The Tech Brunch The Tech Brunch

The Tech Brunch

The Tech Brunch

  • Home
  • Startups
  • Social
  • Enterprise
  • Gadgets
  • Greentech
  • Mobile
  • Fundings and exits
The Tech BrunchThe Tech Brunch
  • Startups
  • Social
  • Enterprise
  • Gadgets
  • Greentech
  • Mobile
  • Fundings and exits
Home > Social > Decrypted: Police hack criminal phone network; Randori raises $20M Series A
Social

Decrypted: Police hack criminal phone network; Randori raises $20M Series A

Published: Apr 13, 2022

Last week was, for most Americans, a four-day work week. But a lot still happened in the security world.

The U.S. government’s cybersecurity agencies warned of two critical vulnerabilities — one in Palo Alto’s networking tech and the other in F5’s gear — that foreign, nation state-backed hackers will “likely” exploit these flaws to get access to networks, steal data or spread malware. Plus, the FCC formally declared Chinese tech giants Huawei and ZTE as threats to national security.

Here’s more from the week.


THE BIG PICTURE

How police hacked a massive criminal phone network

Last week’s takedown of EncroChat was, according to police, the “biggest and most significant” law enforcement operation against organized criminals in the history of the U.K. EncroChat sold encrypted phones with custom software akin to how BlackBerry phones used to work; you needed one to talk to other device owners.

But the phone network was used almost exclusively by criminals, allowing their illicit activities to be kept secret and go unimpeded: drug deals, violent attacks, corruption — even murders.

That is, until French police hacked into the network, broke the encryption and uncovered millions of messages, according to Vice, which covered the takedown of the network. The circumstances of the case are unique; police have not taken down a network like this before.

But technical details of the case remain under wraps, likely until criminal trials begin, at which point attorneys for the alleged criminals are likely to rest much of their defense on the means — and legality — in which the hack was carried out.

You Might Also Like

Bootstrapping vs VC Funding Startups: Pros, Cons, Real Guide

Stages of Funding in Venture Capital: Metrics, Terms, and Startup Playbooks

Green Hydrogen vs Blue Hydrogen: Key Differences and Cost

How to Disable Startup Programs on Windows and Mac

Previous Article Rallyhood exposed a decade of users’ private data Rallyhood exposed a decade of users’ private data
Next Article TikTok faces ban in the US; pulls out of Hong Kong TikTok faces ban in the US; pulls out of Hong Kong

Latest News

Bootstrapping vs VC Funding Startups: Pros, Cons, Real Guide
Startups Apr 01, 2026
Stages of Funding in Venture Capital: Metrics, Terms, and Startup Playbooks
Fundings and exits Mar 19, 2026
Green Hydrogen vs Blue Hydrogen: Key Differences and Cost
Greentech Mar 06, 2026
How to Disable Startup Programs on Windows and Mac
Startups Feb 23, 2026
Best Smart Gadgets for a Safe and Easy Home
Gadgets Feb 04, 2026
How to Use LinkedIn for Professional Networking: Simple Tips for Beginners
Social Feb 04, 2026
Top 7 Best Smartphones Under 30000 with Good Camera and Battery
Mobile Jan 30, 2026
Venture Debt vs Venture Capital: Which Is Better for Startups?
Fundings and exits Jan 30, 2026
Enterprise AI Adoption Trends 2026: How Businesses Are Using AI to Stay Ahead
Enterprise Jan 06, 2026
How to Measure Carbon Footprint with AI Technology
Greentech Jan 06, 2026
about us

  • Startups
  • Social
  • Enterprise
  • Gadgets
  • Greentech
  • Mobile
  • Fundings and exits
How To Improve Mobile Battery Life
How To Improve Mobile Battery Life
Mobile May 06, 2025
Innovative Greentech Companies In India 2025
Innovative Greentech Companies In India 2025
Greentech May 06, 2025

© Copyright 2026 thetechbrunch.com All Rights Reserved.

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms And Conditions