science and technology

Backdoor.Win32.DEVILSHADOW.THEAABO

Threat type: Backdoor

Aliases: Trojan.Win32.Scar.sydj (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer. This is probably hosted on malicious or suspicious sites.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




science and technology

IoT.Linux.MIRAI.VWISI

Threat type: Backdoor

Aliases:

Platforms: Unix

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This new Mirai variant exploits CVE-2020-10173, a vulnerability in Comtrend VR-3033 routers. Similar to earlier variants, this Mirai variant uses telnet and SSH brute-forcing techniques to attack vulnerable devices.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Backdoor.MSIL.BLADABINDI.THA

Threat type: Backdoor

Aliases: Backdoor:MSIL/Bladabindi.SBR!MSR (Microsoft), MSIL:Bladabindi-JK [Trj](AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

Cybercriminals used this malware bundled with legitimate installation copies of the VPN software known as Windscribe. Note that these copies are hosted from fraudulent sources.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.

It gathers certain information on the affected computer. It logs a user's keystrokes to steal information.




science and technology

Backdoor.MSIL.SUNBURST.A

Threat type: Backdoor

Aliases: Trojan:MSIL/Solorigate.B!dha (Microsoft); Trj/Solorigate.A (Panda)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.




science and technology

Trojan.MSIL.SUPERNOVA.A

Threat type: Trojan

Aliases: MSIL/Agent.5676!tr (FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.

It executes commands from a remote malicious user, effectively compromising the affected system.




science and technology

Ransom.Win32.BABUK.THAODBA

Threat type: Ransomware

Aliases: Trojan.Win32.Udochka.kb (KASPERSKY); Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Trojan.INF.HIDDENTEAR.THAOGBA

Threat type: Trojan

Aliases: INF/Agent.J trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Low

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It automatically executes files when a user opens a drive.




science and technology

Ransom.MSIL.COBRALOCKER.AA

Threat type: Ransomware

Aliases: Trojan-Ransom.FileCrypter (IKARUS), W32/Encoder.AFA!tr (FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware may be dropped by other malware.




science and technology

Ransom.Win32.MAOLOA.THAAHBA

Threat type: Ransomware

Aliases: HEUR:Backdoor.Win32.Remcos.gen(KASPERSKY); W32/Remcos!tr.bdr(FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.Win32.BABUK.YEBA-THAAEBA

Threat type: Ransomware

Aliases: Ransom:Win32/BabukLocker.MK!MTB (MICROSOFT); Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Trojan.Win64.COMBACKER.YABA-A

Threat type: Trojan

Aliases: Trojan.Win64.Agent (IKARUS), Trojan:Win64/Comebacker.A!dha (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

PUA.Win64.ProcHack.AC

Threat type: Potentially Unwanted Application

Aliases: HEUR:RiskTool.Win32.ProcHack.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Low

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Ransom.MSIL.THANOS.THABGBA

Threat type: Ransomware

Aliases: Trojan-Ransom.Thanos (Ikarus), HEUR:Trojan-Ransom.MSIL.Encoder.gen (Kaspersky)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.

It creates certain registry entries to disable applications related to security.

It encrypts files with specific file extensions. It drops files as ransom note.




science and technology

Ransom.MSIL.POVLSOM.THBAOBA

Threat type: Ransomware

Aliases: Ransom:MSIL/Filecoder.EY!MTB (MICROSOFT), Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Trojan.MacOS.SLISP.A

Threat type: Trojan

Aliases: Trojan.OSX.SilverSparrow (IKARUS)

Platforms: OSX

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan may be unknowingly downloaded by a user while visiting malicious websites.




science and technology

Trojan.PS1.BOXTER.A

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Trojan.Win64.HAFNIUM.A

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Ransom.Win32.DEARCRY.THCABBA

Threat type: Ransomware

Aliases: Ransom:Win32/DoejoCrypt.A (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Ransom.Win64.ASTROLOCKER.THCBDBA

Threat type: Ransomware

Aliases: Win64/Filecoder.CI trojan (Nod32), Trojan-Ransom.FileCrypter (Ikarus)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.Win32.ASTROLOCKER.A

Threat type: Ransomware

Aliases: BScope.TrojanRansom.Encoder (VBA32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

TrojanSpy.MSIL.REDLINESTEALER.YXBDM

Threat type: Trojan Spy

Aliases: MSIL/Kryptik.AAHQ!tr(FORTINET); Trj/GdSda.A(PANDA)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




science and technology

TrojanSpy.MSIL.REDLINESTEALER.YXBDN

Threat type: Trojan Spy

Aliases: a variant of MSIL/Kryptik.AAHN trojan(NOD32); PWS-FCXD!F291EAD13EAD(NAI)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




science and technology

Trojan.X97M.PANDASTEAL.THDABBA

Threat type: Trojan

Aliases: HEUR:Trojan-Downloader.MSOffice.Agent.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This is the Trend Micro detection for macros that drop the cryptocurrency wallet stealer known as Panda stealer.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Trojan.Win32.CVE20188120.E

Threat type: Trojan

Aliases: Exploit:Win32/CVE-2018-8120.A (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




science and technology

Trojan.Win32.CVE20190808.A

Threat type: Trojan

Aliases: Win32:CVE-2019-0808-K [Expl] (AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




science and technology

Ransom.Win32.SODINOKIBI.YABGC

Threat type: Ransomware

Aliases: N/A

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.Win32.BLACKMATTER.THGOCBA

Threat type: Ransomware

Aliases: Trojan-Ransom.BlackMatter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.MSIL.CHAOS.A

Threat type: Ransomware

Aliases: HEUR:Trojan.MSIL.Fsysna.gen (Kaspersky);

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It encrypts files found in specific folders.




science and technology

Ransom.Win32.LOCKBIT.YEBGW

Threat type: Ransomware

Aliases: Ransom:Win32/Lockbit.AA!MTB (MICROSOFT); W32/Lockbit.C2F8!tr.ransom (FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Trojan.W97M.CVE202140444.A

Threat type: Trojan

Aliases: HEUR:Exploit.MSOffice.Agent.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




science and technology

Trojan.MSIL.WHISPERGATE.YXCAQ

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.I!dha (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Trojan.Win32.WHISPERGATE.YXCAX

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.M (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.




science and technology

Trojan.Win32.KILLMBR.YECCA

Threat type: Trojan

Aliases: Win32/KillMBR.NHQ trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Worm.Win32.HERMWIZ.YECCA

Threat type: Worm

Aliases: DoS:Win32/FoxBlade.A!dha (MICROSOFT); Win32/Agent.OJC worm (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: High

Reported Infection: Low

Information Exposure: Low

Overview:

This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Ransom.Win32.LOCKBIT.YXCGD

Threat type: Ransomware

Aliases: Trojan-Ransom.BlackMatter(IKARUS), Ransom:Win32/Lockbit.STB(MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.Win64.DONOTRUN.A

Threat type: Ransomware

Aliases: Python/Filecoder.EK trojan, Python/Filecoder.EK trojan (NAI)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This ransomware locks the user out of their devices by locking the screen.

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.




science and technology

Ransom.Win32.RTMCOMMAND.THKBFBD

Threat type: Ransomware

Aliases: Ransom:Win32/RTMLocker.AA!MTB

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This ransomware encrypts all drives except the CD-ROM.

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.




science and technology

Ransom.Win64.CONTI.AA

Threat type: Ransomware

Aliases: Gen:Variant.Lazy.326686 (BITDEFENDER)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.




science and technology

Trojan.W97M.EMOTET.SMI

Threat type: Trojan

Aliases: HEUR:Trojan.Script.Generic (KASPERSKY); TrojanDownloader:O97M/Emotet.S!MTB (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This is a generic detection for all cases and instances of Emotet.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




science and technology

Ransom.Win32.CRYPTOLOCK.E

Threat type: Ransomware

Aliases: Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It terminates itself if it detects it is being run in a virtual environment.




science and technology

Ransom.Win32.LOCKBIT.EOD

Threat type: Ransomware

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.PS1.LOCKBIT.AA

Threat type: Ransomware

Aliases: Trojan:Win32/Leonem (MICROSOFT); Win32/Filecoder.Lockbit.M trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.MSIL.EGOGEN.THEBBBC

Threat type: Ransomware

Aliases: Trojan:MSIL/XWormRAT.A!MTB (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It adds certain registry entries to disable the Task Manager. This action prevents users from terminating the malware process, which can usually be done via the Task Manager.

It terminates itself if it detects it is being run in a virtual environment.

It encrypts files with specific file extensions. It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.Win32.NOKO.YPDFA

Threat type: Ransomware

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

Ransom.Win32.NOKO.THDABBC

Threat type: Ransomware

Aliases: Ransom:Win32/Nokonoko.PB!MTB (MICROSOFT); Win32:Nokoyawa-A [Trj] (AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

AndroidOS_SpyNote.GCLX

Threat type: Backdoor

Aliases:

Platforms: Android

Overall Risk Rating: High

Damage Potential: Low

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:




science and technology

Ransom.Win32.SPOOSH.THGAGBC

Threat type: Ransomware

Aliases: Generic.Ransom.DCRTR.7E80656D (BITDEFENDER)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It connects to certain websites to send and receive information.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




science and technology

She sat down during the COVID lockdown and started coding — now she’s taking on Bolt

Sitting in Athens during the first COVID-19 lockdown, entrepreneur Rania Lamprou watched online e-commerce exploding because of social distancing. But merchants still struggled with low conversion rates because their checkout processes were complicated, and they had to integrate multiple providers for payments, shipping, and loyalty programs. “I knew there had to be a better way […]

© 2024 TechCrunch. All rights reserved. For personal use only.




science and technology

All Iron Ventures rebrands as Acurio Ventures with a new €150M ‘follow-on’ fund

The new fund has already made around 20 investments, and it will operate with a generalist thesis, investing across the whole of Europe.

© 2024 TechCrunch. All rights reserved. For personal use only.




science and technology

A startup from ex-Revolut employees uses AI to automate accounting — but hopes to keep accountants in jobs

As enterprise platforms gradually eat into the workflows of accountants, many are choosing to leave the industry, especially as AI automates away a lot of the core, manual work required. More than 300,000 U.S. accountants and auditors left their jobs between 2019 and 2021, and the number of accountants in the U.S. has declined 15.9% […]

© 2024 TechCrunch. All rights reserved. For personal use only.