article thumbnail

Pitch Deck Teardown: Uber’s $200K pre-seed deck from 2008

TechCrunch

The Uber deck has been floating around the internet for a while; we shared it as a gallery back in 2017 , and these days it isn’t really seen as a good example of how to do a pitch deck. Image Credits: Uber In 2008, smartphones were starting to be a thing. and fundraising has become a lot more sophisticated.

Marketing 244
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

Operator Panda, which seems to be CrowdStrikes name for the group known as Salt Typhoon, specializes in exploiting internet-facing appliances such as Cisco switches. PlugX, aka Korplug, is one of the oldest remote access trojans used by China-linked cyber espionage groups, with original versions dating back to 2008.

Industry 198
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

Operator Panda, which seems to be CrowdStrikes name for the group known as Salt Typhoon, specializes in exploiting internet-facing appliances such as Cisco switches. PlugX, aka Korplug, is one of the oldest remote access trojans used by China-linked cyber espionage groups, with original versions dating back to 2008.

Industry 147
article thumbnail

4 hiring strategies that the 2008 recession taught me

Hacker Earth Developers Blog

The hemorrhaging of American jobs accelerated at a record pace at the end of 2008, bringing the year’s total job losses to 2.6 In contrast to the underlying financial cause of the 2008 recession, the current crisis is rooted in a health emergency. “ In 2008, the business crashed and there was no financial support.

Strategy 100
article thumbnail

Web 2.0 Predictions for 2008

Dion Hinchcliffe's Web 2.0 Blog

It's the first work day of the new year and I thought I'd take some time to offer up my predictions for what will happen on the leading edge of the Internet this year. In this way, 2008 will continue to be a fascinating year as we see what history's largest ever business laboratory and incubator will turn out for us.

Media 79
article thumbnail

CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild

Tenable

Zero-day remote code execution vulnerability in Internet Explorer has been observed in attacks. On January 17, Microsoft released an out-of-band advisory (ADV200001) for a zero-day remote code execution (RCE) in Internet Explorer that has been exploited in the wild. Background.

article thumbnail

Survival tips for startup founders living through their first market correction

TechCrunch

As an entrepreneur and venture capitalist who has lived through two downturns (the post-2000 internet bubble bust and the post-2008 financial crisis), I know that entrepreneurial innovation is always alive and that company-building is a marathon, not a sprint.

Marketing 222