ProjectDiscovery raises $25M to launch a cloud version of its threat-scanning platform
ProjectDiscovery, a platform that detects new, exploitable vulnerabilities in codebases, today announced that it raised $25 million in a Series A funding round led by CRV with participation from Point72, SignalFire, Rain Capital, Mango Capital, Accel and Lightspeed. ProjectDiscovery began as a collaboration between four security engineers — Rishiraj Sharma,
Read moreCreate UserDefaults Helper Using “dynamicMemberLookup” and KeyPath
A UserDefaults sugar syntaxPhoto by Pisit Heng on UnsplashPeople who have read Swift by Sundel’s Combining dynamic member lookup with key paths post must have tasted the syntax sweetness from the combo. Below is a use case when my teammate and I wanted to create a helper for user default.There are two things
Read moreProcess that Empowers
Photo by Glenn Carstens-Peters on UnsplashAt one point in my career, I joined a company with a lot of process in place. There were document templates for any kind of proposal you could create and spreadsheets to track progress all activities. Hiring, onboarding, strategic planning, project planning, software acceptance, sprint reviews,
Read moreAmplitude’s CEO feels his company would be “in a world of hurt” if it hadn’t gone public in 2021
The CEO of Amplitude is glad that his company went public in 2021, despite a sharp contraction in the value of tech shares since its IPO. In a wide-ranging conversation on TechCrunch’s Equity Podcast, Spenser Skates, who also co-founded Amplitude, told me that going public was the “totally correct” move
Read moreMemorizing four-digit numbers
The Major mnemonic system is a method of converting numbers to words that can be more easily memorized. The basics of the system can be written on an index card, but there are practical details that are seldom written down. Presentations of the Major system can be misleading, intentionally or
Read moreHow to submit a guest column to TechCrunch
Sharing hot takes, conventional wisdom and infographics won’t help you gain media traction. Online audiences want expertise and opinions that are supported by facts and relevant experience. No one builds credibility by being the loudest or first to comment. To level the playing field for people who want to share
Read moreSoil can store gigatons of carbon, and Yard Stick wants to measure it all
When it comes to removing carbon dioxide from the atmosphere, one of the first questions is often: What should we do with it? Making new things is an obvious answer, though it’s still an expensive proposition. Stashing it underground is another, cheaper option; it usually involves compressing and injecting the
Read moreCISA says hackers are exploiting a new file transfer bug in Citrix ShareFile
Hackers are exploiting a newly discovered vulnerability in yet another enterprise file transfer software, the U.S. government’s cybersecurity agency has warned. CISA on Wednesday added a vulnerability in Citrix ShareFile, tracked as CVE-2023-24489, to its Known Exploited Vulnerabilities (KEV) catalog. The agency warned that the flaw poses “significant risks to
Read moreHow to Use the CSS gap Property
Learn how to use the CSS gap property, which makes it super easy to add space between elements without the need for hacky margin solutions. Continue reading How to Use the CSS gap Property on SitePoint.
Read moreThe numerical range ellipse
Let A be an n × n complex matrix. The numerical range of A is the image of x*Ax over the unit sphere. That is, the numerical range of A is the set W(A) in defined by W(A) = {x*Ax | x ∈ ℂn and ||x|| = 1} where x*
Read more