Active Nitrogen campaign delivered via malicious ads for PuTTY, FileZilla

0
[ad_1]

In the past couple of weeks, we have observed an ongoing campaign targeting system administrators with fraudulent ads for popular system utilities. The malicious ads are displayed as sponsored results on Google’s search engine page and localized to North America.

Victims are tricked into downloading and running the Nitrogen malware masquerading as a PuTTY or FileZilla installer. Nitrogen is used by threat actors to gain initial access to private networks, followed by data theft and the deployment of ransomware such as BlackCat/ALPHV.

We have reported this campaign to Google but no action has been taken yet. This blog post aims to share the tactics, techniques and procedures (TTPs) as well as indicators of compromise (IOCs) so defenders can take action.

Step 1: Luring victims in via malicious ads

The initial intrusion starts from a malicious ad displayed via Google search. We have observed several different advertiser accounts which were all reported to Google. The lures are utilities commonly used by IT admins such as PuTTY and FileZilla.

Online ads from search engine result pages are increasingly being used to deliver malware to corporate users. ThreatDown users that have DNS Filtering can enable ad blocking in their console to prevent such malvertising attacks:

Step 2: Directing users to lookalike sites

The malvertising infrastructure deployed by Nitrogen threat actors uses a cloaking page that can either redirect to a decoy site or the infamous Rick Astley video. The redirect to a decoy page can be activated if the campaign is not weaponized yet or if the malicious server detects invalid traffic (bot, crawler, etc.).

The Rick Astley redirect is mostly to mock security researchers investigating this campaign:

Actual lookalike pages are meant for potential victims. They are often good-looking copycats which could easily fool just about anyone:

ThreatDown blocks these malicious websites to prevent your users from being social-engineered into downloading malware:

Step 3: Deploying malware via a fraudulent installer

The final step in this malvertising chain consists of downloading and running the malware payload. Nitrogen uses a technique known as DLL sideloading whereby a legitimate and signed executable launches a DLL. In this case, setup.exe (from the Python Software Foundation) sideloads python311.dll (Nitrogen).

ThreatDown via its EDR engine quarantines the malicious DLL immediately. System administrators can log into their console and use the AI-assisted engine to quickly search and review the detection:

Recommendations

While there are many phishing training simulations for email threats, we aren’t aware of similar trainings for malvertising. Yet, the threat has become prevalent enough to warrant better user education.

Endpoints can be protected from malicious ads via group policies that restrict traffic coming from the main and lesser known ad networks. Click here for more information about DNS filtering via our Nebula platform.

Endpoint Detection and Response (EDR) is a cornerstone in your security posture, complemented by Managed Detection and Response (MDR) where analysts can quickly alert you of an impending intrusion.

Indicators of Compromise

Cloaking domains:

kunalicon[.]com
inzerille[.]com
recovernj[.]com

Lookalike sites:

file-zilla-projectt[.]org
puuty[.]org
pputy[.]com
puttyy[.]ca

Nitrogen payloads (URLs):

amplex-amplification[.]com/wp-includes/FileZilla_3.66.1_win64.zip
newarticles23[.]com/wp-includes/putty-64bit-0.80-installer.zip
support[.]hosting-hero[.]com/wp-includes/putty-64bit-0.80-installer.zip
mkt.geostrategy-ec[.]com/installer.zip

Nitrogen payloads (SHA256):

ecde4ca1588223d08b4fc314d6cf4bce82989f6f6a079e3eefe8533222da6281
2037ec95c91731f387d3c0c908db95184c93c3b8412b6b3ca3219f9f8ff60945
033a286218baca97da19810446f9ebbaf33be6549a5c260889d359e2062778cf

Nitrogen C2s:

94.156.65[.]98
94.156.65[.]115

[ad_2]
Source link

LG is selling its mobile patents to Oppo

0
[ad_1]

LG decided to end its smartphone production a few years ago due to intense competition. However, the company has found a way to continue generating revenue from its past efforts – patent licensing deals.

In 2022, LG signed an agreement with Apple to license part of its mobile patent portfolio. This provided ongoing revenue even after the company exited handset manufacturing. More recently, LG sold 48 patents to Chinese technology manufacturer Oppo in another deal.

LG sells its mobile patent portfolio to Oppo

According to The Elec, LG’s sale of 48 patents to Oppo included technologies essential to modern mobile devices. Specifically, 34 of the patents are related to codecs – the software needed to compress digital video and audio into popular formats such as MP4 and AAC. The remaining 14 patents in this category are still pending with the USPTO.

LG retained a large portfolio of over 24,000 patents spanning technologies like 4G, 5G, Wi-Fi, and other core smartphone capabilities. Since the company now relies heavily on Samsung and Apple for component supply, directly challenging their patents was not a viable option. This made Oppo an attractive partner. Meanwhile, Oppo is expanding globally and it wants to strengthen its own patent portfolio.

The financial terms of the deal between Oppo and LG were not disclosed. However, it is believed that the Chinese company paid a premium for the LG patents, recognizing their strategic importance. The deal provides both immediate funds for LG during its transition away from phones. For Oppo, it strengthens its capabilities in streaming technologies.

LG Mobile suffered an operating loss from 2015 until its closure

LG Mobile just could not generate a profit during its last six years of operation. The company tried to change that for a long time, but it did not succeed in the attempt. It released quite a few interesting smartphones over the years, like the LG Wing, for example.

The company was also planning to release another futuristic phone soon, its rollable smartphone. That phone will never see the light of day, though, it seems, which is quite unfortunate.


[ad_2]
Source link

Google Vids helps you make videos using AI

0
[ad_1]

Google Workspace is a productivity suite for business-focused individuals. As such, streamlining productivity is a very important aspect. Google has a new tool that will help users communicate with their colleagues more efficiently. Google Vids is a platform to quickly create videos using AI technology.

No, this is not Google’s answer to OpenAI’s Sora. It’s not quite as generative, and it’s for completely different purposes. We’re pretty sure that Google is going to unveil its own video generation platform to take on Sora at some point. The company has not stated so, but knowing Google, it is inevitable.

Google Vids will help you create videos using AI

Nowadays, we hear a ton of scary stories about AI technology and how it could possibly have a negative effect on humanity. However, there are also simple tools that people can use to save a few minutes of their day. Google Vids is one of them. This is a platform that allows people to quickly create videos that they can share with their colleagues. Being business-focused, it’s not meant to create a trending video or generate footage from scratch.

Vids can be thought of as a tool to help you better communicate with your colleagues instead of a slide presentation or an email. Businesses rely on communication between workers. Sometimes, executives have to distribute long messages amongst the workers.

This could either be in the form of long emails keeping workers in the loop, lengthy presentations explaining changes to the company, multi-page documents explaining company policy, Etc. Crafting and sending these messages can be very time-consuming, and not many people want to spend time doing that when they could be doing other important tasks. So, this is where Google Vids comes in.

This is a platform where you can quickly produce videos. You will be able to use videos from sources including Google Drive, and put them on a timeline. You will be able to add voiceovers and other assets to properly get your point across.

If you don’t have all of the assets you need, you shouldn’t have to worry. Google has a library of stock video and audio that you can use in your Vids. So, with very basic video editing skills, you’re able to put together a great video presentation for your colleagues.

Where does AI fit into this?

This is a Google product, so you should expect the typical AI shenanigans. Right off the bat, Google will let you use Gemini to help augment your video. If you don’t feel like editing your video, Gemini can provide assistance. It has the ability to make storyboards, generate AI voiceovers, and even create the first draft of the video for you. You will have powerful generative AI tools at your disposal, so there’s a high chance that each Vid you make will be high quality.

When you’re finished with your video, you have the ability to export it as an mp4 file and share it with your colleagues. So, this is not Google’s powerful generative AI video generator. It is a helpful business tool to help Google Workspace users better communicate with their colleagues.


[ad_2]
Source link

Beeper app comes out of beta as it gets acquired by WordPress’ Automattic

0
[ad_1]

Automattic, the company behind WordPress and Texts.com, has acquired Beeper, the startup that offers a unified chat experience across various messaging services. This acquisition was completed for a reported $126 million, prompting a merger between the two existing messaging apps.
Even though Beeper has been in the news quite a bit lately, mostly because of its highly publicized dispute with Apple over iMessage integration on the platform, the app has been technically in beta status. This ends today as Beeper has announced in its blog along with the acquisition announcement. Beeper is now available to everyone without a waitlist and continues to put a lot of emphasis on user privacy and data control, which fits in well with Automattic’s focus on free open-source software.

Beeper will continue to run on its own under Automattic’s “Other Bets” section after the purchase. This means that everyone will still be able to use the Beeper app, and the company will still protect customer privacy. The business plan of giving away a free app with paid premium features is also likely to stay the same.
Eric Migicovsky, Beeper’s founder, is hyped on the potential of merging Beeper’s tech with the desktop-centric strengths of Texts.com. Looks like they’re taking the “best of both worlds” approach here. He also gave a shoutout to Texts.com founder Kishan Bagaria, mentioning a long history of collaboration between them. That said, Migicovsky will be replacing Bagaria as “Head of Messaging” in the newly merged version of Beeper — since the Beeper branding will prevail — leaving some uncertainty as to what Bagaria’s new role will be. 

Both Beeper and Texts.com users have nothing to fear so far. Migicovsky assures that nothing will change for either product today, except for Beeper’s apps coming out of beta. Additionally, Beeper’s privacy policy and ToS will remain the same for now.

As both teams merge, we shall see how they work towards building “the best chat app on earth,” as Migicovsky has so often said. The potential for an open-source messaging platform is certainly intriguing, and it looks like Beeper is one step closer to achieving that goal.


[ad_2]
Source link

The Essential Tools and Plugins for WordPress Development

0
[ad_1]
The Essential Tools and Plugins for WordPress Development

WordPress, a widely used content management system, owes a great deal of its flexibility to plugins. These small software components effortlessly improve the functionality of your website. Having the right resources and tools is crucial for developers venturing into WordPress development services. Let’s explore the essential elements that can facilitate and enhance your journey in this field.

Essential Tools for WordPress Development

WordPress powers millions of websites worldwide (472 million), from personal blogs to enterprise-level e-commerce platforms. Developers face challenges in such a diverse ecosystem, from writing clean and efficient code to ensuring seamless website deployment and maintenance. The right tools act as enablers, empowering developers to navigate these challenges easily and precisely.

Code Editors

Choosing a suitable code editor is akin to selecting the right brush for an artist. Versatile editors like Visual Studio Code or Sublime Text provide many features such as syntax highlighting, auto-completion, and Git integration. These features enhance productivity and foster a conducive environment for writing clean, maintainable code.

Local Development Environments

Developing and testing WordPress websites on a live server can be risky and inefficient. Local development environments, facilitated by tools like XAMPP, MAMP, or Docker, provide a safe and controlled environment for experimentation and iteration. Developers can test new features, plugins, and themes without fearing disrupting the live website, ensuring a seamless user experience upon deployment.

Version Control Systems

Version control systems like Git are the backbone of efficient teamwork in a collaborative development environment. Paired with platforms like GitHub or Bitbucket, these systems enable developers to manage code changes seamlessly, collaborate with team members in real time, and maintain a comprehensive project history. This fosters a cohesive and organized development environment, ensuring everyone is on the same page throughout the development lifecycle.

Debugging Tools

No code is perfect, and debugging is inevitable in the development process. Specialized debugging tools like Query Monitor or Debug Bar provide developers with invaluable insights into the inner workings of their WordPress projects. These tools are indispensable for maintaining a robust and efficient website, from identifying and troubleshooting issues to monitoring performance and optimizing the codebase.

Must-Have Plugins for WordPress Development

WordPress’s flexibility and extensibility are key factors contributing to its popularity among developers worldwide. However, the sheer volume of available plugins can be overwhelming, making it essential for developers to discern and integrate the most suitable ones into their projects. Here’s why selecting the right plugins is imperative for effective WordPress development:

SEO Plugins

Optimizing websites for search engines is essential for driving organic traffic and enhancing visibility. SEO plugins like Yoast SEO or Rank Math provide developers with robust tools to optimize their WordPress sites effectively. Features such as XML sitemap generation, meta tag optimization, and comprehensive content analysis empower developers to bolster their site’s visibility and relevance in search engine results, increasing organic traffic and user engagement.

Performance Optimization Plugins

User experience is paramount in retaining visitors and fostering engagement on WordPress websites. Performance optimization plugins such as WP Rocket or W3 Total Cache offer many optimization features to improve site speed and performance. From caching mechanisms to asset minification and lazy loading, these plugins ensure a snappier and more responsive user experience, leading to higher user satisfaction and retention.

Security Plugins

Protecting WordPress websites against security threats is a top priority for developers. Security plugins like Wordfence or Sucuri Security fortify the site’s defences with features such as firewall protection, malware scanning, and enhanced login security. By implementing these plugins, developers can ensure peace of mind against potential threats and vulnerabilities, safeguarding their websites and user data from malicious attacks.

Development & Debugging Plugins

Efficient development workflows are essential for maintaining productivity and delivering high-quality WordPress projects. Development and debugging plugins such as Query Monitor or Debug Bar streamline debugging and optimization by providing critical insights into database queries, PHP errors, and HTTP requests. By leveraging these plugins, developers can identify and address issues swiftly, ensuring the seamless operation of WordPress projects and minimizing development time.

Elevate Your WordPress Development Experience

Integrating these indispensable tools and plugins into your WordPress development arsenal empowers you to transcend boundaries, streamline processes, and unlock the full potential of your projects. By staying abreast of the latest advancements in the WordPress ecosystem, you can continually refine and optimize your development practices, fostering innovation and excellence in your endeavours.

  1. What To Look For In The Best WordPress Hosting
  2. What is WooCommerce, and Why You Should Care
  3. Kotlin app development company – How to choose
  4. Tips for Using Uploader Widgets on WordPress Blogs
  5. MySQL Performance Tuning: 5 Tips for Blazing Fast Queries

[ad_2]
Source link

Google partnered with Bayer to develop AI tools for radiologists

0
[ad_1]

AI technology has already proven to be useful in several fields. One field is the medical field. According to a new report, Google partnered with German company Bayer to provide AI tools for radiologists.

Right now, we’re still learning just how far AI technology can go in the future. Recently, in an interview with the Guardian, billionaire Elon Musk predicted that superhuman AI will exist next year. With how rapidly AI technology has been developing, that may not be a far-off prediction.

Google partnered with Bayer to provide AI tools for radiologists

Google is not shy about sharing its AI tools with the world. We recently got the news that Gemini will power Apple’s AI technology. Well, according to a new report, the search giant has partnered with Bayer to provide accessible AI tools that will aid radiologists. More specifically, Google Cloud is going to help develop an AI platform that will help radiologists diagnose conditions and research patients’ medical history.

Since this is Google’s AI technology we’re talking about, we expect it to be very powerful. When it comes to the field of radiology, scanning and diagnosing patients is a long and tedious process. Also, looking up patients’ medical histories can take upwards of 20 minutes.

This AI platform will be able to help radiologists in those respects. We don’t know exactly what this platform will be called or what it will do. So, there’s not much to say about its capabilities. In any case, this could be great for radiologists who have been overworked.

Many radiologists complain of burnout, and there are tons of jobs in the field that remain vacant. According to job postings on the Association of American Medical College’s job site, there are nearly 2,000 vacant jobs. That’s just on the association’s Radiology website. That’s nearly 10 times as many vacant positions than there were 10 years ago. So, the existing radiologists have a major workload to work through.

It’s just a tool

As always, Google does not plan to make the AI tool a replacement for human radiologists. At the end of the day, AI is still not perfect. Also, when we’re talking about medical stuff, accuracy is extremely important. So, the companies are going to take care to make this platform a tool and not a replacement for human radiologists.


[ad_2]
Source link

How to Use Cyber Threat Intelligence ? 4 TI Categories

0
[ad_1]

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) used by attackers, along with their goals and capabilities. 

The ultimate goal of CTI is to proactively understand an organization’s attack surface and identify vulnerabilities that need patching while collecting data is just the first step; effective CTI requires processing and analyzing the data to make informed security decisions. 

Link isolated IOCs to known threats with ANY.RUN TI Lookup 

Threat intelligence Lookup can be categorized into four categories to provide a comprehensive picture of cyber threats. Strategic intelligence focuses on the big picture, analyzing threat actors’ trends, motivations, and capabilities. 

It helps answer questions like “who can attack us and why?”. Operational intelligence dives deeper, examining the Tactics, Techniques, and Procedures (TTPs) used in attacks. 

Equips security teams to actively detect and respond to threats with tools like Threat Intelligence Platforms and sandboxes. 

To proactively defend against cyberattacks, security teams use technical threat intelligence (TTI) that identifies specific indicators of compromise (IOCs) like IP addresses, file hashes, and malicious domains. 

Intel informs the configuration of security and monitoring systems to block or detect ongoing attacks. Tactical threat intelligence, on the other hand, provides immediate, actionable information for ongoing incidents. 

It includes details on exploited vulnerabilities within the infrastructure or specific malware families involved in the attack, allowing security teams to respond swiftly with tools like incident response playbooks and vulnerability remediation guides. 

Document

Integrate ANY.RUN in Your Company for Effective Malware Analysis

Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

  • Real-time Detection
  • Interactive Malware Analysis
  • Easy to Learn by New Security Team members
  • Get detailed reports with maximum data
  • Set Up Virtual Machine in Linux & all Windows OS Versions
  • Interact with Malware Safely

If you want to test all these features now with completely free access to the sandbox:

Threat Intelligence Lifecycle:

The Threat Intelligence Lifecycle is a continuous, 6-step process for proactive cybersecurity that begins with planning to identify critical assets and define intelligence needs where diverse data from open sources, human intelligence, and internal logs is collected. 

The data is then processed for analysis, which involves techniques like data mining to identify patterns and potential threats. Derived insights are disseminated to security teams, executives, and partners as reports and alerts. 

Document
Are you from SOC and DFIR Teams?

Sign up and start using the interactive malware sandbox for free. .

Stakeholder feedback is used to refine intelligence requirements and improve overall security posture, ensuring organizations stay ahead of evolving threats. 

Text report example in ANY.RUN 

To maintain relevant threat intelligence, run a full lifecycle analysis every 1-3 months, review intelligence needs quarterly and prioritize distributing critical threats immediately. 

Using automated systems like threat intelligence feeds for continuous data collection and processing ensures analysts have access to the latest information for early incident detection, which keeps threat intelligence sharp.  

ANY.RUN malware sandbox gives immediate access to valuable threat data 

Analysts can use interactive sandboxes to analyze the threat in a controlled environment when encountering an unidentified malicious executable with suspicious network activity. Platforms like ANY.RUN mimic real systems and allow researchers to upload the sample for execution. 

The sandbox monitors the malware’s interactions with the network, hard drive, and memory, providing real-time data on its behavior and potential impact, which facilitates rapid threat identification and informed response strategies.

MITRE ATT&CK reports in ANY.RUN 

Security products often offer built-in reporting features to expedite threat intelligence distribution. For instance, ANY.RUN allows for generating MITRE ATT&CK reports that map malicious actions to techniques and link to mitigation details. 

Customizable text reports with selective information can be created and shared securely via links, streamlining threat intelligence dissemination amongst stakeholders. 

Exploring the Four Types of Threat Intelligence

Threat intelligence can be divided into four distinct types, each offering unique insights and analysis scopes:

  1. Strategic
  2. Operational
  3. Technical
  4. Tactical

Here’s a closer look at each category:

  • Strategic Threat Intelligence provides a broad overview of the cyber threat landscape, focusing on threat actors’ trends, motivations, and capabilities. It aims to answer questions such as “Who might target us and for what reasons?”
  • Tools for Strategic Threat Intelligence:
  1. Threat landscape reports
  2. Geopolitical threat analysis
  3. Profiles of Advanced Persistent Threats (APTs)
  • Operational Threat Intelligence delves into the Tactics, Techniques, and Procedures (TTPs) employed by adversaries. This intelligence is crucial for security teams to effectively detect and counteract threats.
  • Tools for Operational Threat Intelligence:
  1. Threat Intelligence Platforms (e.g., OpenCTI)
  2. Lookup portals for threat intelligence
  3. Interactive malware sandboxes (e.g., ANY.RUN)
  • Technical Threat Intelligence zeroes in on specific Indicators of Compromise (IoCs) such as IP addresses, domain names, and file hashes. This information is vital for configuring security measures and monitoring systems to thwart or identify and halt attacks.
  • Tools for Technical Threat Intelligence:
  1. Threat intelligence feeds (e.g., ANY.RUN Feeds)
  2. Tools for analyzing network traffic
  3. Solutions for deobfuscation and reverse engineering
  • Tactical Threat Intelligence provides immediate, actionable information needed to respond to current threats. It covers details like exploited vulnerabilities within your infrastructure or specific malware families implicated in active attacks.
  • Tools for Tactical Threat Intelligence:
  1. Incident response playbooks
  2. Malware analysis reports
  3. Guides for patching vulnerabilities

Each type of threat intelligence plays a critical role in a comprehensive cybersecurity strategy, offering different layers of insight to protect against and respond to cyber threats effectively.

What is ANY.RUN?

ANY.RUN is a cloud-based malware lab that does most of the work for security teams. 400,000 professionals use ANY.RUN platform every day to look into events and speed up threat research on Linux and Windows cloud VMs.

Advantages of ANY.RUN 

  • Real-time Detection: ANY.RUN can find malware and instantly identify many malware families using YARA and Suricata rules within about 40 seconds of posting a file.
  • Interactive Malware Analysis: ANY.RUN differs from many automated options because it lets you connect with the virtual machine from your browser. This live feature helps stop zero-day vulnerabilities and advanced malware that can get past signature-based protection.
  • Value for money: ANY.RUN’s cloud-based nature makes it a cost-effective option for businesses since your DevOps team doesn’t have to do any setup or support work.
  • Best for onboarding new security team members: ANY. RUN’s easy-to-use interface allows even new SOC researchers to quickly learn to examine malware and identify signs of compromise (IOCs).

If Are you from SOC and DFIR Teams, Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.


[ad_2]
Source link

0G Launches Newton Testnet of Ultra-Scalable Modular AI Blockchain

0
[ad_1]
0G Launches Newton Testnet of Ultra-Scalable Modular AI Blockchain

0G Labs is pleased to unveil the launch of the testnet for 0G, the modular ultra-high data throughput blockchain optimized for on-chain AI. The network is now available for node operators, developers and the community to join and provide feedback for an upcoming mainnet launch in Q3 2024.

0G, or ZeroGravity, is a modular blockchain that aims to alleviate the major pain points of using blockchain for AI, where data and execution requirements outweigh the current market offering by several orders of magnitude. The modular architecture enables 0G to offer a lean and performant network, unencumbered by legacy consensus algorithms, unrelated use cases sharing the same block space, as well as on-demand scaling.

Demand for on-chain AI is growing due to its promise of offering reliable and credibly neutral training and execution of neural networks. According to a report by KPMG, the vast majority of global corporate executives see AI as one of the fundamental technology breakthroughs that will impact their business shortly. However, adoption risks abound — including potential intellectual property issues, personal data sharing, lack of regulatory frameworks and biases in generative AI models.

Via immutable and verifiable storage and execution environments, blockchains offer a promising solution to address the many challenges of AI. By making AI workflow decentralized, it democratizes the technology and makes it accessible to more people and organizations.

By distributing data across multiple nodes rather than centralizing it in a single location, decentralized AI can help protect sensitive information from hacks and breaches. It also enables fair distribution of rewards to the contributors in the entire workflow, e.g., to data, model, and computation power providers, respectively.

The distributed ledger and cryptographic technologies can further give more transparent ways to track the AI-generated data to help people distinguish between the authentic original data and deepfakes. In addition, blockchains can help achieve a balanced approach to manual interventions in the models’ results, which sometimes can miss the mark.

Existing infrastructure solutions are still insufficient for massive on-chain AI adoption, which is why 0G is building the next-generation blockchain infrastructure for AI. With benchmarks of over 50 Gbps data throughput, compared to existing rates of 1.5 Mbps on Ethereum-based scaling solutions, 0G offers an incredible improvement in its baseline form, while the modular architecture promises potentially infinite scalability down the line.

“The public launch of our testnet marks the first stage of bringing AI on-chain, which will combine two of the most exciting technologies that emerged in the past decade,” said Michael Heinrich, CEO of 0G Labs. “Our team has worked diligently over the past months to deliver our vision of the ultra-scalable modular blockchain, and we’re excited to see the feedback from the community of users and developers.”

The 0G testnet launch comes shortly after 0G Labs closed its $35M pre-seed round, which was originally intended to collect $5M to bring an MVP of the idea to market. The round, led by Hack VC, saw participation from many influential investors primarily in the Web3 space, including Bankless, Polygon, Delphi Digital, TRGC, Dao5, Symbolic, BlockChain Builders Fund, Dispersion, Daedalus, Gumi Cryptos and many more venture funds and angel investors.

About 0G

0G, or ZeroGravity, is a leading Web3 infrastructure provider that is building the leading modular AI blockchain creating solutions to implement on-chain AI applications in the Web3 ecosystem. The platform achieves high data availability through its unique architecture separating data storage and data publishing. 

By ensuring throughputs of 50 GB/second, a full 50,000x faster than competitors, and a cost that is 100x lower, 0G has positioned itself as a leader in bringing high data use cases, such as scalable L2s and modular AI, into the Web3 ecosystem.

  1. Owning Versus Renting – The Circumstances of Web3 Domains
  2. 5 Best Crypto Marketing Agencies for Web3 Security Brands in 2024
  3. Blockchain Networks Using API Security Data to Mitigate Web3 Threats

[ad_2]
Source link

Qualcomm is set to unveil its new mid-range SOCs

0
[ad_1]

Qualcomm continues to develop new chipsets. The company recently introduced the Snapdragon 8S Gen 3, which attracted a lot of attention. Now, according to the information we have, it is preparing to launch new chipsets codenamed “Volcano” and “Pitti” for use in smartphones.

The company seems to be aiming to expand its user base with these new chipsets. What will it offer compared to previous-generation SOCs? We will cover everything in detail in this article. If you’re ready, let’s get started!

Qualcomm’s new processors

Qualcomm is working on 3 different SOCs with model numbers SM4635, SM6650 and SM7635. Among these SOCs, SM4635 has the codename “pitti” and we already learned 3 months ago that it is a Snapdragon 4 Gen 3. We reveal through our internal sources that the successor to the Snapdragon 7S Gen 2, the SM7635 SOC, is under development. This SOC has the codename “volcano“. Unfortunately, there is no information about its technical specifications. It is expected to offer significant performance improvements compared to the 7S Gen 2.

We expect the SM7635 processor to offer lower performance compared to the Snapdragon 7+ Gen 3. The reason behind this prediction is to enable Qualcomm to increase competition in affordable mid-range devices. Qualcomm may be aiming to attract a wider user base by reaching a more competitive price point with this new processor. However, we are not in a position to comment on processor performance with the information we have now. Therefore, we need to wait for Qualcomm’s official announcement to evaluate the performance of the processor.

Qualcomm is also developing SM6650, the next version of the Snapdragon 6 Gen 1. The SM6650 will be similar to the SM7635. Both SOCs are identified by the codename “volcano”. This confirms that it will have the same similarity as Snapdragon 6 Gen 1 and Snapdragon 7S Gen 2. The 6 Gen 1 and 7S Gen 2 had the codename “parrot“. We will check what improvements the company’s new SOCs will bring compared to their predecessors in the smartphones that will be released.

Brands like Xiaomi, Oppo, Vivo, and Realme are probably already testing the new SOCs. Xiaomi’s Redmi Note 14 series could use one of these SOCs. Redmi Note 13 Pro 5G used the 7S Gen 2. Maybe the Redmi Note 14 Pro 5G could have the SM7635. This is an estimation and not official information, you have to remember that.

Snapdragon 7S Gen 2 is a Samsung-manufactured SOC. That’s why many users don’t like the 7S Gen 2. We hope the SM7635 will be a processor manufactured by TSMC. When there is more information, we will keep you informed. Stay tuned.


[ad_2]
Source link