction directly incentivized keeping R&D close to home, rewarding companies for investing in American workers, engineers, and infrastructure.That’s what makes the politics of Section 174 so revealing. For all the rhetoric about bringing jobs back and making things in America, the first Trump administration’s major tax bill arguably helped accomplish the opposite.When Congress passed the Tax Cuts and Jobs Act, the signature legislative achievement of President Donald Trump’s first term, it slashed the corporate tax rate from 35% to 21% — a massive revenue loss on paper for the federal government.To make the 2017 bill comply with Senate budget rules, lawmakers needed to offset the cost. So they added future tax hikes that wouldn’t kick in right away, wouldn’t provoke immediate backlash from businesses, and could, in theory, be quietly repealed later.AdvertisementThe delayed change to Section 174 — from immediate expensing of R&D to mandatory amortization, meaning that companies must spread the deduction out in smaller chunks over five or even 15-year periods — was that kind of provision. It didn’t start affecting the budget until 2022, but it helped the TCJA appear “deficit neutral” over the 10-year window used for legislative scoring.The delay wasn’t a technical necessity. It was a political tactic. Such moves are common in tax legislation. Phase-ins and delayed provisions let lawmakers game how the Congressional Budget Office— Congress’ nonpartisan analyst of how bills impact budgets and deficits — scores legislation, pushing costs or revenue losses outside official forecasting windows.And so, on schedule in 2022, the change to Section 174 went into effect. Companies filed their 2022 tax returns under the new rules in early 2023. And suddenly, R&D wasn’t a full, immediate write-off anymore. The tax benefits of salaries for engineers, product and project managers, data scientists, and even some user experience and marketing staff — all of which had previously reduced taxable income in year one — now had to be spread out over five- or 15-year periods. To understand the impact, imagine a personal tax code change that allowed you to deduct 100% of your biggest source of expenses, and that becoming a 20% deduction. For cash-strapped companies, especially those not yet profitable, the result was a painful tax bill just as venture funding dried up and interest rates soared.AdvertisementSalesforce office buildings in San Francisco.Photo: Jason Henry/BloombergIt’s no coincidence that Meta announced its “Year of Efficiency” immediately after the Section 174 change took effect. Ditto Microsoft laying off 10,000 employees in January 2023 despite strong earnings, or Google parent Alphabet cutting 12,000 jobs around the same time.Amazonalso laid off almost 30,000 people, with cuts focused not just on logistics but on Alexa and internal cloud tools — precisely the kinds of projects that would have once qualified as immediately deductible R&D. Salesforceeliminated 10% of its staff, or 8,000 people, including entire product teams.In public, companies blamed bloat and AI. But inside boardrooms, spreadsheets were telling a quieter story. And MD&A notes — management’s notes on the numbers — buried deep in 10-K filings recorded the change, too. R&D had become more expensive to carry. Headcount, the leading R&D expense across the tech industry, was the easiest thing to cut.AdvertisementIn its 2023 annual report, Meta described salaries as its single biggest R&D expense. Between the first and second years that the Section 174 change began affecting tax returns, Meta cut its total workforce by almost 25%. Over the same period, Microsoft reduced its global headcount by about 7%, with cuts concentrated in product-facing, engineering-heavy roles.Smaller companies without the fortress-like balance sheets of Big Tech have arguably been hit even harder. Twilioslashed 22% of its workforce in 2023 alone. Shopifycut almost 30% of staff in 2022 and 2023. Coinbasereduced headcount by 36% across a pair of brutal restructuring waves.Since going into effect, the provision has hit at the very heart of America’s economic growth engine: the tech sector.By market cap, tech giants dominate the S&P 500, with the “Magnificent 7” alone accounting for more than a third of the index’s total value. Workforce numbers tell a similar story, with tech employing millions of Americans directly and supporting the employment of tens of millions more. As measured by GDP, capital-T tech contributes about 10% of national output.AdvertisementIt’s not just that tech layoffs were large, it’s that they were massively disproportionate. Across the broader U.S. economy, job cuts hovered around in low single digits across most sectors. But in tech, entire divisions vanished, with a whopping 60% jump in layoffs between 2022 and 2023. Some cuts reflected real inefficiencies — a response to over-hiring during the zero-interest rate boom. At the same time, many of the roles eliminated were in R&D, product, and engineering, precisely the kind of functions that had once benefitted from generous tax treatment under Section 174.Throughout the 2010s, a broad swath of startups, direct-to-consumer brands, and internet-first firms — basically every company you recognize from Instagram or Facebook ads — built their growth models around a kind of engineered break-even.The tax code allowed them to spend aggressively on product and engineering, then write it all off as R&D, keeping their taxable income close to zero by design. It worked because taxable income and actual cash flow were often notGAAP accounting practices. Basically, as long as spending counted as R&D, companies could report losses to investors while owing almost nothing to the IRS.But the Section 174 change broke that model. Once those same expenses had to be spread out, or amortized, over multiple years, the tax shield vanished. Companies that were still burning cash suddenly looked profitable on paper, triggering real tax bills on imaginary gains.AdvertisementThe logic that once fueled a generation of digital-first growth collapsed overnight.So it wasn’t just tech experiencing effects. From 1954 until 2022, the U.S. tax code had encouraged businesses of all stripes to behave like tech companies. From retail to logistics, healthcare to media, if firms built internal tools, customized a software stack, or invested in business intelligence and data-driven product development, they could expense those costs. The write-off incentivized in-house builds and fast growth well outside the capital-T tech sector. This lines up with OECD research showing that immediate deductions foster innovation more than spread-out ones.And American companies ran with that logic. According to government data, U.S. businesses reported about billion in R&D expenditures in 2019 alone, and almost half of that came from industries outside traditional tech. The Bureau of Economic Analysis estimates that this sector, the broader digital economy, accounts for another 10% of GDP.Add that to core tech’s contribution, and the Section 174 shift has likely touched at least 20% of the U.S. economy.AdvertisementThe result? A tax policy aimed at raising short-term revenue effectively hid a time bomb inside the growth engines of thousands of companies. And when it detonated, it kneecapped the incentive for hiring American engineers or investing in American-made tech and digital products.It made building tech companies in America look irrational on a spreadsheet.A bipartisan group of lawmakers is pushing to repeal the Section 174 change, with business groups, CFOs, crypto executives, and venture capitalists lobbying hard for retroactive relief. But the politics are messy. Fixing 174 would mean handing a tax break to the same companies many voters in both parties see as symbols of corporate excess. Any repeal would also come too late for the hundreds of thousands of workers already laid off.And of course, the losses don’t stop at Meta’s or Google’s campus gates. They ripple out. When high-paid tech workers disappear, so do the lunch orders. The house tours. The contract gigs. The spending habits that sustain entire urban economies and thousands of other jobs. Sandwich artists. Rideshare drivers. Realtors. Personal trainers. House cleaners. In tech-heavy cities, the fallout runs deep — and it’s still unfolding.AdvertisementWashington is now poised to pass a second Trump tax bill — one packed with more obscure provisions, more delayed impacts, more quiet redistribution. And it comes as analysts are only just beginning to understand the real-world effects of the last round.The Section 174 change “significantly increased the tax burden on companies investing in innovation, potentially stifling economic growth and reducing the United States’ competitiveness on the global stage,” according to the tax consulting firm KBKG. Whether the U.S. will reverse course — or simply adapt to a new normal — remains to be seen. #hidden #time #bomb #tax #code
    QZ.COM
    The hidden time bomb in the tax code that's fueling mass tech layoffs: A decades-old tax rule helped build America's tech economy. A quiet change under Trump helped dismantle it
    For the past two years, it’s been a ghost in the machine of American tech. Between 2022 and today, a little-noticed tweak to the U.S. tax code has quietly rewired the financial logic of how American companies invest in research and development. Outside of CFO and accounting circles, almost no one knew it existed. “I work on these tax write-offs and still hadn’t heard about this,” a chief operating officer at a private-equity-backed tech company told Quartz. “It’s just been so weirdly silent.”AdvertisementStill, the delayed change to a decades-old tax provision — buried deep in the 2017 tax law — has contributed to the loss of hundreds of thousands of high-paying, white-collar jobs. That’s the picture that emerges from a review of corporate filings, public financial data, analysis of timelines, and interviews with industry insiders. One accountant, working in-house at a tech company, described it as a “niche issue with broad impact,” echoing sentiments from venture capital investors also interviewed for this article. Some spoke on condition of anonymity to discuss sensitive political matters.Since the start of 2023, more than half-a-million tech workers have been laid off, according to industry tallies. Headlines have blamed over-hiring during the pandemic and, more recently, AI. But beneath the surface was a hidden accelerant: a change to what’s known as Section 174 that helped gut in-house software and product development teams everywhere from tech giants such as Microsoft (MSFT) and Meta (META) to much smaller, private, direct-to-consumer and other internet-first companies.Now, as a bipartisan effort to repeal the Section 174 change moves through Congress, bigger questions are surfacing: How did a single line in the tax code help trigger a tsunami of mass layoffs? And why did no one see it coming? For almost 70 years, American companies could deduct 100% of qualified research and development spending in the year they incurred the costs. Salaries, software, contractor payments — if it contributed to creating or improving a product, it came off the top of a firm’s taxable income.AdvertisementThe deduction was guaranteed by Section 174 of the IRS Code of 1954, and under the provision, R&D flourished in the U.S.Microsoft was founded in 1975. Apple (AAPL) launched its first computer in 1976. Google (GOOGL) incorporated in 1998. Facebook opened to the general public in 2006. All these companies, now among the most valuable in the world, developed their earliest products — programming tools, hardware, search engines — under a tax system that rewarded building now, not later.The subsequent rise of smartphones, cloud computing, and mobile apps also happened in an America where companies could immediately write off their investments in engineering, infrastructure, and experimentation. It was a baseline assumption — innovation and risk-taking subsidized by the tax code — that shaped how founders operated and how investors made decisions.In turn, tech companies largely built their products in the U.S. AdvertisementMicrosoft’s operating systems were coded in Washington state. Apple’s early hardware and software teams were in California. Google’s search engine was born at Stanford and scaled from Mountain View. Facebook’s entire social architecture was developed in Menlo Park. The deduction directly incentivized keeping R&D close to home, rewarding companies for investing in American workers, engineers, and infrastructure.That’s what makes the politics of Section 174 so revealing. For all the rhetoric about bringing jobs back and making things in America, the first Trump administration’s major tax bill arguably helped accomplish the opposite.When Congress passed the Tax Cuts and Jobs Act (TCJA), the signature legislative achievement of President Donald Trump’s first term, it slashed the corporate tax rate from 35% to 21% — a massive revenue loss on paper for the federal government.To make the 2017 bill comply with Senate budget rules, lawmakers needed to offset the cost. So they added future tax hikes that wouldn’t kick in right away, wouldn’t provoke immediate backlash from businesses, and could, in theory, be quietly repealed later.AdvertisementThe delayed change to Section 174 — from immediate expensing of R&D to mandatory amortization, meaning that companies must spread the deduction out in smaller chunks over five or even 15-year periods — was that kind of provision. It didn’t start affecting the budget until 2022, but it helped the TCJA appear “deficit neutral” over the 10-year window used for legislative scoring.The delay wasn’t a technical necessity. It was a political tactic. Such moves are common in tax legislation. Phase-ins and delayed provisions let lawmakers game how the Congressional Budget Office (CBO) — Congress’ nonpartisan analyst of how bills impact budgets and deficits — scores legislation, pushing costs or revenue losses outside official forecasting windows.And so, on schedule in 2022, the change to Section 174 went into effect. Companies filed their 2022 tax returns under the new rules in early 2023. And suddenly, R&D wasn’t a full, immediate write-off anymore. The tax benefits of salaries for engineers, product and project managers, data scientists, and even some user experience and marketing staff — all of which had previously reduced taxable income in year one — now had to be spread out over five- or 15-year periods. To understand the impact, imagine a personal tax code change that allowed you to deduct 100% of your biggest source of expenses, and that becoming a 20% deduction. For cash-strapped companies, especially those not yet profitable, the result was a painful tax bill just as venture funding dried up and interest rates soared.AdvertisementSalesforce office buildings in San Francisco.Photo: Jason Henry/Bloomberg (Getty Images)It’s no coincidence that Meta announced its “Year of Efficiency” immediately after the Section 174 change took effect. Ditto Microsoft laying off 10,000 employees in January 2023 despite strong earnings, or Google parent Alphabet cutting 12,000 jobs around the same time.Amazon (AMZN) also laid off almost 30,000 people, with cuts focused not just on logistics but on Alexa and internal cloud tools — precisely the kinds of projects that would have once qualified as immediately deductible R&D. Salesforce (CRM) eliminated 10% of its staff, or 8,000 people, including entire product teams.In public, companies blamed bloat and AI. But inside boardrooms, spreadsheets were telling a quieter story. And MD&A notes — management’s notes on the numbers — buried deep in 10-K filings recorded the change, too. R&D had become more expensive to carry. Headcount, the leading R&D expense across the tech industry, was the easiest thing to cut.AdvertisementIn its 2023 annual report, Meta described salaries as its single biggest R&D expense. Between the first and second years that the Section 174 change began affecting tax returns, Meta cut its total workforce by almost 25%. Over the same period, Microsoft reduced its global headcount by about 7%, with cuts concentrated in product-facing, engineering-heavy roles.Smaller companies without the fortress-like balance sheets of Big Tech have arguably been hit even harder. Twilio (TWLO) slashed 22% of its workforce in 2023 alone. Shopify (SHOP) (headquartered in Canada but with much of its R&D teams in the U.S.) cut almost 30% of staff in 2022 and 2023. Coinbase (COIN) reduced headcount by 36% across a pair of brutal restructuring waves.Since going into effect, the provision has hit at the very heart of America’s economic growth engine: the tech sector.By market cap, tech giants dominate the S&P 500, with the “Magnificent 7” alone accounting for more than a third of the index’s total value. Workforce numbers tell a similar story, with tech employing millions of Americans directly and supporting the employment of tens of millions more. As measured by GDP, capital-T tech contributes about 10% of national output.AdvertisementIt’s not just that tech layoffs were large, it’s that they were massively disproportionate. Across the broader U.S. economy, job cuts hovered around in low single digits across most sectors. But in tech, entire divisions vanished, with a whopping 60% jump in layoffs between 2022 and 2023. Some cuts reflected real inefficiencies — a response to over-hiring during the zero-interest rate boom. At the same time, many of the roles eliminated were in R&D, product, and engineering, precisely the kind of functions that had once benefitted from generous tax treatment under Section 174.Throughout the 2010s, a broad swath of startups, direct-to-consumer brands, and internet-first firms — basically every company you recognize from Instagram or Facebook ads — built their growth models around a kind of engineered break-even.The tax code allowed them to spend aggressively on product and engineering, then write it all off as R&D, keeping their taxable income close to zero by design. It worked because taxable income and actual cash flow were often notGAAP accounting practices. Basically, as long as spending counted as R&D, companies could report losses to investors while owing almost nothing to the IRS.But the Section 174 change broke that model. Once those same expenses had to be spread out, or amortized, over multiple years, the tax shield vanished. Companies that were still burning cash suddenly looked profitable on paper, triggering real tax bills on imaginary gains.AdvertisementThe logic that once fueled a generation of digital-first growth collapsed overnight.So it wasn’t just tech experiencing effects. From 1954 until 2022, the U.S. tax code had encouraged businesses of all stripes to behave like tech companies. From retail to logistics, healthcare to media, if firms built internal tools, customized a software stack, or invested in business intelligence and data-driven product development, they could expense those costs. The write-off incentivized in-house builds and fast growth well outside the capital-T tech sector. This lines up with OECD research showing that immediate deductions foster innovation more than spread-out ones.And American companies ran with that logic. According to government data, U.S. businesses reported about $500 billion in R&D expenditures in 2019 alone, and almost half of that came from industries outside traditional tech. The Bureau of Economic Analysis estimates that this sector, the broader digital economy, accounts for another 10% of GDP.Add that to core tech’s contribution, and the Section 174 shift has likely touched at least 20% of the U.S. economy.AdvertisementThe result? A tax policy aimed at raising short-term revenue effectively hid a time bomb inside the growth engines of thousands of companies. And when it detonated, it kneecapped the incentive for hiring American engineers or investing in American-made tech and digital products.It made building tech companies in America look irrational on a spreadsheet.A bipartisan group of lawmakers is pushing to repeal the Section 174 change, with business groups, CFOs, crypto executives, and venture capitalists lobbying hard for retroactive relief. But the politics are messy. Fixing 174 would mean handing a tax break to the same companies many voters in both parties see as symbols of corporate excess. Any repeal would also come too late for the hundreds of thousands of workers already laid off.And of course, the losses don’t stop at Meta’s or Google’s campus gates. They ripple out. When high-paid tech workers disappear, so do the lunch orders. The house tours. The contract gigs. The spending habits that sustain entire urban economies and thousands of other jobs. Sandwich artists. Rideshare drivers. Realtors. Personal trainers. House cleaners. In tech-heavy cities, the fallout runs deep — and it’s still unfolding.AdvertisementWashington is now poised to pass a second Trump tax bill — one packed with more obscure provisions, more delayed impacts, more quiet redistribution. And it comes as analysts are only just beginning to understand the real-world effects of the last round.The Section 174 change “significantly increased the tax burden on companies investing in innovation, potentially stifling economic growth and reducing the United States’ competitiveness on the global stage,” according to the tax consulting firm KBKG. Whether the U.S. will reverse course — or simply adapt to a new normal — remains to be seen.
    Like
    Love
    Wow
    Sad
    Angry
    368
    0 Commenti 0 condivisioni
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down

    In a chilling sign of how far law enforcement surveillance has encroached on personal liberties, that a sheriff’s office in Texas searched data from more than 83,000 automated license plate readercameras to track down a woman suspected of self-managing an abortion. The officer searched 6,809 different camera networks maintained by surveillance tech company Flock Safety, including states where abortion access is protected by law, such as Washington and Illinois. The search record listed the reason plainly: “had an abortion, search for female.”
    Screenshot of data
    After the U.S. Supreme Court’s 2022 Dobbs v. Jackson Women’s Health Organization decision overturned Roe v. Wade, states were given sweeping authority to ban and even criminalize abortion. In Texas—where the officer who conducted this search is based—abortion is now almost entirely banned. But in Washington and Illinois, where many of the searched Flock cameras are located, abortion remains legal and protected as a fundamental right up to fetal viability.
    The post-Dobbs legal landscape has also opened the door for law enforcement to exploit virtually any form of data—license plates, phone records, geolocation data—to pursue individuals across state lines. has documented more than 1,800 agencies have deployed ALPRs, but at least 4,000 agencies are able to run searches through some agencies in Flock's network. Many agencies share the data freely with other agencies across the country, with little oversight, restriction, or even standards for accessing data. 
    While this particular data point explicitly mentioned an abortion, scores of others in the audit logs released through public records requests simply list "investigation" as the reason for the plate search, with no indication of the alleged offense. That means other searches targeting someone for abortion, or another protected right in that jurisdiction, could be effectively invisible.
    This case underscores our growing concern: that the mass surveillance infrastructure—originally sold as a tool to find stolen cars or missing persons—is now being used to target people seeking reproductive healthcare. This unchecked, warrant-less access that allows law enforcement to surveil across state lines blurs the line between “protection” and persecution.
    From Missing Cars to Monitoring Bodies
    EFF has long warned about the dangers of ALPRs, which scan license plates, log time and location data, and build a detailed picture of people's movements. Companies like Flock Safety and Motorola Solutions offer law enforcement agencies access to nationwide databases of these readers, and in some cases, allow them to stake out locations like abortion clinics, or create “hot lists” of license plates to track in real time. Flock's technology also allows officers to search for a vehicle based on attributes like color, make and model, even without a plate number.
    The threat is compounded by how investigations often begin. A report published by If/When/How on the criminalization of self-managed abortion found that about a quarter of adult caseswere reported to law enforcement by acquaintances entrusted with information, such as “friends, parents, or intimate partners” and another 18% through “other” means. This means that with ALPR tech, a tip from anyone can instantly escalate into a nationwide manhunt. And as Kate Bertash of the Digital Defense Fund explained to 404 Media, anti-abortion activists have long been documenting the plates of patients and providers who visit reproductive health facilities—data that can now be easily cross-referenced with ALPR databases.
    The 404 Media report proves that this isn’t a hypothetical concern. In 2023, a months-long EFF investigation involving hundreds of public records requests uncovered that many California police departments were sharing records containing detailed driving profiles of local residents with out-of-state agencies, despite state laws explicitly prohibiting this. This means that even in so-called “safe” states, your data might end up helping law enforcement in Texas or Idaho prosecute you—or your doctor. 
    That’s why we demanded that 75 California police departments stop sharing ALPR data with anti-abortion states, an effort that has largely been successful.
    Surveillance and Reproductive Freedom Cannot Coexist
    We’ve said it before, and we’ll say it again: Lawmakers who support reproductive rights must recognize that abortion access and mass surveillance are incompatible. 
    The systems built to track stolen cars and issue parking tickets have become tools to enforce the most personal and politically charged laws in the country. What began as a local concern over privacy has escalated into a national civil liberties crisis.
    Yesterday’s license plate readers have morphed into today’s reproductive dragnet. Now, it’s time for decisive action. Our leaders must roll back the dangerous surveillance systems they've enabled. We must enact strong, enforceable state laws to limit data sharing, ensure proper oversight, and dismantle these surveillance pipelines before they become the new normal–or even just eliminate the systems altogether.
    #she #got #abortion #texas #cop
    She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down
    In a chilling sign of how far law enforcement surveillance has encroached on personal liberties, that a sheriff’s office in Texas searched data from more than 83,000 automated license plate readercameras to track down a woman suspected of self-managing an abortion. The officer searched 6,809 different camera networks maintained by surveillance tech company Flock Safety, including states where abortion access is protected by law, such as Washington and Illinois. The search record listed the reason plainly: “had an abortion, search for female.” Screenshot of data After the U.S. Supreme Court’s 2022 Dobbs v. Jackson Women’s Health Organization decision overturned Roe v. Wade, states were given sweeping authority to ban and even criminalize abortion. In Texas—where the officer who conducted this search is based—abortion is now almost entirely banned. But in Washington and Illinois, where many of the searched Flock cameras are located, abortion remains legal and protected as a fundamental right up to fetal viability. The post-Dobbs legal landscape has also opened the door for law enforcement to exploit virtually any form of data—license plates, phone records, geolocation data—to pursue individuals across state lines. has documented more than 1,800 agencies have deployed ALPRs, but at least 4,000 agencies are able to run searches through some agencies in Flock's network. Many agencies share the data freely with other agencies across the country, with little oversight, restriction, or even standards for accessing data.  While this particular data point explicitly mentioned an abortion, scores of others in the audit logs released through public records requests simply list "investigation" as the reason for the plate search, with no indication of the alleged offense. That means other searches targeting someone for abortion, or another protected right in that jurisdiction, could be effectively invisible. This case underscores our growing concern: that the mass surveillance infrastructure—originally sold as a tool to find stolen cars or missing persons—is now being used to target people seeking reproductive healthcare. This unchecked, warrant-less access that allows law enforcement to surveil across state lines blurs the line between “protection” and persecution. From Missing Cars to Monitoring Bodies EFF has long warned about the dangers of ALPRs, which scan license plates, log time and location data, and build a detailed picture of people's movements. Companies like Flock Safety and Motorola Solutions offer law enforcement agencies access to nationwide databases of these readers, and in some cases, allow them to stake out locations like abortion clinics, or create “hot lists” of license plates to track in real time. Flock's technology also allows officers to search for a vehicle based on attributes like color, make and model, even without a plate number. The threat is compounded by how investigations often begin. A report published by If/When/How on the criminalization of self-managed abortion found that about a quarter of adult caseswere reported to law enforcement by acquaintances entrusted with information, such as “friends, parents, or intimate partners” and another 18% through “other” means. This means that with ALPR tech, a tip from anyone can instantly escalate into a nationwide manhunt. And as Kate Bertash of the Digital Defense Fund explained to 404 Media, anti-abortion activists have long been documenting the plates of patients and providers who visit reproductive health facilities—data that can now be easily cross-referenced with ALPR databases. The 404 Media report proves that this isn’t a hypothetical concern. In 2023, a months-long EFF investigation involving hundreds of public records requests uncovered that many California police departments were sharing records containing detailed driving profiles of local residents with out-of-state agencies, despite state laws explicitly prohibiting this. This means that even in so-called “safe” states, your data might end up helping law enforcement in Texas or Idaho prosecute you—or your doctor.  That’s why we demanded that 75 California police departments stop sharing ALPR data with anti-abortion states, an effort that has largely been successful. Surveillance and Reproductive Freedom Cannot Coexist We’ve said it before, and we’ll say it again: Lawmakers who support reproductive rights must recognize that abortion access and mass surveillance are incompatible.  The systems built to track stolen cars and issue parking tickets have become tools to enforce the most personal and politically charged laws in the country. What began as a local concern over privacy has escalated into a national civil liberties crisis. Yesterday’s license plate readers have morphed into today’s reproductive dragnet. Now, it’s time for decisive action. Our leaders must roll back the dangerous surveillance systems they've enabled. We must enact strong, enforceable state laws to limit data sharing, ensure proper oversight, and dismantle these surveillance pipelines before they become the new normal–or even just eliminate the systems altogether. #she #got #abortion #texas #cop
    WWW.EFF.ORG
    She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down
    In a chilling sign of how far law enforcement surveillance has encroached on personal liberties, that a sheriff’s office in Texas searched data from more than 83,000 automated license plate reader (ALPR) cameras to track down a woman suspected of self-managing an abortion. The officer searched 6,809 different camera networks maintained by surveillance tech company Flock Safety, including states where abortion access is protected by law, such as Washington and Illinois. The search record listed the reason plainly: “had an abortion, search for female.” Screenshot of data After the U.S. Supreme Court’s 2022 Dobbs v. Jackson Women’s Health Organization decision overturned Roe v. Wade, states were given sweeping authority to ban and even criminalize abortion. In Texas—where the officer who conducted this search is based—abortion is now almost entirely banned. But in Washington and Illinois, where many of the searched Flock cameras are located, abortion remains legal and protected as a fundamental right up to fetal viability. The post-Dobbs legal landscape has also opened the door for law enforcement to exploit virtually any form of data—license plates, phone records, geolocation data—to pursue individuals across state lines. has documented more than 1,800 agencies have deployed ALPRs, but at least 4,000 agencies are able to run searches through some agencies in Flock's network. Many agencies share the data freely with other agencies across the country, with little oversight, restriction, or even standards for accessing data.  While this particular data point explicitly mentioned an abortion, scores of others in the audit logs released through public records requests simply list "investigation" as the reason for the plate search, with no indication of the alleged offense. That means other searches targeting someone for abortion, or another protected right in that jurisdiction, could be effectively invisible. This case underscores our growing concern: that the mass surveillance infrastructure—originally sold as a tool to find stolen cars or missing persons—is now being used to target people seeking reproductive healthcare. This unchecked, warrant-less access that allows law enforcement to surveil across state lines blurs the line between “protection” and persecution. From Missing Cars to Monitoring Bodies EFF has long warned about the dangers of ALPRs, which scan license plates, log time and location data, and build a detailed picture of people's movements. Companies like Flock Safety and Motorola Solutions offer law enforcement agencies access to nationwide databases of these readers, and in some cases, allow them to stake out locations like abortion clinics, or create “hot lists” of license plates to track in real time. Flock's technology also allows officers to search for a vehicle based on attributes like color, make and model, even without a plate number. The threat is compounded by how investigations often begin. A report published by If/When/How on the criminalization of self-managed abortion found that about a quarter of adult cases (26%) were reported to law enforcement by acquaintances entrusted with information, such as “friends, parents, or intimate partners” and another 18% through “other” means. This means that with ALPR tech, a tip from anyone can instantly escalate into a nationwide manhunt. And as Kate Bertash of the Digital Defense Fund explained to 404 Media, anti-abortion activists have long been documenting the plates of patients and providers who visit reproductive health facilities—data that can now be easily cross-referenced with ALPR databases. The 404 Media report proves that this isn’t a hypothetical concern. In 2023, a months-long EFF investigation involving hundreds of public records requests uncovered that many California police departments were sharing records containing detailed driving profiles of local residents with out-of-state agencies, despite state laws explicitly prohibiting this. This means that even in so-called “safe” states, your data might end up helping law enforcement in Texas or Idaho prosecute you—or your doctor.  That’s why we demanded that 75 California police departments stop sharing ALPR data with anti-abortion states, an effort that has largely been successful. Surveillance and Reproductive Freedom Cannot Coexist We’ve said it before, and we’ll say it again: Lawmakers who support reproductive rights must recognize that abortion access and mass surveillance are incompatible.  The systems built to track stolen cars and issue parking tickets have become tools to enforce the most personal and politically charged laws in the country. What began as a local concern over privacy has escalated into a national civil liberties crisis. Yesterday’s license plate readers have morphed into today’s reproductive dragnet. Now, it’s time for decisive action. Our leaders must roll back the dangerous surveillance systems they've enabled. We must enact strong, enforceable state laws to limit data sharing, ensure proper oversight, and dismantle these surveillance pipelines before they become the new normal–or even just eliminate the systems altogether.
    0 Commenti 0 condivisioni
  • Microsoft takes down malware found on 394,000 Windows PCs

    Published
    June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data, but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work  What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop  More about the Lumma infostealerLumma is a Malware-as-a-Servicethat has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop  6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authenticationwhenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. ​Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #microsoft #takes #down #malware #found
    Microsoft takes down malware found on 394,000 Windows PCs
    Published June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data, but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work  What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop  More about the Lumma infostealerLumma is a Malware-as-a-Servicethat has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop  6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authenticationwhenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. ​Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #microsoft #takes #down #malware #found
    WWW.FOXNEWS.COM
    Microsoft takes down malware found on 394,000 Windows PCs
    Published June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data (more on this later), but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop   (Kurt "CyberGuy" Knutsson)More about the Lumma infostealerLumma is a Malware-as-a-Service (MaaS) that has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop   (Kurt "CyberGuy" Knutsson)6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authentication (2FA) whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. ​Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Commenti 0 condivisioni
  • DOGE left United States Institute of Peace office with water damage, rats, and roaches

    The chief executive of the United States Institute of Peacesays Elon Musk’s Department of Government Efficiency left the nonprofit’s Washington, D.C., headquarters in disarray, full of water damage, rats, and roaches, according to a new sworn statement first reported by Court Watch.
    The statement from the executive, George Moose, comes just a few days after a federal judge ruled that DOGE’s takeover of the nonprofit was illegal. And this week, Musk has claimed he is stepping away from DOGE, although he and President Trump have said he will continue to advise the administration.
    DOGE started its takeover of USIP in mid-March after a standoff that saw the nonprofit call the police on Musk’s government workers. Moose said at the time that DOGE staff had “broken into” the USIP headquarters in Washington, despite the fact that the nonprofit is not part of the executive branch and isn’t subject to the White House’s whims.
    “It was very clear that there was a desire on the part of the administration to dismantle a lot of what we call foreign assistance, and we are part of that family,” Moose said at the time, referencing the Trump administration’s and DOGE’s dismantling of the United States Agency for International Development.
    Moose initially said the nonprofit’s headquarters appeared to be in decent shape at a press conference on May 21, where he discussed the judge’s ruling. But one day later, according to the statement, members of Moose’s staff spent a day surveying the building and documenting the problems they found.
    Moose wrote in his statement that, ahead of the judge’s ruling, the headquarters had been “essentially abandoned for many weeks” before USIP regained control. He said that DOGE had failed to “maintain and secure the building,” including “evidence of rats and roaches.”
    “Vermin were not a problem prior to March 17, 2025, when USIP was actively using and maintaining the building,” Moose wrote.

    Techcrunch event

    now through June 4 for TechCrunch Sessions: AI
    on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5.

    Exhibit at TechCrunch Sessions: AI
    Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last.

    Berkeley, CA
    |
    June 5

    REGISTER NOW

    Staff also reported to Moose that the building’s vehicle barriers were poorly maintained and that they spotted water leaks and “missing ceiling tiles in multiple places in the building.”
    Now Moose said USIP has “engaged a private security firm to guard the building and premises” and “taken over responsibility for the building’s maintenance.”
    #doge #left #united #states #institute
    DOGE left United States Institute of Peace office with water damage, rats, and roaches
    The chief executive of the United States Institute of Peacesays Elon Musk’s Department of Government Efficiency left the nonprofit’s Washington, D.C., headquarters in disarray, full of water damage, rats, and roaches, according to a new sworn statement first reported by Court Watch. The statement from the executive, George Moose, comes just a few days after a federal judge ruled that DOGE’s takeover of the nonprofit was illegal. And this week, Musk has claimed he is stepping away from DOGE, although he and President Trump have said he will continue to advise the administration. DOGE started its takeover of USIP in mid-March after a standoff that saw the nonprofit call the police on Musk’s government workers. Moose said at the time that DOGE staff had “broken into” the USIP headquarters in Washington, despite the fact that the nonprofit is not part of the executive branch and isn’t subject to the White House’s whims. “It was very clear that there was a desire on the part of the administration to dismantle a lot of what we call foreign assistance, and we are part of that family,” Moose said at the time, referencing the Trump administration’s and DOGE’s dismantling of the United States Agency for International Development. Moose initially said the nonprofit’s headquarters appeared to be in decent shape at a press conference on May 21, where he discussed the judge’s ruling. But one day later, according to the statement, members of Moose’s staff spent a day surveying the building and documenting the problems they found. Moose wrote in his statement that, ahead of the judge’s ruling, the headquarters had been “essentially abandoned for many weeks” before USIP regained control. He said that DOGE had failed to “maintain and secure the building,” including “evidence of rats and roaches.” “Vermin were not a problem prior to March 17, 2025, when USIP was actively using and maintaining the building,” Moose wrote. Techcrunch event now through June 4 for TechCrunch Sessions: AI on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW Staff also reported to Moose that the building’s vehicle barriers were poorly maintained and that they spotted water leaks and “missing ceiling tiles in multiple places in the building.” Now Moose said USIP has “engaged a private security firm to guard the building and premises” and “taken over responsibility for the building’s maintenance.” #doge #left #united #states #institute
    TECHCRUNCH.COM
    DOGE left United States Institute of Peace office with water damage, rats, and roaches
    The chief executive of the United States Institute of Peace (USIP) says Elon Musk’s Department of Government Efficiency left the nonprofit’s Washington, D.C., headquarters in disarray, full of water damage, rats, and roaches, according to a new sworn statement first reported by Court Watch. The statement from the executive, George Moose, comes just a few days after a federal judge ruled that DOGE’s takeover of the nonprofit was illegal. And this week, Musk has claimed he is stepping away from DOGE, although he and President Trump have said he will continue to advise the administration. DOGE started its takeover of USIP in mid-March after a standoff that saw the nonprofit call the police on Musk’s government workers. Moose said at the time that DOGE staff had “broken into” the USIP headquarters in Washington, despite the fact that the nonprofit is not part of the executive branch and isn’t subject to the White House’s whims. “It was very clear that there was a desire on the part of the administration to dismantle a lot of what we call foreign assistance, and we are part of that family,” Moose said at the time, referencing the Trump administration’s and DOGE’s dismantling of the United States Agency for International Development. Moose initially said the nonprofit’s headquarters appeared to be in decent shape at a press conference on May 21, where he discussed the judge’s ruling. But one day later, according to the statement, members of Moose’s staff spent a day surveying the building and documenting the problems they found. Moose wrote in his statement that, ahead of the judge’s ruling, the headquarters had been “essentially abandoned for many weeks” before USIP regained control. He said that DOGE had failed to “maintain and secure the building,” including “evidence of rats and roaches.” “Vermin were not a problem prior to March 17, 2025, when USIP was actively using and maintaining the building,” Moose wrote. Techcrunch event Save now through June 4 for TechCrunch Sessions: AI Save $300 on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW Staff also reported to Moose that the building’s vehicle barriers were poorly maintained and that they spotted water leaks and “missing ceiling tiles in multiple places in the building (which I have been told suggest likely water damage).” Now Moose said USIP has “engaged a private security firm to guard the building and premises” and “taken over responsibility for the building’s maintenance.”
    10 Commenti 0 condivisioni
  • U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

    May 31, 2025Ravie LakshmananMalware / Cyber Crime

    A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security software.
    To that effect, the U.S. Department of Justicesaid it seized four domains and their associated server facilitated the crypting service on May 27, 2025, in partnership with Dutch and Finnish authorities. These include AvChecknet, Cryptorbiz, and Cryptguru, all of which now display a seizure notice.
    Other countries that participated in the effort include France, Germany, Denmark, Portugal, and Ukraine.
    "Crypting is the process of using software to make malware difficult for antivirus programs to detect," the DoJ said. "The seized domains offered services to cybercriminals, including counter-antivirustools. When used together, CAV and crypting services allow criminals to obfuscate malware, making it undetectable and enabling unauthorized access to computer systems."

    The DoJ said authorities made undercover purchases to analyze the services and confirmed that they were being used for cybercrime. In a coordinated announcement, Dutch officials characterized AvCheck as one of the largest CAV services used by bad actors around the world.
    According to snapshots captured by the Internet Archive, AvChecknet billed itself as a "high-speed antivirus scantime checker," offering the ability for registered users to scan their files against 26 antivirus engines, as well as domains and IP addresses with 22 antivirus engines and blocklists.
    The domain seizures were conducted as part of Operation Endgame, an ongoing global effort launched in 2024 to dismantle cybercrime. It marks the fourth major action in recent weeks after the disruption of Lumma Stealer, DanaBot, and hundreds of domains and servers used by various malware families to deliver ransomware.
    "Cybercriminals don't just create malware; they perfect it for maximum destruction," said FBI Houston Special Agent in Charge Douglas Williams. "By leveraging counter-antivirus services, malicious actors refine their weapons against the world's toughest security systems to better slip past firewalls, evade forensic analysis, and wreak havoc across victims' systems."
    The development comes as eSentire detailed PureCrypter, a malware-as-a-servicesolution that's being used to distribute information stealers like Lumma and Rhadamanthys using the ClickFix initial access vector.
    Marketed on Hackforumsnet by a threat actor named PureCoder for for three months, for one year, or for lifetime access, the crypter is distributed using an automated Telegram channel, @ThePureBot, which also serves as a marketplace for other offerings, including PureRAT and PureLogs.
    Like other purveyors of such tools, PureCoder requires users to acknowledge a Terms of Serviceagreement that claims the software is meant only for educational purposes and that any violations would result in immediate revocation of their access and serial key.

    The malware also incorporates the ability to patch the NtManageHotPatch API in memory on Windows machines running 24H2 or newer to re-enable process hollowing-based code injection. The findings demonstrate how threat actors quickly adapt and devise ways to defeat new security mechanisms.
    "The malware employs multiple evasion techniques including AMSI bypass, DLL unhooking, anti-VM detection, anti-debugging measures, and recently added capabilities to bypass Windows 11 24H2 security features through NtManageHotPatch API patching," the Canadian cybersecurity company said.
    "The developers use deceptive marketing tactics by promoting 'Fully UnDetected'status based on AvChecknet results, while VirusTotal shows detection by multiple AV/EDR solutions, revealing significant discrepancies in detection rates."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #doj #seizes #domains #supporting #cybercrime
    U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
    May 31, 2025Ravie LakshmananMalware / Cyber Crime A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security software. To that effect, the U.S. Department of Justicesaid it seized four domains and their associated server facilitated the crypting service on May 27, 2025, in partnership with Dutch and Finnish authorities. These include AvChecknet, Cryptorbiz, and Cryptguru, all of which now display a seizure notice. Other countries that participated in the effort include France, Germany, Denmark, Portugal, and Ukraine. "Crypting is the process of using software to make malware difficult for antivirus programs to detect," the DoJ said. "The seized domains offered services to cybercriminals, including counter-antivirustools. When used together, CAV and crypting services allow criminals to obfuscate malware, making it undetectable and enabling unauthorized access to computer systems." The DoJ said authorities made undercover purchases to analyze the services and confirmed that they were being used for cybercrime. In a coordinated announcement, Dutch officials characterized AvCheck as one of the largest CAV services used by bad actors around the world. According to snapshots captured by the Internet Archive, AvChecknet billed itself as a "high-speed antivirus scantime checker," offering the ability for registered users to scan their files against 26 antivirus engines, as well as domains and IP addresses with 22 antivirus engines and blocklists. The domain seizures were conducted as part of Operation Endgame, an ongoing global effort launched in 2024 to dismantle cybercrime. It marks the fourth major action in recent weeks after the disruption of Lumma Stealer, DanaBot, and hundreds of domains and servers used by various malware families to deliver ransomware. "Cybercriminals don't just create malware; they perfect it for maximum destruction," said FBI Houston Special Agent in Charge Douglas Williams. "By leveraging counter-antivirus services, malicious actors refine their weapons against the world's toughest security systems to better slip past firewalls, evade forensic analysis, and wreak havoc across victims' systems." The development comes as eSentire detailed PureCrypter, a malware-as-a-servicesolution that's being used to distribute information stealers like Lumma and Rhadamanthys using the ClickFix initial access vector. Marketed on Hackforumsnet by a threat actor named PureCoder for for three months, for one year, or for lifetime access, the crypter is distributed using an automated Telegram channel, @ThePureBot, which also serves as a marketplace for other offerings, including PureRAT and PureLogs. Like other purveyors of such tools, PureCoder requires users to acknowledge a Terms of Serviceagreement that claims the software is meant only for educational purposes and that any violations would result in immediate revocation of their access and serial key. The malware also incorporates the ability to patch the NtManageHotPatch API in memory on Windows machines running 24H2 or newer to re-enable process hollowing-based code injection. The findings demonstrate how threat actors quickly adapt and devise ways to defeat new security mechanisms. "The malware employs multiple evasion techniques including AMSI bypass, DLL unhooking, anti-VM detection, anti-debugging measures, and recently added capabilities to bypass Windows 11 24H2 security features through NtManageHotPatch API patching," the Canadian cybersecurity company said. "The developers use deceptive marketing tactics by promoting 'Fully UnDetected'status based on AvChecknet results, while VirusTotal shows detection by multiple AV/EDR solutions, revealing significant discrepancies in detection rates." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #doj #seizes #domains #supporting #cybercrime
    THEHACKERNEWS.COM
    U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
    May 31, 2025Ravie LakshmananMalware / Cyber Crime A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security software. To that effect, the U.S. Department of Justice (DoJ) said it seized four domains and their associated server facilitated the crypting service on May 27, 2025, in partnership with Dutch and Finnish authorities. These include AvCheck[.]net, Cryptor[.]biz, and Crypt[.]guru, all of which now display a seizure notice. Other countries that participated in the effort include France, Germany, Denmark, Portugal, and Ukraine. "Crypting is the process of using software to make malware difficult for antivirus programs to detect," the DoJ said. "The seized domains offered services to cybercriminals, including counter-antivirus (CAV) tools. When used together, CAV and crypting services allow criminals to obfuscate malware, making it undetectable and enabling unauthorized access to computer systems." The DoJ said authorities made undercover purchases to analyze the services and confirmed that they were being used for cybercrime. In a coordinated announcement, Dutch officials characterized AvCheck as one of the largest CAV services used by bad actors around the world. According to snapshots captured by the Internet Archive, AvCheck[.]net billed itself as a "high-speed antivirus scantime checker," offering the ability for registered users to scan their files against 26 antivirus engines, as well as domains and IP addresses with 22 antivirus engines and blocklists. The domain seizures were conducted as part of Operation Endgame, an ongoing global effort launched in 2024 to dismantle cybercrime. It marks the fourth major action in recent weeks after the disruption of Lumma Stealer, DanaBot, and hundreds of domains and servers used by various malware families to deliver ransomware. "Cybercriminals don't just create malware; they perfect it for maximum destruction," said FBI Houston Special Agent in Charge Douglas Williams. "By leveraging counter-antivirus services, malicious actors refine their weapons against the world's toughest security systems to better slip past firewalls, evade forensic analysis, and wreak havoc across victims' systems." The development comes as eSentire detailed PureCrypter, a malware-as-a-service (MaaS) solution that's being used to distribute information stealers like Lumma and Rhadamanthys using the ClickFix initial access vector. Marketed on Hackforums[.]net by a threat actor named PureCoder for $159 for three months, $399 for one year, or $799 for lifetime access, the crypter is distributed using an automated Telegram channel, @ThePureBot, which also serves as a marketplace for other offerings, including PureRAT and PureLogs. Like other purveyors of such tools, PureCoder requires users to acknowledge a Terms of Service (ToS) agreement that claims the software is meant only for educational purposes and that any violations would result in immediate revocation of their access and serial key. The malware also incorporates the ability to patch the NtManageHotPatch API in memory on Windows machines running 24H2 or newer to re-enable process hollowing-based code injection. The findings demonstrate how threat actors quickly adapt and devise ways to defeat new security mechanisms. "The malware employs multiple evasion techniques including AMSI bypass, DLL unhooking, anti-VM detection, anti-debugging measures, and recently added capabilities to bypass Windows 11 24H2 security features through NtManageHotPatch API patching," the Canadian cybersecurity company said. "The developers use deceptive marketing tactics by promoting 'Fully UnDetected' (FUD) status based on AvCheck[.]net results, while VirusTotal shows detection by multiple AV/EDR solutions, revealing significant discrepancies in detection rates." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    0 Commenti 0 condivisioni