1. The global outage caused by CrowdStrike's software update led to a significant drop in CRWD's share price, presenting a great buying opportunity. 2. The author has a background in corporate finance and focuses on long-duration growth opportunities. 3. The author believes that CrowdStrike's attractive valuation and potential for growth after the outage make it a compelling investment.
Recent #cybersecurity news in the semiconductor industry
➀ Researchers from Queen Mary University of London have developed new nanocomposite films from starch, offering a sustainable alternative to petroleum-based materials; ➁ The films are made from abundant natural polymer starch and highly conductive MXene, with potential applications in electronics and sensing; ➂ The nanocomposites can be tailored for various uses, including wearable technology and healthcare, and are biodegradable.
➀ PQShield explains Post-Quantum Cryptography (PQC) in a series of videos; ➁ Discusses the NIST PQC standards and their importance; ➂ Provides insights into the implementation and challenges of PQC.
1. SentinelOne's stock is expected to rise 60% by summer 2025 with a $40 per share target, driven by a 30% CAGR. 2. SentinelOne's AI-powered cybersecurity platform, Singularity, offers real-time threat detection and is poised to capture market share from competitors. 3. SentinelOne's strong balance sheet with $1.1 billion in cash and no debt provides financial flexibility for reinvestment or strategic acquisitions.
➀ Delta Airlines has officially filed a lawsuit against CrowdStrike; ➁ The IT outage caused by CrowdStrike's software resulted in millions of Windows machines being affected; ➂ Delta Airlines claims to have suffered approximately $500 million in damages.
➀ Google is rumored to switch to TSMC's N3E process for Tensor G5; ➁ The report also clarifies that Google has chosen not to use 2nm technology for Tensor G6; ➂ The move could impact the competition in the AI and smartphone chip markets.
➀ Raspberry Pi introduces the new AI HAT+ with two variants, 13 and 26 TOPS; ➁ The HAT+ is based on Hailo-8 neural network inference accelerators; ➂ The 26 TOPS variant is designed for larger networks and can run multiple networks simultaneously.
➀ A cybersecurity researcher discovered over 100,000 UN-associated documents; ➁ The documents contained sensitive information such as financial reports and personal data; ➂ The researcher reported the issue, and access was restricted the next day.
➀ Cloud Architect with an average annual salary of $174,984; ➁ Network Security Engineer with an average annual salary of $160,471; ➂ Data Scientist, Machine Learning Engineer, Cybersecurity Engineer, Software Engineer, Penetration Tester, AI Research Scientist, DevOps, and Information Security Analyst are among the highest paying jobs in tech.
➀ Lantronix introduces the SmartLV, an AI-enabled IoT Edge Compute Cellular Gateway for smart grids and industrial sectors; ➁ The gateway offers real-time visibility and control over distribution networks, enhancing energy stability; ➂ Lantronix's gateway uses Qualcomm's AI technology to address complex energy distribution challenges.
➀ Imec spin-off Brailsports is developing a platform for optimizing athlete training volumes and schedules based on data analysis; ➁ The platform uses AI models to estimate individual athlete fitness and fatigue, improving performance and reducing injury risk; ➂ The platform is currently operational at cycling team Lotto Dstny, with positive results.
➀ DJI files a lawsuit against the U.S. Department of Defense; ➁ The lawsuit challenges the designation as a 'Chinese military company'; ➂ DJI claims it operates independently and has no military affiliations.
➀ Prepare for the quantum computing era and its cybersecurity risks; ➁ Discuss the role of post-quantum cryptography (PQC) and secure-memory solutions; ➂ Explain how these technologies protect industries and supply chains.
➀ Arm is exploring the feasibility of running LLMs on mobile devices; ➁ Arm's optimization techniques for LLMs on mobile; ➂ The importance of practical use cases for LLMs in mobile devices
➀ Electron Beam Probing (EBP) has become a powerful method for security analyzing of sub-7nm ICs. ➁ It offers better spatial resolution than optical probing and is suitable for sub-7nm flip-chips and advanced 3D architectures. ➂ The research focuses on the importance of EBP in failure analysis and hardware assurance.
➀ Chinese researchers have successfully executed the first quantum attack on widely used encryption algorithms using a D-Wave quantum computer, posing a significant threat to military and banking sectors. ➁ The attack targets SPN algorithms, which are considered crucial for digital security. ➂ The researchers warn that the future of encryption is at stake, and traditional encryption methods may soon become obsolete.
➀ The research investigates the effects of adding TiC nanoparticles to aluminum alloy 7075, aiming to enhance casting performance and improve fluidity and surface quality; ➁ TiC nanoparticles were introduced in two concentrations, and their impact on fluidity and microstructure was analyzed; ➂ The results showed a significant improvement in fluidity and surface quality, with finer grain sizes and smoother surfaces.
➀ Pokemon developer GameFreak confirms a recent hack and leaks of information; ➁ The hack occurred in August 2024; ➂ GameFreak rebuilds and re-inspects the server to prevent future incidents.
➀ The EU Cyber Resilience Act (CRA) has been officially adopted with new security requirements for connected devices and software from November 2027.➁ The Fraunhofer IEM provides tips for businesses to prepare for the CRA.➂ Three key measures include establishing an incident response team, conducting threat and risk analyses, and performing a current state analysis.
➀ The Internet Archive has suffered a massive data breach exposing tens of millions of user account details; ➁ The breach includes usernames, emails, and bcrypt password hashes; ➂ Hacker group SN_BLACKMETA claimed responsibility for the attack.