Connect with us

Tech

Have money, will travel: a16z’s hunt for the next European unicorn

Published

on

Gabriel Vasquez, a partner at Andreessen Horowitz, recently revealed he took nine flights from NYC to Stockholm in one year. That wasn’t just to visit Lovable, a portfolio company, but also to look for other future Swedish unicorns before they cross the Atlantic.

This all came to light when news emerged that a16z had led a $2.3 million pre-seed round into Dentio, a Swedish startup that uses AI to help dentists’ practices with admin work. While this is a small check for a firm that just announced new funds totaling $15 billion, it confirms that U.S. VCs are actively seeking deal flow outside of the U.S., even without local offices.

Stockholm is a natural stop for a16z, which previously achieved significant returns from backing Skype, cofounded by Swedish entrepreneur Niklas Zennström. Since then, a significant number of fast-growing startups have been created in the Swedish capital, and the VC heavyweight tracked down where many of them were coming from. 

“We spend a lot of time developing a deep understanding of specific markets and knowing where innovation is emerging. In Sweden, that has meant closely tracking ecosystems like SSE Labs — the startup incubator of the Stockholm School of Economics — and the companies coming out of it,” Vasquez told TechCrunch.

Advertisement

Like fintech giant Klarna, legal AI startup Legora, and e-scooter company Voi, Dentio is an alum of SSE Labs — a startup incubator that has produced several successful Swedish companies. The three former high school classmates Elias Afrasiabi, Anton Li and Lukas Sjögren joined the incubator after reconnecting as students at both the SSE (Stockholm School of Economics) and KTH (Royal Institute of Technology), then joined the incubator with additional backing from KTH’s Innovation Launch program. They tackled a problem close to home: Li’s mom, a dentist, had told them how admin work detracted from clinical care.

The trio intuited that they could leverage LLMs to help people like her — an idea that they also validated with her and her colleagues. This led them to Dentio’s initial product, a recording tool that uses AI to generate clinical notes. But it’s only a matter of time before AI scribes become a commodity product, and Dentio needs to prove its value to dentists so they aren’t tempted to switch providers when that happens, Afrasiabi said.

Potential competitors include fellow Swedish startup Tandem Health, which raised a $50 million Series A round last year to support clinicians with AI across multiple medical specialties. Dentio, by contrast, focuses exclusively on dentists, but it believes it can still reach the scale VCs expect through international expansion

Techcrunch event

Advertisement

Boston, MA
|
June 23, 2026

“Now we’re a team of seven people, and we think that it’s possible to build a unified way of handling administration all over Europe, and maybe even all over the world,” Afrasiabi said. While Europe’s healthcare systems are fragmented, they share similarities, and Dentio’s assumption is that what works in Sweden could work elsewhere in the EU.

Advertisement

Dentio prominently features its “Made in Sweden” branding and emphasizes that “all relevant data is processed in Sweden and Finland in compliance with Swedish and EU law.” It signals data protection to privacy-conscious European customers. But it also signals potential to VCs — a callback to Sweden’s history of producing breakout companies.

“We went to zero meetups. I reached out to zero investors,” Afrasiabi said. While the team was heads down building, the word spread out. “I think it was mostly through referrals and people talking to each other that the news got all the way over to the U.S.,” he said.

This wasn’t happenstance: a16z has eyes around the world in order to spot these companies as early as local funds might, Vasquez said. “In Sweden for example, we partnered with top founders abroad like Fredrik Hjelm, founder of Voi, and Johannes Schildt, founder of Kry, by turning them into scouts and mapping the best local talent.”

For Vasquez, who focuses on AI application investments for a16z, this isn’t just about Sweden, but about “a pattern of great global companies being born abroad and scaling quickly,” from Black Forest Labs in Germany to Manus, the Singapore-based AI startup recently acquired by Meta.

Advertisement

Born and raised in El Salvador, he has also been spending time in São Paulo. “I’m really excited about what’s brewing in Brazil and across Latin America in AI,” he wrote on LinkedIn at the time. “I believe AI is the great equalizer,” he added. “Most people now have access to PhD-level intelligence on a phone, and ultimately, Silicon Valley is a state of mind.”

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Most ransomware playbooks don’t address machine credentials. Attackers know it.

Published

on

The gap between ransomware threats and the defenses meant to stop them is getting worse, not better. Ivanti’s 2026 State of Cybersecurity Report found that the preparedness gap widened by an average of 10 points year over year across every threat category the firm tracks. Ransomware hit the widest spread: 63% of security professionals rate it a high or critical threat, but just 30% say they are “very prepared” to defend against it. That’s a 33-point gap, up from 29 points a year ago.

CyberArk’s 2025 Identity Security Landscape puts numbers to the problem: 82 machine identities for every human in organizations worldwide. Forty-two percent of those machine identities have privileged or sensitive access.

The most authoritative playbook framework has the same blind spot

Gartner’s ransomware preparation guidance, the April 2024 research note “How to Prepare for Ransomware Attacks” that enterprise security teams reference when building incident response procedures, specifically calls out the need to reset “impacted user/host credentials” during containment. The accompanying Ransomware Playbook Toolkit walks teams through four phases: containment, analysis, remediation, and recovery. The credential reset step instructs teams to ensure all affected user and device accounts are reset.

Service accounts are absent. So are API keys, tokens, and certificates. The most widely used playbook framework in enterprise security stops at human and device credentials. The organizations following it inherit that blind spot without realizing it.

Advertisement

The same research note identifies the problem without connecting it to the solution. Gartner warns that “poor identity and access management (IAM) practices” remain a primary starting point for ransomware attacks, and that previously compromised credentials are being used to gain access through initial access brokers and dark web data dumps. In the recovery section, the guidance is explicit: updating or removing compromised credentials is essential because, without that step, the attacker will regain entry. Machine identities are IAM. Compromised service accounts are credentials. But the playbook’s containment procedures address neither.

Gartner frames the urgency in terms few other sources match: “Ransomware is unlike any other security incident,” the research note states. “It puts affected organizations on a countdown timer. Any delay in the decision-making process introduces additional risk.” The same guidance emphasizes that recovery costs can amount to 10 times the ransom itself, and that ransomware is being deployed within one day of initial access in more than 50% of engagements. The clock is already running, but the containment procedures don’t match the urgency — not when the fastest-growing class of credentials goes unaddressed.

The readiness deficit runs deeper than any single survey

Ivanti’s report tracks the preparedness gap across every major threat category: ransomware, phishing, software vulnerabilities, API-related vulnerabilities, supply chain attacks, and even poor encryption. Every single one widened year over year.

“Although defenders are optimistic about the promise of AI in cybersecurity, Ivanti’s findings also show companies are falling further behind in terms of how well prepared they are to defend against a variety of threats,” said Daniel Spicer, Ivanti’s Chief Security Officer. “This is what I call the ‘Cybersecurity Readiness Deficit,’ a persistent, year-over-year widening imbalance in an organization’s ability to defend their data, people, and networks against the evolving threat landscape.”

Advertisement

CrowdStrike’s 2025 State of Ransomware Survey breaks down what that deficit looks like by industry. Among manufacturers who rated themselves “very well prepared,” just 12% recovered within 24 hours, and 40% suffered significant operational disruption. Public sector organizations fared worse: 12% recovery despite 60% confidence. Across all industries, only 38% of organizations that suffered a ransomware attack fixed the specific issue that allowed attackers in. The rest invested in general security improvements without closing the actual entry point.

Fifty-four percent of organizations said they would or probably would pay if hit by ransomware today, according to the 2026 report, despite FBI guidance against payment. That willingness to pay reflects a fundamental lack of containment alternatives, exactly the kind that machine identity procedures would provide.

Where machine identity playbooks fall short

Five containment steps define most ransomware response procedures today. Machine identities are missing from every one of them.

Credential resets weren’t designed for machines

Resetting every employee’s password after an incident is standard practice, but it doesn’t stop lateral movement through a compromised service account. Gartner’s own playbook template shows the blind spot clearly.

Advertisement

The Ransomware Playbook Sample’s containment sheet lists three credential reset steps: force logout of all affected user accounts via Active Directory, force password change on all affected user accounts via Active Directory, and reset the device account via Active Directory. Three steps, all Active Directory, zero non-human credentials. No service accounts, no API keys, no tokens, no certificates. Machine credentials need their own chain of command.

Nobody inventories machine identities before an incident

You can’t reset credentials that you don’t know exist. Service accounts, API keys, and tokens need ownership assignments mapped pre-incident. Discovering them mid-breach costs days.

Just 51% of organizations even have a cybersecurity exposure score, Ivanti’s report found, which means nearly half couldn’t tell the board their machine identity exposure if asked tomorrow. Only 27% rate their risk exposure assessment as “excellent,” despite 64% investing in exposure management. The gap between investment and execution is where machine identities disappear.

Network isolation doesn’t revoke trust chains

Pulling a machine off the network doesn’t revoke the API keys it issued to downstream systems. Containment that stops at the network perimeter assumes trust is bounded by topology. Machine identities don’t respect that boundary. They authenticate across it.

Advertisement

Gartner’s own research note warns that adversaries can spend days to months burrowing and gaining lateral movement within networks, harvesting credentials for persistence before deploying ransomware. During that burrowing phase, service accounts and API tokens are the credentials most easily harvested without triggering alerts. Seventy-six percent of organizations are concerned about stopping ransomware from spreading from an unmanaged host over SMB network shares, according to CrowdStrike. Security leaders need to map which systems trusted each machine identity so they can revoke access across the entire chain, not just the compromised endpoint.

Detection logic wasn’t built for machine behavior

Anomalous machine identity behavior doesn’t trigger alerts the way a compromised user account does. Unusual API call volumes, tokens used outside automation windows, and service accounts authenticating from new locations require detection rules that most SOCs haven’t written. CrowdStrike’s survey found 85% of security teams acknowledge traditional detection methods can’t keep pace with modern threats. Yet only 53% have implemented AI-powered threat detection. The detection logic that would catch machine identity abuse barely exists in most environments.

Stale service accounts remain the easiest entry point

Accounts that haven’t been rotated in years, some created by employees who left long ago, are the single weakest surface for machine-based attacks.

Gartner’s guidance calls for strong authentication for “privileged users, such as database and infrastructure administrators and service accounts,” but that recommendation sits in the prevention section, not in the containment playbook where teams need it during an active incident. Orphan account audits and rotation schedules belong in pre-incident preparation, not post-breach scrambles.

Advertisement

The economics make this urgent now

Agentic AI will multiply the problem. Eighty-seven percent of security professionals say integrating agentic AI is a priority, and 77% report comfort with allowing autonomous AI to act without human oversight, according to the Ivanti report. But just 55% use formal guardrails. Each autonomous agent creates new machine identities, identities that authenticate, make decisions, and act independently. If organizations can’t govern the machine identities they have today, they’re about to add an order of magnitude more.

Gartner estimates total recovery costs at 10 times the ransom itself. CrowdStrike puts the average ransomware downtime cost at $1.7 million per incident, with public sector organizations averaging $2.5 million. Paying doesn’t help. Ninety-three percent of organizations that paid had data stolen anyway, and 83% were attacked again. Nearly 40% could not fully restore data from backups after ransomware incidents. The ransomware economy has professionalized to the point where adversary groups now encrypt files remotely over SMB network shares from unmanaged systems, never transferring the ransomware binary to a managed endpoint.

Security leaders who build machine identity inventory, detection rules, and containment procedures into their playbooks now won’t just close the gap that attackers are exploiting today — they’ll be positioned to govern the autonomous identities arriving next. The test is whether those additions survive the next tabletop exercise. If they don’t hold up there, they won’t hold up in a real incident.

Source link

Advertisement
Continue Reading

Tech

Sex toy firm hit by data breach – Tenga says hacker infiltrated systems, stole customer data

Published

on


  • Tenga cyberattack via phishing exposed customer names, emails, and order/service details
  • Attacker accessed inbox, exfiltrated data, and sent spam to employees and customers
  • Company reset credentials, enabled MFA, and urged customers to refresh passwords and stay vigilant

Japanese sex toys manufacturer Tenga has reportedly suffered a cyberattack and lost some of its customers’ data.

TechCrunch claims to have seen a data breach notification letter Tenga allegedly sent to its employees, stating how someone targeted a Tenga employee with phishing and managed to obtain access to their inbox.

Source link

Advertisement
Continue Reading

Tech

What to do if the Galaxy S26 Ultra is a dud? Well, you could simply opt for the Galaxy Z Fold 7 while it’s going cheap

Published

on

If rumors are true, the Galaxy S26 Ultra is almost certainly going to be released within the next few weeks. The device is likely to offer the lion’s share of new features from the brand, but it could also be a rather iterative upgrade. So, what to do if you want to go big for your next phone?

Well, the obvious option is the Galaxy Z Fold 7. Yes, it’s pricey, but the official Samsung Store has a fantastic deal on the device right now that might just make you consider joining team foldable.

Advertisement

Galaxy Z Fold 7 review, and it’s something that the Galaxy S25 Ultra notably doesn’t suffer from. If the S-Pen is important to you, then we expect Samsung to still support it on the Galaxy S26 Ultra.

Advertisement


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course, you can also follow TechRadar on YouTube and TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Advertisement

Source link

Continue Reading

Tech

OLED at 360Hz for $499.99 is the kind of monitor deal PC gamers wait for

Published

on

If you’ve been using a decent gaming monitor and wondering why people obsess over OLED, this is the type of discount that makes the upgrade feel justified. The Alienware AW2725DF is $499.99 for a limited time, down from $649.99 (23% off). What makes it interesting is the combo: QD-OLED, 2560×1440, 360Hz, and 0.03ms response. That mix is aimed at gamers who want both “wow” image quality and genuinely fast competitive performance, without having to pick one or the other.

What you’re getting

This is a 26.7-inch QD-OLED gaming monitor with a WQHD (2560×1440) resolution, a 360Hz refresh rate, and a claimed 0.03ms response time. The practical benefit of OLED is instant pixel response and true contrast, so dark scenes look actually dark, highlights pop, and motion stays clean.

It also supports AMD FreeSync Premium Pro, and you get the modern connection options you’d expect (HDMI, DisplayPort, USB). Ergonomics matter more than people admit, and this one includes height, tilt, swivel, and pivot adjustment, which is a big deal if you sit at a desk for long sessions.

Why it’s worth it

Here’s the different way to think about it: this monitor is trying to be two monitors at once.

Advertisement
  • For competitive games, 360Hz plus OLED’s response can make motion look incredibly crisp. Not everyone needs 360Hz, but if you play shooters or fast esports titles, you’ll notice the smoothness and reduced blur.
  • For everything else, QD-OLED is the “your games look expensive” upgrade. Colors feel richer, contrast is dramatic, and you get that depth that IPS panels struggle to match.

At $499.99, you’re also landing at a price that’s easier to rationalize for a centerpiece monitor. A lot of people keep their display through multiple PC upgrades, so it’s one of the few purchases that can make every game, every session, and even everyday desktop use feel better.

The bottom line

At $499.99, the Alienware AW2725DF is a compelling limited-time deal if you want a single monitor that covers both competitive speed and premium OLED visuals. If you mainly play slower games and do a lot of productivity work, you might prioritize resolution or screen size instead. But if your goal is “fast and gorgeous” at 1440p, this price drop is worth acting on.

Source link

Advertisement
Continue Reading

Tech

Micron's world-first PCIe Gen 6 SSD doubles data rates for AI data centers

Published

on


Micron has announced that the 9650 NVMe SSD has finally entered mass production, hailing the new drive as the first PCIe Gen6 storage product in the world. Like everything else these days, the high-end SSD is largely focused on accelerating AI workloads, and generating hefty returns thanks to Big Tech’s…
Read Entire Article
Source link

Continue Reading

Tech

Man arrested for demanding reward after accidental police data leak

Published

on

Arrest

Dutch authorities arrested a 40-year-old man after he downloaded confidential documents that had been mistakenly shared by the police and refused to delete them unless he received “something in return.”

Police detained the suspect at his Prinses Beatrixstraat residence in Ridderkerk on Thursday evening for computer hacking after the failed “extortion” attempt, searching his home and seizing data storage devices to recover the files.

The incident began when the man contacted police on February 12 about images he had that may be relevant to an ongoing investigation. An officer responded to his inquiry but, instead of sending a link to upload the images, mistakenly shared a download link to confidential police documents.

Wiz

As first reported by DataBreaches.Net, the man downloaded the files despite the obvious error. When the police instructed him to stop downloading and delete the materials, he allegedly refused unless he was given “something in return.”

In a Monday press release, the Dutch police said that knowingly downloading files from a link clearly intended for uploading constitutes potential computer trespass under Dutch law, particularly when instructed not to access the materials.

Advertisement

“If you receive a download link, while you know that you should get an upload link, it is clearly said that it is not downloaded and chooses to download the files anyway, then you may be guilty of computer trespassing,” the police said.

“The recipient can reasonably assume that the download link and the files that are shared with it are not intended for him.”

Authorities reported the data breach and launched an investigation even though they have yet to find evidence that the confidential documents were distributed beyond the suspect’s possession.

The Dutch police also emphasized that recipients of misdirected confidential materials have a legal obligation to report errors and to refrain from accessing or retaining documents not intended for them, regardless of how the materials were received.

Advertisement

“The police have no indication that the files were distributed further. They are following protocol for data breaches. The police are continuing their investigation,” the authorities added.

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Source link

Advertisement
Continue Reading

Tech

AI panic grips Wall Street as software stocks sink, yet AWS chief says investors are wildly overreacting to disruption fears

Published

on


  • Growing AI fears recently triggered a sharp sell-off across software stocks
  • SaaS valuations dropped as disruption narratives gained momentum
  • AWS revenue growth outpaced broader tech market performance, and CEO looks to allay fears

Technology stocks have struggled in 2026 as investors reassess the commercial impact of rapidly advancing AI tools.

The pullback has been especially sharp among software-as-a-service companies, where some analysts now describe the downturn as an “SaaS apocalypse.”

Advertisement

Source link

Continue Reading

Tech

Eurail says stolen traveler data now up for sale on dark web

Published

on

Eurail says stolen traveler data now up for sale on dark web

Eurail B.V., the operator that provides access to 250,000 kilometers of European railways, confirmed that data stolen in a breach earlier this year is being offered for sale on the dark web.

The company said that a threat actor also published a sample of the data on the Telegram messaging platform but it is still trying to determine the type of records and number of customers affected.

Eurail B.V. is a Netherlands-based firm that manages and sells passes (Eurail and Interrail) for train travel across Europe, offering flexibility for multi-country trips.

Wiz

Its passes are also very popular among young European travelers participating in the EU’s DiscoverEU program.

Last month, the company disclosed that it suffered a data breach when threat actors gained unauthorized access to its customer database, compromising sensitive information, including full names, passport details, ID numbers, bank account IBANs, health information, and contact details (email addresses, phone numbers).

Advertisement

“We have become aware that the data has been offered for sale on the dark web and a sample data set has been published on Telegram.

“We are currently investigating which specific data records or how many of the affected customers this concerns,” reads Eurail’s update.

Eurail states that it continues the investigation to determine exactly what data was compromised for each affected customer, and will send individual notifications for those impacted.

Meanwhile, concerned data protection authorities have been notified in accordance with the GDPR requirements, and authorities outside the EU will be alerted soon.

Advertisement

Customers who may have had their information exposed in this incident should be vigilant to potential phishing and scam attempts.

Eurail suggests that customers update their Rail Planner app account passwords and reset them on any other platform where they use the same credentials.

Also, customers should monitor their bank account activity closely and report any suspicious transactions to their bank immediately.

A FAQ page has been published to support customers, and any concerns may also be addressed directly via email to privacyhelp@eurail.com.

Advertisement

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Source link

Continue Reading

Tech

X goes quiet again

Published

on

If you checked X today expecting the usual stream of hot takes, memes, and AI spats, you probably saw… nothing. A widespread outage hit the platform today, leaving feeds blank, timelines unresponsive, and users staring at the digital equivalent of an empty room. Outage trackers such as Downdetector logged a dramatic surge in problem reports […]

This story continues at The Next Web

Source link

Advertisement
Continue Reading

Tech

Alibaba unveils Qwen3.5 with visual agentic abilities

Published

on

Qwen3.5 is 60pc cheaper to use and eight times better at processing large workloads than its predecessor, the company said.

Alibaba has unveiled its latest AI model, Qwen3.5, as newer launches from Chinese companies catch up to their US counterparts in the race for AI dominance.

The first open weight model in the Qwen3.5 series demonstrates “outstanding results across a full range” of benchmarks, the company said. It ranks higher than OpenAI’s GPT-5.2, Anthropic’s Claude Opus 4.5 and Google’s Gemini 3 Pro in several of the tests.

The model is built on a hybrid architecture that allows only 17bn parameters to activate per forward pass, while comprising a total of 397bn parameters. This, Alibaba said, optimises speed without sacrificing its capability.

Advertisement

According to the company, Qwen3.5 is 60pc cheaper to use and eight times better at processing large workloads than its immediate predecessor. The new model comes with “visual agentic capabilities”, Alibaba said – the ability to take actions across phone and computer apps.

“Built for the agentic AI era, Qwen3.5 is designed to help developers and enterprises move faster and do more with the same compute, setting a new benchmark for capability per unit of inference cost,” the company said in a statement, as reported by Reuters.

Alibaba’s latest launch follows ByteDance releasing an upgraded version of its Doubao chatbot app over the weekend. The agentic chatbot service has close to 200m users.

The TikTok parent also recently launched the latest version of its AI video generator, Seedance 2.0, which garnered praise for its capability while also receiving criticism for potential copyright theft.

Advertisement

Other Chinese AI leaders launched their own new models recently, including Zhipu, which unveiled GLM-5, trained entirely using Chinese chips; MiniMax, which released M2.5; and the Alibaba-backed Moonshot AI, which came out with Kimi K2.5.

These new launches come ahead of DeepSeek’s new V4 model, expected to come out later this month. According to reports, the new DeepSeek model could outperform rivals ChatGPT and Claude, particularly on tasks that involve long coding prompts.

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Advertisement

Source link

Continue Reading

Trending

Copyright © 2025