logo
Magewell expands Capture device lineup with USB Capture SDI 4K Pro

Magewell expands Capture device lineup with USB Capture SDI 4K Pro

Broadcast Pro02-04-2025
New model utilises a 20 Gbps USB 3.2 Gen 2x2 interface for seamless 12G SDI capture without requiring drivers or external power.
Magewell, a developer of high-performance video I/O and IP workflow solutions, has introduced the USB Capture SDI 4K Pro, the latest addition to its range of capture devices. This compact, plug-and-play unit allows PCs to capture SDI signals at up to 4K resolution and 60 frames per second through a standard USB 3.2 connection.
The USB Capture SDI 4K Pro continues Magewell's tradition of high-quality USB capture solutions. It supports SDI signals up to 4096×2160 resolution, including 3840×2160 Ultra HD, at 60fps with 4:2:2 chroma fidelity via a USB 3.2 Gen 2×2 interface. The device delivers seamless video capture with minimal CPU usage and requires no external power source.
Beyond 4K capabilities, the USB Capture SDI 4K Pro is versatile, handling various video formats up to 12G and frame rates up to 240fps. It also captures two channels of embedded audio or analogue audio via a 3.5mm Line In interface, while embedded audio can be extracted and output through a 3.5mm Line Out interface. The unit is FPGA-based, ensuring efficient performance without burdening the PC's CPU, though it requires a 20 Gbps USB 3.2 Gen 2×2 connection for optimal operation.
Designed for ease of use, the device features a driver-free setup and automatic input signal format detection, ensuring a true plug-and-play experience. It is compatible with Windows, MacOS, Linux and ChromeOS. Additionally, Magewell provides free USB Capture Utility software, enabling users to adjust capture parameters, update firmware, and manage logs.
James Liu, VP of Engineering at Magewell, said: 'The USB Capture SDI 4K Pro is a high-performer that carefully manages bandwidth to achieve amazing signal quality. This is a wonderful addition to the USB Capture family that will empower professionals and creatives to work with higher resolutions as they continue to push the boundaries of technology with their skills.'
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Starlink Outage Hits Thousands After Software Failure
Starlink Outage Hits Thousands After Software Failure

TECHx

time25-07-2025

  • TECHx

Starlink Outage Hits Thousands After Software Failure

Home » Latest news » Starlink Outage Hits Thousands After Software Failure SpaceX's Starlink suffered a major outage on Thursday, affecting tens of thousands of users globally. The Starlink outage was caused by an internal software failure, according to the company. Users across the U.S. and Europe reported connectivity issues around 3 p.m. EDT (1900 GMT), as per Downdetector, which recorded up to 61,000 user reports. Starlink, which serves over 6 million users in nearly 140 countries and territories, acknowledged the problem on its official X account. The company announced that it was actively working on a solution. Service was mostly restored after 2.5 hours, Michael Nicolls, vice president of Starlink Engineering, revealed on X. 'The outage was due to failure of key internal software services that operate the core network,' Nicolls wrote, apologizing for the disruption and confirming efforts to find the root cause. Elon Musk also apologized, stating, 'Sorry for the outage. SpaceX will remedy root cause to ensure it doesn't happen again.' Experts commented on the incident, noting the unusual scale of the Starlink outage. Doug Madory, an analyst at internet monitoring firm Kentik, reported that the outage was global. 'This is likely the longest outage ever for Starlink, at least while it became a major service provider,' he said. The outage has sparked discussions about possible causes, including a software glitch, a failed update, or even a cyberattack. Gregory Falco, director of a space and cybersecurity lab at Cornell University, speculated, 'I'd guess this is a bad software update, not entirely dissimilar to the CrowdStrike issue with Windows last year, or a cyberattack.' Key details include: SpaceX launched more than 8,000 Starlink satellites since 2020 to build its low-Earth orbit network. The company is partnering with T-Mobile to provide direct-to-cell text messaging services in rural areas. Starlink's growing user base has pushed SpaceX to focus on enhancing network speed and bandwidth. The company's Starshield unit, which handles military satellite services, holds significant contracts with the Pentagon and U.S. intelligence agencies. It remains unclear if these services were affected by the Starlink outage. The incident is being compared to a 2024 CrowdStrike cybersecurity software update that caused worldwide flight cancellations and disrupted 8.5 million Microsoft Windows devices. Source: Reuters

Elon Musk's Starlink network suffers rare global outage
Elon Musk's Starlink network suffers rare global outage

Zawya

time25-07-2025

  • Zawya

Elon Musk's Starlink network suffers rare global outage

SpaceX's Starlink suffered one of its biggest international outages on Thursday when an internal software failure knocked tens of thousands of users offline, a rare disruption for Elon Musk's powerful satellite internet system. Users in the U.S. and Europe began experiencing the outage at around 3 p.m. EDT (1900 GMT), according to Downdetector, a crowdsourced outage tracker that said as many as 61,000 user reports to the site were made. Starlink, which has more than 6 million users across roughly 140 countries and territories, later acknowledged the outage on its X account and said "we are actively implementing a solution." Starlink service mostly resumed after 2.5 hours, Michael Nicolls, Starlink vice president of Starlink Engineering, wrote on X. "The outage was due to failure of key internal software services that operate the core network," Nicolls said, apologizing for the disruption and vowing to find its root cause. Musk had also apologized: "Sorry for the outage. SpaceX will remedy root cause to ensure it doesn't happen again," the SpaceX CEO wrote on X. The outage was a rare hiccup for SpaceX's most commercially sensitive business that had experts speculating whether the service, known for its resilience and rapid growth, was beset by a glitch, a botched software update or even a cyberattack. Doug Madory, an expert at the internet analysis firm Kentik, said the outage was global and that such a sweeping interruption was unusual. "This is likely the longest outage ever for Starlink, at least while it became a major service provider," Madory said. As Starlink gained more users, SpaceX has focused heavily in recent months on updating its network to accommodate demands for higher speed and bandwidth. The company in a partnership with T-Mobile is also expanding the constellation with larger, more powerful satellites to offer direct-to-cell text messaging services, a line of business in which mobile phone users can send emergency text messages through the network in rural areas. SpaceX has launched more than 8,000 Starlink satellites since 2020, building a uniquely distributed network in low-Earth orbit that has attracted intense demand from militaries, transportation industries and consumers in rural areas with poor access to traditional, fiber-based internet. "I'd speculate this is a bad software update, not entirely dissimilar to the CrowdStrike mess with Windows last year, or a cyberattack," said Gregory Falco, director of a space and cybersecurity laboratory at Cornell University. An update to CrowdStrike's widely used cybersecurity software led to worldwide flight cancellations and impacted industries around the globe in July last year. The outage disrupted internet services, affecting 8.5 million Microsoft Windows devices. It was unclear whether Thursday's outage affected SpaceX's other satellite-based services that rely on the Starlink network. Starshield, the company's military satellite business unit, has billions of dollars' worth of contracts with the Pentagon and U.S. intelligence agencies. (Reporting by Juby Babu in Mexico City, and Raphael Satter and Joey Roulette in Washington; Editing by Anil D'Silva and Matthew Lewis)

Crypto‑Looting Malware Masquerades as AI and Gaming Start‑ups
Crypto‑Looting Malware Masquerades as AI and Gaming Start‑ups

Arabian Post

time14-07-2025

  • Arabian Post

Crypto‑Looting Malware Masquerades as AI and Gaming Start‑ups

Cybersecurity firm Darktrace has revealed a sophisticated social engineering campaign targeting cryptocurrency users on Windows and macOS. The scheme employs fake start‑up companies themed around AI, gaming, Web3, video conferencing, and social media to trick individuals into downloading malware disguised as legitimate software. Darktrace's analysis shows threat actors are establishing plausible digital identities using compromised or spoofed X accounts—sometimes verified—for both companies and employees, hosted on platforms like Medium, Notion, GitHub and X to lend credibility. Notably, the group evolved from a December 2024 Web3 'Meeten' video‑call scam identified by Cado Security Labs into a broader and more enduring operation. Attackers initiate contact via Telegram, Discord or X, offering test access to new software in exchange for cryptocurrency payments. Victims receive a registration code to download tailored Windows Electron apps or macOS DMG files. Upon installation, the malware surreptitiously profiles the device, displays a fake Cloudflare verification, and initiates the payload: a stealer or drainer aimed at crypto wallets. ADVERTISEMENT On Windows, the malware utilizes stolen code‑signing certificates, installing an MSI payload that harvests credentials and wallet data. On macOS, variants include the Atomic macOS Stealer, capable of extracting browser cookies, documents, wallet credentials and maintaining persistence via Launch Agents. Darktrace's report highlights the extensive list of fake companies involved: BeeSync, Buzzu, Cloudsign, Dexis, KlastAI, Lunelior, NexLoop, NexoraCore, NexVoo, Pollens AI, Slax, Solune, Swox, Wasper, YondaAI, among others. Victims cross‑checked these brands against polished websites, whitepapers and employee profiles on Notion and GitHub that imitate authentic early‑stage tech companies. Darktrace notes the campaign bears hallmarks similar to that of the traffer group CrazyEvil, known for deploying StealC, AMOS and Angel Drainer malware. While attribution remains unconfirmed, shared evasion techniques and targeting broadly align. Experts have raised concerns about this tactic of 'legitimacy laundering'. The use of compromised X accounts—especially verified ones—with stolen certificates and AI‑generated content underscores a refinement in social engineering methods. Darktrace threat researcher Tara Gould emphasises that this illustrates 'the efforts that threat actors will go to make these fake companies look legitimate'. Emerging trends in the campaign include multi‑platform targeting and increasingly authentic deception. Windows versions show paranoia‑level evasion: they bundle obfuscation, sandbox‑avoidance checks and stolen signing certificates to bypass defences. On the macOS side, apart from AMOS, the infection employs staged shell or bash scripts to install launch‑agents and maintain persistence post‑reboot. This campaign also marks a shift from opportunistic blast‑campaigns to more tailored, lure‑based attacks. Actors undertake reconnaissance—observing target roles in Web3 and crypto—before approaching them via trusted‑looking channels. In some cases, attackers impersonated actual contacts and shared internal presentations to build trust. Security experts stress that safeguarding against such threats requires cautious validation of unsolicited software offers, robust code‑signing certificate vetting, and network segmentation. Users are urged to verify company legitimacy externally—checking domain registrations, team credentials and cross‑referencing claims. Defensive strategies recommended by Darktrace include enhanced telemetry on installation attempts, stricter code‑signing policies, and behavioural detection tuned to recognise post‑installation profiling and exfiltration patterns. For macOS, entry‑point monitoring and examination of Launch Agent activity provide early alerts.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store