United Network has launched its innovative NFC non-custodial card wallet, transforming a traditional bank card into a secure hardware crypto tool. This innovative solution ensures all transactions are secured directly on the chip, providing unparalleled security and ease of use for digital asset management. All private keys are stored only on the card and are never shared with any external devices or services, ensuring a high level of security. The United Network card wallet offers a seamless user experience through its intuitive web interface or mobile application. Users can manage their digital crypto assets with the simplicity of NFC authentication via their smartphone and advancement of hardware wallet, making complex cryptocurrency operations as easy as a tap. The card form factor helps eliminate the complicated usage often associated with traditional hardware wallets, such as the need to connect to a desktop or laptop by cable. The solution was developed according to strict data protection standards. Every device undergoes security testing, so users can be confident their funds are safe, even in case of a card loss. Key Highlights of the United Network Card Wallet: Comprehensive Functionality: Effortlessly send, receive, store, and swap your tokens to any other crypto wallet with just a tap of a card. Card-Sized. Power-Packed: Slides into your wallet like any bank card, offering simple, secure access while keeping private keys fully in the user’s control. Multichain Support: Supports Bitcoin, Solana, Ethereum, BNB Chain, TON, Venom, and Tron from day one, with more chains coming soon. Top-Tier Security: Implements multichain cryptography and standards for robust security.Seamless Web3 Integration: Facilitates effortless authentication into Web3 applications. Flexible White-Label Opportunities: United Network offers customizable solutions for corporate and white-label needs.
Trovata bolsters legacy treasury management offerings with debt and investment instruments, intercompany transactions, in-house bank support, credit facilities, FX hedging, bank fee analysis and bank account management
Trovata announced its acquisition of ATOM, the enterprise Treasury Management System (TMS) developed by Financial Sciences Corporation. This move marks a bold step forward in Trovata’s mission to modernize and democratize treasury technology, unlocking the full capabilities required to serve large global enterprises. With ATOM’s deep treasury feature set—including support for debt and investment instruments, intercompany transactions, in-house bank support, credit facilities, FX hedging, full domestic and international payment workflow, bank fee analysis and bank account management—fully integrated into Trovata’s cloud-native platform, Trovata becomes the first modern, viable TMS alternative to the legacy incumbents. The combined offering delivers unprecedented scale, flexibility, and performance for corporate finance and treasury teams seeking to modernize. Brett Turner, Founder and CEO of Trovata said, “With ATOM, we have the firepower to compete directly with the legacy incumbents—and replace them. This isn’t just expansion. It’s a generational shift in treasury tech.”
Empirical Security combines the power of global threat intelligence with localized, organization-specific insights delivering highly accurate threat prioritization based on the specific context of the organization
Cybersecurity startup Empirical Security raised $12 million in new funding to develop and deploy custom artificial intelligence cybersecurity models tailored to each organization’s unique infrastructure and threat landscape. Empirical’s platform offers dual-model architecture that combines the power of global threat intelligence with localized, organization-specific insights. The models are trained on about 2 million daily exploitation events sourced from internet-scale datasets, while local models are fine-tuned using customer-provided and curated internal data. That, delivers highly accurate threat prioritization based on the specific context of the organization. The approach is designed to allow cybersecurity teams to make faster, evidence-based decisions, backed by predictive models that highlight the most critical vulnerabilities. The idea is that instead of relying on generic risk scores that may not reflect the actual danger to a specific business, the company’s local models provide actionable intelligence customized to a given company’s operational environment. Empirical also emphasizes explainability and decision support as key elements of its platform. The platform gives security leaders the ability to justify their strategies with data by integrating risk-based analysis with measurable prediction outputs. The transparency is especially valuable in boardroom discussions, compliance reporting and budgeting, where clear articulation of cybersecurity priorities is essential.
APIDynamics to support API Security with adaptive MFA, real-time risk scoring, and Zero Trust enforcement, designed for machine-first, cloud-native ecosystems
Tippu Gagguturu, CEO of SecurEnds, has launched APIDynamics, a next-generation API security company designed for machine-first, cloud-native ecosystems. The company addresses the gap between strict controls for user identities and minimal oversight for machine identities, the primary drivers of API traffic. APIDynamics offers real-time protection, adaptive authentication, and MFA for API-to-API communication, securing every API call, including machine-to-machine and non-human interactions. Gagguturu believes static tokens and blind trust are no longer viable with APIs driving AI agents and cloud workflows. The platform empowers security and engineering teams to: Discover and eliminate shadow and zombie APIs across environments; Secure machine-to-machine and non-human identity communications with Zero Trust; Enforce just-in-time, risk-based access policies using adaptive MFA; Integrate seamlessly into modern DevSecOps pipelines without slowing development.
Confident Security offers an end-to-end encryption tool that wraps around foundational models, guaranteeing that prompts and metadata can’t be stored, seen, or used for AI training
Startup Confident Security aims to be “the Signal for AI.” The company’s product, CONFSEC, is an end-to-end encryption tool that wraps around foundational models, guaranteeing that prompts and metadata can’t be stored, seen, or used for AI training, even by the model provider or any third party. The company wants to serve as an intermediary vendor between AI vendors and their customers — like hyperscalers, governments, and enterprises. CONFSEC is modeled after Apple’s Private Cloud Compute (PCC) architecture, which “is 10x better than anything out there in terms of guaranteeing that Apple cannot see your data” when it runs certain AI tasks securely in the cloud. Like Apple’s PCC, Confident Security’s system works by first anonymizing data by encrypting and routing it through services like Cloudflare or Fastly, so servers never see the original source or content. Next, it uses advanced encryption that only allows decryption under strict conditions. Finally, the software running the AI inference is publicly logged and open to review so that experts can verify its guarantees. CONFSEC is also well-suited for new AI browsers hitting the market, like Perplexity’s Comet, to give customers guarantees that their sensitive data isn’t being stored on a server somewhere that the company or bad actors could access, or that their work-related prompts aren’t being used to “train AI to do your job.”
Deutsche Bank goes live with Swift’s new API-driven Instant Cash Reporting (ICR) tool that delivers corporates immediate, on-demand access to real-time account and balance information with a single, standardised connection using ISO 20022 data model
Deutsche Bank has gone live with Swift’s new API-driven Instant Cash Reporting (ICR) tool for accessing real-time account and balance information with a single, standardised connection. As part of Deutsche Bank’s expanding API capabilities, ICR delivers immediate, on-demand financial data access to corporate clients through the Swift infrastructure. Spain-based energy firm Iberdrola is first client to implement ICR in its treasury. Through ICR the bank’s clients can collect real-time account and balance data via a single access point using the ISO 20022 data model and secure JSON format. Swift acts as the central connector, routing API pull requests from corporates to Deutsche Bank. eutsche Bank responds with standardised account data in JSON format, tailored to the corporate’s selected accounts or full account set, based on the associated Swift BIC. Johnny Grimes, head, corporate ash product, Deutsche Bank, says: “ICR addresses the key demand of corporates for multi bank solutions and consistent standards in the API space to simplify adoption.” ICR is currently accessible to Swift-connected corporates and financial institutions. Deutsche Bank says it welcomes other banks and corporates joining initiative to support scaling up the usage of multi-bank API solutions.
Tapjacking and the TapTrap threat lets an app without any permissions at all can abuse screen animations to open another screen without the user knowing, turn it invisible, and get them to unknowingly click on a permission prompt
Philipp Beer, Marco Squarcina and Martina Lindorfer, researchers from the Security and Privacy Group at TU Wien Informatics in Austria, and Sebastian Roth from the University of Bayreuth in Germany, have revealed with their research into Tapjacking and the TapTrap threat. In developing TapTrap, the researchers have demonstrated how an app without any permissions at all can abuse screen animations to open another screen without the user knowing, turn it invisible, and get them to unknowingly click on a permission prompt. This method of executing a transparent action with an invisible malicious one underneath is new and dangerous. Whereas, ordinarily, when the screen changes in Android, you would expect to see an animation, maybe a sliding or fading effect at one screen changes to another, a TapTrap attack can make the new screen “fully transparent, keeping it hidden from you,” the researcher said. “Any taps you make during this animation go to the hidden screen,” they continued, “not the visible app.” The app could then get you to tap areas of the screen that “correspond to sensitive actions on the hidden screen,” the researchers explained, “allowing it to perform actions without your knowledge.” Actions like, for example, enabling the device administrator permission, which can let an app remotely wipe your phone.
Infobip taps NumHub’s API-driven cloud-based SaaS tech to offer Branded Calling ID (BCID) solution that integrates Rich Call Data (RCD) and FCC-mandated auth by streamlining all aspects of BCID registration, onboarding, vetting, billing, and reporting
Infobip has expanded its partnership with NumHub, to offer Branded Calling ID™ (BCID) as part of their Voice product solution. Infobip has adopted NumHub’s API-driven cloud-based SaaS solution streamlining all aspects of BCID registration, onboarding, vetting, billing, and reporting. As a valued partner, Infobip will engage enterprise businesses, empowering them to own their brand identity through the platform’s simplified BCID adoption process. This development comes at a crucial time, aligning with the FCC’s Eighth Report and Order, which encourages the industry to proactively implement Rich Call Data display with branded calling solutions that are supported in the mandated STIR/SHAKEN framework. “Branded calling helps businesses to improve answer rates and ROI, while keeping customer satisfaction at the forefront of each interaction,” said Ivan Ostojić, Chief Business Officer at Infobip. Branded Calling ID (BCID) is an industry-adopted, CTIA-governed framework designed to restore trust in phone calls by enabling verified businesses to display their brand name, logo, call reason, and number directly on consumer devices. BCID integrates Rich Call Data (RCD) and Internet Engineering Task Force (IETF) FCC-mandated STIR/SHAKEN authentication, ensuring that only legitimate, authenticated and vetted businesses can display branded caller ID information. By leveraging cryptographic signatures and industry-standard governance, BCID protects businesses from spoofing, enhances call answer rates, and ensures consumers can confidently identify and engage with trusted brands. Unlike traditional branded calling models that operate under vendor-controlled ecosystems, BCID is an open, standardized solution built to serve the entire telecom industry including enterprises, CSPs, OSPs, UCaaS/CCaaS providers, and consumers.
YELO Software’s AI-driven private markets intelligence platform delivers accurate, CRM-ready contact data across private equity and portfolio decision-makers and a dynamic map of firms, sectors, and interconnections to reveal hidden investment opportunities
YELO Software, has launched its full-service offerings alongside YELOsphere Connect the first module of its proprietary, AI-driven private markets intelligence platform designed to help teams identify and connect with key players across private equity and portfolio companies. Private equity teams work in high-stakes, low-visibility environments. YELOsphere is built to change that — delivering verified data, strategic insights, and AI-driven foresight in three stages: 1) YELOsphere Connect (Live) – Accurate, CRM-ready contact data on PE and portfolio decision-makers. 2) YELOsphere Insights (2025) – A dynamic map of firms, sectors, and interconnections to reveal hidden opportunities. 3) YELOsphere Analytics (In development) – Interactive dashboards and predictive strategy tools, powered by AI. YELOsphere Connect enables investment and marketing teams to move faster with cleaner, more actionable data, powered by smart automation and AI-driven data validation. Continuously validated contacts across PE firms and portco executive roles; Smart filters by firm, title, sector, and investment profile; Decision-grade contact intelligence across investors and operators; Built to move teams from research to outreach, faster.
With Perplexity’s new web browser a user can directly ask which website ships faster than others; it can also submit relevant responses to different types of questions after assessing multi-site information on its own
Perplexity recently announced the launch of Comet, a web browser built for the modern internet which, aims to be a more responsive and fluid option for modern internet users. Comet, serves to be an intelligent interface that works in tune with the user’s mind. It helps ease the challenges of switching between dozens of sites, applications and website to create a more seamless experience. The Comet intelligent assistant allows a user to focus on what really matters while taking care of actual browsing sessions. For instance, a user can directly ask Comet which website provides the ability to ship something they need faster than others. It can also connect the dots and submit relevant responses to different types of questions after assessing multi-site information on its own. Comet does away with complex workflows. Instead of simply searching for information, Comet allows users quick analysis at their fingertips and makes the internet an extension of their mind. One of the best things about Comet: accurate and trustworthy responses. Comet allows users to do a range of things at a faster pace than before, from compare insurance coverage plans to analyzing which technology is best to invest in for a business.