Why SoftBank's fresh $40B loan indicates a 2026 OpenAI IPO

Why SoftBank’s fresh $40B loan indicates a 2026 OpenAI IPO

SoftBank has secured a new loan amounting to $40 billion to finance its $30 billion pledge to invest in OpenAI, part of the AI developer’s unprecedented $110 billion fundraising last month, the Japanese firm announced on Friday.

Notably, the loan is unsecured and has a term of 12 months, implying it must be paid back or refinanced by the next year. This may suggest that lenders expect OpenAI’s much-anticipated public offering will materialize later this year, as some sources, including CNBC, have indicated. JPMorgan Chase, Goldman Sachs, and four Japanese banks are facilitating the loan.

If OpenAI’s IPO turns out to be one of the largest in history this year, it would likely provide SoftBank with the necessary liquidity to address the debt within such a brief timeframe. With its latest $30 billion investment in OpenAI, SoftBank’s total investment in the creator of ChatGPT exceeds $60 billion.

Memory chip leader SK hynix might assist in concluding 'RAMmageddon' with a significant US IPO.

Memory chip leader SK hynix might assist in concluding ‘RAMmageddon’ with a significant US IPO.

SK hynix, a leading South Korean memory chip manufacturer already traded on the KOSPI, is preparing for a potential listing in the U.S. that could reportedly bring in approximately $10 billion to $14 billion.

This week, the company revealed that it has confidentially submitted a Form F-1 for the listing, with a focus on the latter half of 2026.

However, the key issue isn’t merely the amount it can generate: it’s whether a U.S. listing could enhance its trading value as one of the most vital players in the AI chip supply chain.

Despite its significant contribution to high-bandwidth memory (HBM), a critical element supporting AI technologies from firms like Nvidia, the stock has previously been trading at a lower valuation compared to global competitors, based on insights from a Seoul-based semiconductor analyst. While its market capitalization stands at around $440 billion, the valuation multiples are still below those of U.S.-listed semiconductor companies, raising concerns over whether geographic location, rather than actual business fundamentals, is influencing this disparity.

This action is widely regarded as an endeavor to elevate its valuation to align more closely with global counterparts such as Micron.

“SK hynix’s U.S. listing could aid in rectifying a persistent valuation gap with global rivals. Even with production capacity comparable to – or in some sectors superior to – U.S.-based chipmakers, the Korean firm has historically been undervalued, partly due to its primary listing being in Korea,” the analyst commented to TechCrunch.

The analyst also pointed out structural elements influencing the deal. “SK Square, the largest shareholder of SK hynix, holding 20.07% as of December 2025, is mandated to retain at least a 20% stake according to Korea’s holding company laws.”

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

According to current share prices, issuing around 2% in new shares could generate $10 billion to $14 billion while allowing SK Square to uphold its ownership requirement, as stated by the analyst. (Under Korea’s Fair Trade Act, holding companies must maintain minimum ownership levels in subsidiaries, at least 20% for listed companies, to keep control.)

There exists a precedent. Taiwan Semiconductor Manufacturing Company (TSMC), for instance, has experienced instances where its U.S.-listed shares traded at a premium over its domestic shares, especially during times of elevated AI demand, indicating that cross-listing can affect investor pricing of the same underlying business.

This initiative is already causing ripples throughout the broader Korean chip landscape. After SK hynix’s filing, some investors are advocating for Samsung Electronics to contemplate a similar U.S. listing. Artisan Partners, a significant shareholder, mentioned on Friday that a U.S. listing (technically termed an American depositary receipt, or ADR) could also enhance Samsung’s valuation and provide U.S. retail investors the opportunity to purchase its stock, according to a Bloomberg report.

A capital push to meet AI-driven demand

SK hynix’s planned ADR listing is also largely interpreted as a strategy to secure funding ahead of boosted capital expenditures to satisfy the growing demand for memory from AI semiconductors.

During its annual general meeting on March 25, CEO Noh-Jung Kwak stated that financial capacity will be crucial for maintaining growth in the AI age, adding that the company aims for around $75 billion (over 100 trillion KRW) in net cash to support long-term investments.

Rising costs for memory and constrained supply have been key factors hindering AI development, as well as affecting other sectors, such as gaming. This phenomenon has been referred to as “RAMmageddon” and is anticipated to persist until at least 2027, as reported by Nature.

Only time will reveal if this bleak prediction materializes. Tech giants are pursuing solutions to RAMmageddon beyond just increased manufacturing. For example, Google unveiled a new technology this week called TurboQuant, an ultra-efficient AI memory compression algorithm, which significantly enhances AI’s efficiency in memory usage.

Nevertheless, the indications suggest that additional memory production will be necessary. SK hynix is preparing for an influx of capital-intensive initiatives, intending to invest roughly $400 billion by 2050 to establish a semiconductor cluster in Yongin, South Korea. The company is also in the process of developing new facilities in South Korea and Indiana, with intended investments of about $25 billion and $3.3 billion, respectively, highlighting the extensive capital needed.

The chipmaker announced this week that it plans to acquire advanced extreme ultraviolet (EUV) lithography scanners from ASML by 2027 in a deal valued at $7.9 billion, aimed at boosting HBM production for AI.

All of this would be facilitated by a remarkable U.S. IPO. This could inspire other Korean chip manufacturers to follow suit.

Waymo’s soaring passenger numbers illustrated in a single chart

Waymo’s soaring passenger numbers illustrated in a single chart

Waymo is currently offering 500,000 paid robotaxi rides weekly across 10 U.S. cities, as stated by the company in a post on X this week. This impressive figure highlights the accelerated commercial growth of the Alphabet-owned firm. However, it is Waymo’s expansion in ridership and markets that presents a more intriguing narrative. 

In under two years, the company’s average weekly paid robotaxi rides have surged tenfold, increasing from 50,000 in May 2024 to 500,000 today. During the same two-year period, Waymo has broadened its presence from its original markets of Phoenix, San Francisco, and Los Angeles to include Austin, Atlanta, Miami, Dallas, Houston, San Antonio, and Orlando. All seven of these Sun Belt cities were added in just the past year.

Waymo’s robotaxi fleet has also expanded, although the company has been reticent about the specifics and infrequently provides updates. Information shared in December 2025 with the National Highway Traffic Safety Administration (NHTSA) indicated the company operated 3,067 robotaxis equipped with its fifth-generation self-driving system. The company continues to use that “over 3,000” fleet count today. This may soon change with the rollout of its sixth-generation self-driving system, set to launch on the Zeekr minivan, dubbed Ojai, and the Hyundai Ioniq 5. 

The consistent fleet figure of around 3,000, coupled with the rising number of weekly paid rides, implies that Waymo is maximizing efficiencies with each robotaxi. This utilization metric is especially crucial, as empty Waymo vehicles wandering around San Francisco or other locations do not generate revenue and can exacerbate congestion. 

However, this growth comes with hurdles. Waymo has faced increased scrutiny recently from both the public and regulatory bodies. For example, the NHTSA and the National Transportation Safety Board are investigating the misconduct of Waymo robotaxis around school buses. Simultaneously, San Francisco city officials have expressed concerns regarding how the company manages robotaxis that become stuck, including instances where Waymo has employed police and firefighters to assist in clearing its vehicles.

Waymo’s ridership numbers still represent a small fraction of Uber’s human-driven ride-hailing operations. According to securities filings, Uber completed approximately 13.5 billion trips in 2025, encompassing both ride-hailing and delivery services. The closest comparable ride-hail statistic was disclosed during Uber’s August 2024 earnings call, where the company reported completing over 1 million mobility trips per hour.

In essence, Waymo has not yet begun to significantly challenge Uber.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Nonetheless, with each passing month, the company’s lead in robotaxi rides continues to widen. 

Several firms are competing for a piece of the robotaxi market, though many have not yet introduced a fully autonomous ride-hailing service that charges fees. While there are some Chinese robotaxi companies like Pony.ai and WeRide that do charge for rides, none operate within the United States.

Tesla initiated a paid robotaxi service in Austin in January, and although CEO Elon Musk has claimed the company is close to a fully autonomous ride-hailing service in California, it currently lacks the necessary permits. Other companies, including Avride, Hyundai-owned Motional, and Zoox, are all striving to launch paid robotaxi services in various regions by the year’s end.

All of them have considerable ground to cover.

European Commission verifies cyberattack following hackers' assertion of data breach

European Commission verifies cyberattack following hackers’ assertion of data breach

The leading executive arm of the European Union has acknowledged a cyber intrusion after reports indicated that hackers have pilfered extensive data from its cloud storage.

European Commission representative Nika Blazevic informed TechCrunch on Friday that the Commission “identified a cyber-attack, which impacted a portion of our cloud infrastructure.”

“We have swiftly acted and contained the attack. Risk reduction measures have also been put into place. The investigation is ongoing, but we can already confirm that the internal systems of the Commission were not compromised during the cyber-attack,” the spokesperson stated.

In a more detailed announcement on its website, the Commission noted that the breach “impacted its cloud infrastructure that supports the Commission’s web presence on the Europa.eu platform,” which contains a significant amount of the Commission’s website data. 

Bleeping Computer was the first to report the breach on Friday, referencing sources familiar with the situation. The publication indicated that hackers had appropriated hundreds of gigabytes of data, including several databases, from the European Commission’s account on the cloud service provider Amazon Web Services. The hacker shared evidence of their access with the publication, including screenshots.

It remains unclear what specific types of data were compromised.

Aetherflux is said to be securing Series B funding at a valuation of $2 billion.

Aetherflux is said to be securing Series B funding at a valuation of $2 billion.

Aetherflux, the space solar energy company founded by Robinhood’s co-founder Baiju Bhatt, is negotiating to secure $250 million to $350 million for a Series B round that would assign a $2 billion valuation to the firm.

This fundraising effort was initially reported by The Wall Street Journal, indicating that Index Ventures is spearheading the initiative. Aetherflux has raised approximately $80 million since its inception in 2024. The company chose not to provide comments.

Recently, Aetherflux has redirected its focus, steering its power generation technology toward space data centers, moving away from its original goal of transmitting electricity to Earth via lasers. Various space firms like SpaceX, Blue Origin, Starcloud, among others, are also innovating new frameworks for distributed computing in outer space.

“Let it be noted that we never lifted our pivot foot — it wasn’t a travel,” Bhatt humorously remarked in a TechCrunch interview last week. “About a year ago, it became clear that to power AI using the tech we envisioned, it would be significantly better to place the chips in space instead of beaming power from space to a land-based data center.”

While the company intends to persist with its laser power transmission experiments on a satellite bus created by Apex Space, its debut data center satellite is anticipated to launch in 2027. “Our objective is to develop a solution that competes with terrestrial economics,” Bhatt stated.

It won’t be straightforward.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Rivian secures an additional $1B from Volkswagen

Rivian secures an additional $1B from Volkswagen

The winter testing phase has been finalized for the VW ID.EVERY1, marking the inaugural vehicle from a collaboration between Rivian and Volkswagen Group that incorporates the EV manufacturer’s software and electrical framework. This achievement not only signifies a step closer to delivering this vehicle to consumers; it also triggers an additional $1 billion investment from Volkswagen Group into Rivian.

Approximately $750 million will be in the form of an equity investment. The remaining $250 million may either be equity or convertible debt, contingent on the prototypes that Volkswagen Group supplied to Rivian for evaluation. (The specifics were not immediately clarified by the companies.)

The German automotive powerhouse has previously injected over $3 billion into Rivian as part of this joint endeavor. Furthermore, additional funds are on the horizon. Starting in October, Rivian will have the opportunity to borrow up to $1 billion from Volkswagen Group. After the initial vehicle utilizing the joint venture’s technology is made available for purchase, Rivian will receive an extra $460 million in equity investment from Volkswagen. Overall, this agreement could potentially amount to as much as $5.8 billion for Rivian.

The payment for reaching the winter testing milestone has been processed just a few months ahead of Rivian commencing sales of the R2 SUV, which founder and CEO RJ Scaringe has described as “perhaps the most significant product we’ve launched thus far.” Rivian is relying on a rapid increase in R2 production and sales.

Iranian cybercriminals assert they have infiltrated the personal email account of FBI director Kash Patel.

Iranian cybercriminals assert they have infiltrated the personal email account of FBI director Kash Patel.

A hacking collective associated with the Iranian government named “Handala” announced on Friday that it has infiltrated the personal email account of FBI Director Kash Patel. 

In a message on its website, Handala shared multiple images of a noticeably younger Patel, along with a link to a trove of files that seemingly originate from Patel’s personal Gmail account. 

“The FBI is aware of malicious entities targeting Director Patel’s personal email details, and we have implemented all necessary measures to address potential threats linked to this incident,” stated an FBI spokesperson to TechCrunch. “The information in question is historical and does not pertain to government data.”

The FBI also announced a reward of up to $10 million for any information regarding the Handala hackers.

TechCrunch confirmed that at least some of the emails released by Handala were indeed from Patel’s purported Gmail account by validating data contained within the message headers. These headers hold information from the sender that assists email delivery systems in verifying the authenticity of an email.

We utilized a tool to authenticate several emails in the leaked file stash that were sent by Patel from his Gmail account. These emails had cryptographic signatures that aligned with the messages, strongly indicating that the examined emails are legitimate. In some instances, Patel appears to have forwarded emails from his previous Justice Department address in 2014 to his Gmail account. TechCrunch determined that the emails dispatched from Patel’s DOJ account appeared authentic as well.

The files within the leaked cache seem to date back to around 2019.

The Justice Department did not promptly respond to a request for comment.

Reuters, which first disclosed the email leaks, reported that a Justice Department representative confirmed the breach. 

Contact Us

Do you have further information regarding this purported Kash Patel breach? From a non-work device, you can securely reach out to Lorenzo Franceschi-Bicchierai on Signal at +1 917 257 1382, or through Telegram, Keybase, and Wire @lorenzofb, or by email.

TechCrunch attempted to contact Patel’s Gmail address disclosed by the hackers, as well as via a text message to a mobile number listed in a resume reportedly belonging to Patel. We did not receive an immediate response.

Since the onset of the U.S.-Israeli conflict with Iran in February, the Iran-linked Handala has escalated its hacking activities, notably taking credit for a damaging attack against medical technology company Stryker that erased thousands of employee devices. The hackers have also leaked the private information of several individuals believed to be part of the Israeli Defense Forces and local defense contractors.

Following the Stryker incident, the FBI seized several Handala websites, which swiftly became active again on new domains. U.S. prosecutors have formally accused the Iranian Ministry of Intelligence and Security (MOIS) of running the Handala group. 

The hackers did not reply to TechCrunch’s request for commentary sent to a chat account that they promote on their website, as well as to an email address owned by the group that was publicized by the Justice Department.

Updated to include a statement from the FBI and corrected the fourth paragraph to clarify that the emails were sent from Patel’s DOJ account, not his FBI account. ZW.

Apple claims that no individual utilizing Lockdown Mode has been compromised by spyware.

Apple claims that no individual utilizing Lockdown Mode has been compromised by spyware.

Nearly four years following the introduction of a security feature known as Lockdown Mode, Apple claims it has not encountered a situation where an individual’s device was compromised with these enhanced security measures activated. 

“To our knowledge, there have been no successful mercenary spyware incursions on devices enabled with Lockdown Mode,” stated Apple spokesperson Sarah O’Rourke to TechCrunch on Friday.

This is the latest confirmation from the tech behemoth that Apple devices operating under Lockdown Mode can endure government spyware intrusions, having first made this assertion a year after the launch of the security feature.

In 2022, Apple introduced Lockdown Mode, an opt-in set of security measures that disables certain features on iPhones and other Apple products that are frequently exploited for hacking targets using spyware. Apple specifically developed this security mode to aid vulnerable customers in shielding themselves against the dangers presented by government spyware produced by firms like Intellexa, NSO Group, and Paragon Solutions.

In recent times, Apple has acknowledged that its clientele can fall prey to spyware and has adopted a more assertive approach to inform customers who have been targeted.

Apple has dispatched multiple notifications to users across more than 150 nations, notifying them that they could have been compromised by spyware, highlighting the level of insight the company now possesses regarding these types of attacks. Although Apple has never disclosed how many users have been informed, it’s reasonable to conclude that the numbers are in the dozens, if not more.

A screenshot showing iOS Lockdown Mode in iOS 16.
Image Credits:Apple (supplied)

Donncha Ó Cearbhaill, the leader of the security lab at Amnesty International, where he has examined numerous spyware incidents, mentioned that he and his team “have not observed any proof of an iPhone being successfully infiltrated by mercenary spyware while Lockdown Mode was active during the attack.”

Digital rights groups such as Amnesty International and the University of Toronto’s Citizen Lab have cataloged various successful assaults on iPhone users, none of which reported a breach of Lockdown Mode. In a minimum of two instances, Citizen Lab researchers have publicly stated that they witnessed Lockdown Mode effectively thwart spyware attacks, one involving NSO’s Pegasus and another with Predator spyware, developed by a company that is now under Intellexa.

In at least one recorded incident of spyware targeting iPhones, security analysts at Google indicated that the spyware would abandon its attempt to infect the target if Lockdown Mode was detected, likely as a method to avoid being noticed.

Patrick Wardle, a cybersecurity expert focused on Apple and a critic, asserts that Lockdown Mode is a vital feature that complicates the task for spyware creators aiming to target Apple users.

“It can be confidently said that Lockdown Mode represents one of the most rigorous consumer-facing hardening features ever implemented,” he conveyed to TechCrunch. 

Contact Us

Do you have further information regarding spyware attacks or the manufacturers of spyware? From a non-work device, you can securely reach Lorenzo Franceschi-Bicchierai on Signal at +1 917 257 1382, or via Telegram, Keybase, and Wire @lorenzofb, or by email.

Wardle clarified that by “minimizing the attack surface,” Lockdown Mode eliminates various strategies typically employed to exploit the iPhone, compelling spyware developers to resort to more sophisticated and costly methodologies.

“It neutralizes entire delivery mechanisms/exploit classes,” he added, “as it restricts most message attachment formats and limits WebKit capabilities. This represents a substantial decrease in the remotely accessible attack surface, particularly concerning zero-click exploit chains,” referring to intrusions that can target individuals over the internet without requiring any action from the victim.

It’s plausible that Lockdown Mode has been circumvented, and neither Apple nor independent analysts have detected the breach. However, considering that Apple usually maintains a publicly reserved stance, its latest proclamation signifies a notable point for Lockdown Mode.

I have utilized Lockdown Mode for several years, and I seldom think about it — except when notifications appear that can sometimes be perplexing. Some features that have been disabled necessitate an additional step, such as copying and pasting links from text messages into your browser. That’s why I, along with several digital security professionals, advise anyone concerned about being targeted by spyware or cyber assaults to enable Lockdown Mode.

OpenAI closes Sora as Meta faces exclusion in court

OpenAI closes Sora as Meta faces exclusion in court

Loading the player…

An 82-year-old woman in Kentucky turned down a $26 million proposal from an AI company planning to establish a data center on her land. Although the same company may seek to rezone 2,000 acres nearby, as AI infrastructure continues to integrate into everyday life, the world is beginning to push back.

This week’s tension is omnipresent, from OpenAI discontinuing its Sora application to courts finally taking action against social media platforms like Meta. In this episode of TechCrunch’s Equity podcast, Kirsten Korosec, Anthony Ha, and Sean O’Kane investigate how the AI hype phase collides with reality.

Subscribe to Equity via YouTube, Apple Podcasts, Overcast, Spotify and all other platforms. You can also follow Equity on X and Threads at @EquityPod.

How Trump's Strategy to Capture Iran's Nuclear Fuel Might Truly Function

How Trump’s Strategy to Capture Iran’s Nuclear Fuel Might Truly Function

President Donald Trump and senior defense officials are reportedly contemplating the deployment of ground forces to Iran to procure the nation’s highly enriched uranium. Nonetheless, the administration has not revealed specifics regarding the deployment, the extraction procedure, or where the nuclear material will be taken.

“Individuals will need to go and retrieve it,” Secretary of State Marco Rubio mentioned during a congressional briefing earlier this month, alluding to the prospective operation.

Indications suggest that a military operation might be on the horizon. On Tuesday, The Wall Street Journal highlighted that the Pentagon intends to position 3,000 brigade combat troops in the Middle East. (As of this writing, the official order has yet to be given.) These soldiers would be drawn from the Army’s 82nd Airborne Division, renowned for its joint forcible entry capabilities. Following this, on Wednesday, Iran’s government dismissed Trump’s 15-point strategy to conclude the conflict, while White House Press Secretary Karoline Leavitt stated that the president “is ready to unleash hell” in Iran if a peace agreement is not achieved—a strategy that has raised concerns among some lawmakers.

Utilizing publicly sourced intelligence and their own expertise, two analysts described the potential intricacies and dangers of a ground operation aimed at nuclear facilities. They informed WIRED that any ground operation would be exceedingly complex and could jeopardize American military personnel.

“I personally believe that a ground operation utilizing special forces backed by a larger contingent is markedly high-risk and ultimately impractical,” stated Spencer Faragasso, a senior research fellow at the Institute for Science and International Security.

According to the analysts, any iteration of the operation might require several weeks and necessitate concurrent actions at multiple far-off locations. Jonathan Hackett, a former operations specialist for the Marines and the Defense Intelligence Agency, noted that up to 10 sites could be targeted: the Isfahan, Arak, and Darkhovin research reactors; the Natanz, Fordow, and Parchin enrichment sites; the Saghand, Chine, and Yazd mines; and the Bushehr power plant.

As per the International Atomic Energy Agency, Isfahan likely contains the majority of the country’s 60 percent highly enriched uranium, which could facilitate a self-sustaining nuclear chain reaction, although weapon-grade material typically comprises 90 percent enriched uranium. Hackett suggested that the other two enrichment facilities might also hold 60 percent highly enriched uranium, and that the power plant along with all three research reactors could possess 20 percent enriched uranium. Faragasso emphasized that all such materials should be examined closely.

Hackett indicated that eight of the 10 locations—excluding Isfahan, which is expected to remain intact underground, and “Pickaxe Mountain,” a newer enrichment facility near Natanz—were largely or partially buried as a result of the air strikes in June. Right before the conflict, Faragasso noted, Iran backfilled the tunnel entrances to the Isfahan facility with soil.

The most dangerous scenario for a ground operation would involve American forces directly retrieving nuclear material. Hackett explained that this material would be stored as uranium hexafluoride gas in “large cement vats.” Faragasso added that it remains uncertain how many of these vats could be broken or compromised. At damaged locations, troops would require excavators and heavy machinery to move significant quantities of soil to access them.

A considerably less hazardous approach to the operation would still necessitate ground troops, according to Hackett. However, it would primarily rely on aerial strikes to entomb nuclear material within their facilities. Ensuring that the nuclear material is made inaccessible in the short to medium term, Faragasso said, would involve obliterating the entrances to underground facilities and ideally collapsing the roofs of those underground structures.

Hackett conveyed to WIRED that, based on his experience and all publicly available data, Trump’s negotiations with Iran are “probably a diversion” to gain time for troop positioning.

Hackett speculated that an operation would likely initiate with aerial bombardments in the vicinity of the target sites. These bombers, he indicated, would probably come from the 82nd Airborne Division or the 11th or 31st Marine Expeditionary Units (MEU). The 11th MEU, a rapid-response unit, and the 31st MEU, the sole Marine contingent continuously stationed abroad in strategic locations, have reportedly both been sent to the Middle East.