Latest news with #Rust


Mint
4 days ago
- Business
- Mint
‘We lost our jobs overnight': Techie's Reddit post goes viral after sudden shutdown
Imagine showing up for work thinking it's just another regular day, only to walk out unemployed by lunchtime. That's exactly what happened to 19 employees at a tech startup that shut down without warning, leaving its staff stunned and jobless. A Reddit post titled 'Our startup shut down overnight—19 of us lost our jobs' has struck a chord with thousands online. Shared by a now-former employee, the post details how the team learned—through an urgent all-hands meeting—that the company had run out of funds and would be shutting down with immediate effect. 'It was supposed to be just another normal workday,' the Reddit user wrote. 'But around midday, we all got an unexpected email from the CEO calling for an urgent all-hands meeting.' The mood quickly shifted from business-as-usual to disbelief. According to the post, the CEO informed employees that all investors had pulled out, and there was no money left, even for salaries. The company would cease operations immediately. 'We wouldn't be getting paid this month, and effective immediately, the company was shutting down… Just like that, a four-year-old startup was gone.' What's shocked many online is the lack of warning. There were no prior signs, no layoffs, no bridge funding plans, just a sudden collapse. 'It still hasn't fully sunk in. We had our struggles, sure, but there was no communication that we were in real trouble,' the user added. The anonymous poster, who says they worked in Rust programming for the past eight months, also used the platform to seek support, resume reviews, and job leads. 'I'm posting this partly to process everything, and partly to hear from others who've gone through something similar.' The post quickly gained traction, with thousands of upvotes and hundreds of comments from users expressing sympathy, sharing advice, and even offering job referrals. While the glamour of startup culture often dominates headlines, flexible hours, bean bags, and unicorn valuations, this post is a sobering reminder of its unpredictability. Behind the scenes, startups often operate with tight runway margins, investor pressures, and limited safety nets for employees. With India and the global tech ecosystem experiencing a wave of layoffs and shutdowns post-pandemic and amid a funding winter, stories like this are becoming alarmingly common. For many, the Reddit post serves as a wake-up call. 'I was exactly in this situation last month. I know how overwhelming it feels right now. Take some time to process it. Reach out to HR, they probably know people with openings for your experience, although chances might be small. Update your profiles, have some open source projects you can showcase on github. Keep applying.,' one commenter advised. Another user advised, 'Notch up your skills and also start preparing for interviews. Actual work and clearing interview are two different things. So focus more on interview prepration. Ask AI to make mock interviews for you and dedicate max time in interview preparation alongside keep applying. Cold mail HR ( get emails from linkedin ) 3-4 time a week to same HR. Daily 15 mails.' While the CEO reportedly promised to use his network to help the team find new roles, the employees were left questioning the lack of transparency that led to this sudden closure.

Miami Herald
6 days ago
- Business
- Miami Herald
Nvidia-backed stock sinks on unexpected deal
I am deeply skeptical about AI, but even more so about crypto. best explains it: "A thriving market for magic beans doesn't make the magic beanstalk real." That is not a random website, but one related to the Rust programming language, probably the most popular one used in crypto-related companies. Predicting the future of any tech bubble is difficult, but sometimes it isn't necessary. Related: Analysts raise Micron stock price target, send warning The key is having a flexible tech stack that enables the company to pivot quickly to another market. Just think of Nvidia, which used the gaming boom to switch to the crypto boom, to quickly switch to the artificial intelligence hype train. You can't be sure when the bubble will burst, but you must be ready. Nvidia isn't the only one that pivoted from crypto to AI. Another is Atlantic Crypto Corporation. It used to mine crypto before changing its name to Coreweave and switching to a cloud computing and AI training business. Erik Isakson/Tetra Images via Getty Images CoreWeave's (CRWV) business model allows businesses to remotely "rent" its Nvidia GPUs for AI training. Nvidia's reliance on CoreWeave cards is probably why Nvidia owns roughly 5% of CoreWeave. The relationship seems to give CoreWeave certain market privileges, so it wasn't surprising when CoreWeave announced on July 3 that it is the first AI cloud provider to deploy the latest NVIDIA GB300 NVL72 cards. Compared to the previous generation of NVIDIA Hopper architecture, the chips offer a huge performance and power efficiency jump for AI reasoning and agentic workloads. Related: Analyst sends Alphabet warning amid search market shakeup Growing demand for AI training led CoreWeave to expand its deal with OpenAI in Q1, bringing the total contract value to $15.9 billion. The company expects total revenue of $4.9 billion to $5.1 billion in 2025. However, capital expenditures could reach $23 billion. Bank of America analysts recently downgraded CoreWeave's stock rating, arguing there is less room for shares to head higher. CoreWeave announced on July 7 that it will acquire Core Scientific (CORZ) in an all-stock transaction. Core Scientific is another crypto mining company known for "digital mining at scale." So, perhaps merging with a company that offers AI training and has the same roots makes sense. The merger deal is valued at approximately $9 billion. CoreWeave argues the deal will help verticalize its data center footprint, ensuring additional revenue growth. More AI Stocks: Veteran fund manager raises eyebrows with latest Meta Platforms moveGoogle plans major AI shift after Meta's surprising $14 billion moveAnalysts revamp forecast for Nvidia-backed AI stock Core Scientific stockholders will receive 0.1235 newly issued shares of CoreWeave stock for each share of Core Scientific stock based on a fixed exchange ratio. If the deal gets finalized, CoreWeave expects Core Scientific's stockholders' ownership of the combined company to be less than 10%. CoreWeave will acquire 1.3 GW of gross power across Core Scientific's national data center footprint, with an incremental 1 GW+ of potential gross power available for expansion. Benefits of this deal include: Cost savings through streamlining business operations and eliminating lease control over the power footprint and possibility for future power of over $10 billion of cumulative future lease overhead to be paid for existing contractual sites over the next 12 to repurpose toward high-performance computing Because this deal is an all-stock transaction, it will dilute CoreWeave's existing shareholders by reducing their ownership percentage. Core Scientific shareholders will also hold a much smaller percentage of the combined company. CoreWeave and Core Scientific shares tumbled on the announcement. At last check, CRWV shares were trading 3% lower near $160, and CORZ 17% lower near $15. Related: Oracle CEO sends blunt 2-word message on its business The Arena Media Brands, LLC THESTREET is a registered trademark of TheStreet, Inc.


Time of India
6 days ago
- Entertainment
- Time of India
ZChum gets banned mid-subathon over alleged Twitch drops farming violation, loses 288 hours of VODs
In a surprising turn of events, popular Twitch streamer ZChum was hit with a sudden platform ban right in the middle of a highly anticipated week-long subathon. The ban, issued for 'rebroadcasting VODs to farm Twitch drops,' wiped out over 280 hours of footage and left fans both confused and furious. Tired of too many ads? go ad free now What Triggered the Ban? ZChum was running a Rust subathon with fellow streamer OmidLive, operating in shifts to keep the stream live around the clock. They played, slept, and streamed every moment, claiming they only went offline for basic hygiene and meals. Everything seemed within Twitch's terms, until it wasn't. On July 5, Twitch suddenly hit ZChum with a suspension citing 'rebroadcasting VODs to farm Twitch drops.' The accusation? Fake engagement. 'We Never Looped VODs' ZChum quickly took to X (formerly Twitter) to challenge Twitch's decision. According to him, there were no loops, no fake streams, and definitely no shady tactics. 'We didn't loop any VODS, we have always been on camera….,' he wrote. He also revealed that their subathon began a full week before the Rust Twitch Drops campaign even started. The timing, he says, was purely coincidental. 288 Hours — Just Gone Possibly the most brutal consequence? A massive chunk of the stream's history—288 hours of VODs—was completely wiped. These weren't just casual streams. Viewers had donated thousands to keep the subathon going. And now, nearly all that content? Gone without a trace. Only one VOD, lasting 46 hours, remains visible on his channel. Fans and Creators React The ban sparked immediate backlash online. Many creators pointed out how unclear Twitch's automated moderation can be, especially during Twitch Drop campaigns when viewership spikes and strict rules kick in. Tired of too many ads? go ad free now Several questioned how streamers are supposed to plan legitimate long-format content without accidentally triggering Twitch's moderation bots. Back Online, But Not Without Damage Though ZChum's Twitch account was eventually restored and the subathon resumed, the damage was already done. Lost content, lost trust, and a major disruption in one of his most ambitious events to date. Twitch, as usual, hasn't commented on the specifics—adding to growing frustrations about transparency and consistency in enforcement. The Bigger Question ZChum's case raises a much larger issue: Can creators safely run long-format, collaborative subathons during Twitch Drop events without risking a ban? Right now, the answer seems unclear—and streamers are watching closely.


Daily Mail
6 days ago
- Entertainment
- Daily Mail
Former Nickelodeon star is now unrecognizable two decades after he starred on the network
A former Nickelodeon child star is now completely unrecognizable, more than two decades after he starred on the network. Devon Werkheiser was skyrocketed into the spotlight when he was cast in Ned's Declassified School Survival Guide at only 12 years old. The show, which premiered in 2004 and went on for three seasons before concluding in 2007, focused on Devon's character Ned Bigby as he created a guide to help middle school students survive. It was a massive success and a huge staple in many people's childhoods, launching Devon into a huge star at a very young age. But now, 22 years after it premiered, Devon, 34, looks completely different from his Nickelodeon days. He's certainly all grown up, and he was recently spotted with a scruffy beard and mustache. Before starring in Ned's Declassified, Devon had small roles in the war film We Were Soldiers and the TV movie Recipe for Disaster. But his big break came when he acted in the beloved Nickelodeon series from 2004 until 2007. After that, his career took off. He went on to land roles in the comedy film The Prankster, the thriller Beneath the Darkness, horror flick The Wicked, psychological thriller California Scheming, ABC Family series Greek, and crime drama Crown Vic. Most recently, he starred in the controversial western film Rust, the movie in which Alec Baldwin tragically shot and killed cinematographer Halyna Hutchins. In addition to acting, Devon launched his own podcast with his former Ned's Declassified costars Lindsey Shaw and Daniel Curtis Lee called Ned's Declassified Podcast Survival Guide in 2023. It features them re-watching the show from start to finish while discussing the episodes together and reminiscing about their time on the show. He has also dabbled in music, releasing three EPs from 2013 to 2020. In addition, he dropped an EP under the name Good/Vlly in 2023 that had a more electronic sound than his past music. Last year, Devon became embroiled in scandal after he, along with Lindsey, and Daniel, appeared to make light of Drake Bell's claims that he was sexually abused during his years on Nickelodeon. Drake alleged that he was the victim of 'unspeakable' and 'brutal' sexual abuse at the hands of his former dialogue coach Brian Peck in the docuseries Quiet on Set: The Dark Side of Kids TV. The trio was seen laughing as they declared how their 'set was not like that' during a TikTok live. 'Daniel, we told you never to speak about that. Get back in your hole, Daniel, and give me your holes,' Devon quipped, before immediately backpedaling on the insensitive remark. 'Sorry, we shouldn't joke about this. We really shouldn't.' Drake slammed the stars afterwards, writing, 'Ned's Declassless… this is wild… laugh it up guys… laugh it up… "Give me your h*les?!" Really?!' The trio went on to issue an apology, claiming the comments had been taken out of context. 'If you haven't seen the clip, if you haven't seen what's going on, we were on a TikTok Live being asked to comment on the Quiet on Set documentary, which we hadn't seen, and a super s**t joke came out that was referenced at Daniel and looked like I was talking about Drake,' Devon explained. 'We f**ked up. I get it. We hadn't seen the doc and everyone was asking us for our opinions on it.' The actor later admitted that he 'felt like a piece of s**t' after the Drake & Josh star called them 'declassless' and slammed them for 'laughing' at his trauma. 'I know it looks like I'm laughing at this and I f**king wasn't, but I know what it looks like, and that Drake saw it … yeah,' he clarified. 'I just felt so f**king awful, knowing that Drake saw us in that context.'


Biz Bahrain
6 days ago
- Business
- Biz Bahrain
Inside FunkSec: Kaspersky explores the evolution of AI-powered ransomware with password-gated capabilities
Kaspersky experts revealed the inner workings of FunkSec — a ransomware group that illustrates the future of mass cybercrime: AI-powered, multifunctional, highly adaptive and operating on volume with ransoms as low as $10,000 to maximize profits. Kaspersky's Global Research and Analysis Team (GReAT) constantly monitors the ransomware threat landscape, where attacks continue to rise. According to the company's latest State of Ransomware report, the share of users affected by ransomware attacks worldwide increased to 0.44% from 2023 to 2024, up by 0.02 percentage points. While this percentage may appear modest compared to other cyber threats, it reflects the fact that attackers typically prioritize high-value targets rather than mass distribution, making each incident potentially devastating. Within this evolving landscape, FunkSec has emerged as a particularly concerning threat. Active for less than a year since its emergence in late 2024, FunkSec has quickly surpassed many established actors by targeting government, technology, finance and education sectors. What sets FunkSec apart is its sophisticated technical architecture and AI-assisted development. The group packages full-scale encryption and aggressive data exfiltration into a single Rust-based executable, capable of disabling over 50 processes on victim machines and equipped with self-cleanup features to evade defenses. Beyond its core ransomware functionality, FunkSec has expanded its toolkit to include a password generator and a basic DDoS tool — both showing clear signs of code synthesis using large language models (LLMs). FunkSec's approach reflects the evolving landscape of mass cybercrime, combining advanced tools and tactics. Kaspersky's GReAT experts highlight the key features that define their operations: Password-Controlled Functionality GReAT experts discovered that FunkSec ransomware features a unique password-based mechanism that controls its operation modes. Without a password, the malware performs basic file encryption, while providing a password activates a more aggressive data exfiltration process in addition to encryption to steal sensitive data. FunkSec packs full-scale encryption, local exfiltration and self-cleanup into a single Rust binary—without a side-loader or a companion script. That level of consolidation is uncommon and gives affiliates a plug-and-play tool they can deploy almost anywhere. Use of AI in development Code analysis shows that FunkSec is actively using generative artificial intelligence to create its tools. Many parts of the code seem to be automatically generated rather than manually written. Signs of this generic placeholder comments (such as 'placeholder for actual check') and technical inconsistencies, like commands for different operating systems that don't align properly. Additionally, the presence of declared but unused functions—such as modules included upfront but never utilized — reflects how large language models combine multiple code snippets without pruning redundant elements. 'More and more, we see cybercriminals leveraging AI to develop malicious tools. Generative AI lowers barriers and accelerates malware creation, enabling cybercriminals to adapt their tactics faster. By reducing the entry threshold, AI allows even less experienced attackers to quickly develop sophisticated malware at scale,' comments Marc Rivero, Lead Security Researcher at Kaspersky's GReAT. High-volume, low-ransom strategy FunkSec demands unusually low ransom payments, sometimes as little as $10,000, and pairs this with the sale of stolen data at discounted prices to third parties. This strategy appears designed to enable a high volume of attacks, helping the group quickly establish its reputation within the cybercriminal underground. Unlike traditional ransomware groups that seek million-dollar ransoms, FunkSec employs a high-frequency, low-cost model — further underscoring its use of AI to streamline and scale operations. Expands beyond ransomware FunkSec has expanded its capabilities beyond the ransomware binary. Its dark leak site (DLS) hosts additional tools, including a Python-based password generator designed to support brute-force and password-spraying attacks, as well as a basic DDoS tool. Advanced evasion FunkSec employs advanced evasion techniques to avoid detection and complicate forensic analysis. The ransomware is capable of stopping over 50 processes and services to ensure thorough encryption of targeted files. Additionally, it includes a fallback mechanism to execute certain commands even if the user launching FunkSec lacks sufficient privileges. Kaspersky's products detect this threat as HEUR: To stay protected from ransomware attacks, Kaspersky experts recommend organizations follow these best practices to safeguard from ransomware: • Enable ransomware protection for all endpoints. There is a free Kaspersky Anti-Ransomware Tool for Business that shields computers and servers from ransomware and other types of malware, prevents exploits and is compatible with already installed security solutions. • Always keep software updated on all the devices you use to prevent attackers from exploiting vulnerabilities and infiltrating your network. • Focus your defense strategy on detecting lateral movements and data exfiltration to the internet. Pay special attention to outgoing traffic to detect cybercriminals' connections to your network. Set up offline backups that intruders cannot tamper with. Make sure you can access them quickly when needed or in an emergency. • Install anti-APT and EDR solutions, enabling capabilities for advanced threat discovery and detection, investigation and timely remediation of incidents. Provide your SOC team with access to the latest threat intelligence and regularly upskill them with professional training. All of the above is available within Kaspersky Expert Security framework. • Use the latest Threat Intelligence information to stay aware of the actual Tactics, Techniques, and Procedures (TTPs) used by threat actors. • To protect the company against a wide range of threats, use solutions from Kaspersky Next product line that provide real-time protection, threat visibility, investigation and response capabilities of EDR and XDR for organizations of any size and industry. Depending on your current needs and available resources, you can choose the most relevant product tier and easily migrate to another one if your cybersecurity requirements are changing.