PINS

Prezzo Pinterest Inc

Closed
PINS
$20,29
+$0,59(+2,99%)

*Data last updated: 2026-05-04 03:02 (UTC+8)

As of 2026-05-04 03:02, Pinterest Inc (PINS) is priced at $20,29, with a total market cap of $13,64B, a P/E ratio of 41,90, and a dividend yield of 0,00%. Today, the stock price fluctuated between $19,66 and $20,38. The current price is 3,20% above the day's low and 0,44% below the day's high, with a trading volume of 15,87M. Over the past 52 weeks, PINS has traded between $19,15 to $20,49, and the current price is -0,97% away from the 52-week high.

PINS Key Stats

Yesterday's Close$19,66
Market Cap$13,64B
Volume15,87M
P/E Ratio41,90
Dividend Yield (TTM)0,00%
Diluted EPS (TTM)0,62
Net Income (FY)$416,85M
Revenue (FY)$4,22B
Earnings Date2026-05-04
EPS Estimate0,22
Revenue Estimate$965,83M
Shares Outstanding693,94M
Beta (1Y)0.876

About PINS

Pinterest, Inc. operates as a visual discovery engine in the United States and internationally. The company's engine allows people to find inspiration for their lives, including recipes, style and home inspiration, DIY, and others; and provides video, product, and idea pins. It shows visual machine learning recommendations based on pinners taste and interests. The company was formerly known as Cold Brew Labs Inc. and changed its name to Pinterest, Inc. in April 2012. Pinterest, Inc. was incorporated in 2008 and is headquartered in San Francisco, California.
SectorCommunication Services
IndustryInternet Content & Information
CEOWilliam J. Ready
HeadquartersSan Francisco,CA,US
Employees (FY)5,26K
Average Revenue (1Y)$801,85K
Net Income per Employee$79,17K

Pinterest Inc (PINS) FAQ

What's the stock price of Pinterest Inc (PINS) today?

x
Pinterest Inc (PINS) is currently trading at $20,29, with a 24h change of +2,99%. The 52-week trading range is $19,15–$20,49.

What are the 52-week high and low prices for Pinterest Inc (PINS)?

x

What is the price-to-earnings (P/E) ratio of Pinterest Inc (PINS)? What does it indicate?

x

What is the market cap of Pinterest Inc (PINS)?

x

What is the most recent quarterly earnings per share (EPS) for Pinterest Inc (PINS)?

x

Should you buy or sell Pinterest Inc (PINS) now?

x

What factors can affect the stock price of Pinterest Inc (PINS)?

x

How to buy Pinterest Inc (PINS) stock?

x

Risk Warning

The stock market involves a high level of risk and price volatility. The value of your investment may increase or decrease, and you may not recover the full amount invested. Past performance is not a reliable indicator of future results. Before making any investment decisions, you should carefully assess your investment experience, financial situation, investment objectives, and risk tolerance, and conduct your own research. Where appropriate, consult an independent financial adviser.

Disclaimer

The content on this page is provided for informational purposes only and does not constitute investment advice, financial advice, or trading recommendations. Gate shall not be held liable for any loss or damage resulting from such financial decisions. Further, take note that Gate may not be able to provide full service in certain markets and jurisdictions, including but not limited to the United States of America, Canada, Iran, and Cuba. For more information on Restricted Locations, please refer to the User Agreement.

Other Trading Markets

Pinterest Inc (PINS) Latest News

2026-04-25 14:41

Android Malware Families Target 800+ Banking, Crypto Apps With Near-Zero Detection Rates: Zimperium

Gate News message, April 25 — Cybersecurity firm Zimperium has identified four active malware families—RecruitRat, SaferRat, Astrinox and Massiv—targeting over 800 applications across banking, cryptocurrency and social media sectors. The campaigns employ advanced anti-analysis techniques and structural APK tampering to maintain near-zero detection rates against traditional signature-based security mechanisms. Attackers use phishing websites, fraudulent job offers, fake software updates, text-message scams and promotional lures to trick users into installing malicious Android apps. Once installed, the malware requests Accessibility permissions to hide app icons, block uninstall attempts, steal PINs and passwords via fake lock screens, intercept one-time passcodes, record live device screens and overlay counterfeit login pages on legitimate banking or crypto applications. Overlay attacks form the core of the credential-harvesting strategy. The malware monitors the foreground using Accessibility Services and detects when a victim launches a financial app, then fetches a malicious HTML payload and overlays it onto the legitimate interface to create a convincing deceptive facade. The campaigns use HTTPS and WebSocket communications to blend malicious traffic with normal app activity, with some variants employing additional encryption layers to further evade detection.

Hot Posts su Pinterest Inc (PINS)

CoffeeNFTrader

CoffeeNFTrader

7 ore fa
- Advertisement -![](https://img-cdn.gateio.im/social/moments-9920cb2d7f-0b6aa98c0b-8b7abd-e5a980) * * * * * Kentucky House Bill 380, passed 85 to 0 by the state House on March 13 and now under Senate review, contains a late floor amendment in Section 33 **that critics led by the Bitcoin Policy Institute **say would effectively ban self-custody hardware wallets by requiring manufacturers to provide reset mechanisms they are architecturally incapable of building. What Section 33 Actually Requires --------------------------------- **The provision requires hardware wallet providers** to offer a mechanism that allows users to reset their passwords, PINs, or seed phrases, and to verify a user’s identity before assisting with such a reset. Those two requirements appear straightforward in a traditional software context. In the context of non-custodial hardware wallets, they are technically impossible to fulfill without fundamentally redesigning how the devices work. Hardware wallets like Ledger and Trezor are built on a single foundational principle: only the user holds the private keys and seed phrase. The manufacturer has no access to this information at any point after the device is initialized. There is no server, no recovery database, and no backdoor through which a reset could be facilitated. The security guarantee of the device depends entirely on that architecture. A manufacturer that could reset a user’s seed phrase on request would also be a manufacturer that could access the user’s funds. To comply with Section 33 as written, hardware wallet manufacturers would be required to build exactly that backdoor. The Bitcoin Policy Institute and other advocacy groups are calling it a de facto ban because the compliance requirement and the product’s core security architecture are mutually exclusive. The Conflict With Kentucky’s Own 2025 Law ----------------------------------------- The controversy is compounded by a direct conflict with existing Kentucky legislation. House Bill 701, enacted in March 2025, explicitly protects the rights of Kentucky residents to self-custody digital assets and maintain independent control of their private keys. That law was passed less than twelve months ago. Section 33 of HB 380 contradicts it directly. A hardware wallet that contains a manufacturer-accessible backdoor is not a self-custody device in any meaningful sense. The seed phrase, if recoverable by a third party under any circumstances, represents a custodial relationship regardless of how the device is marketed. Enforcing Section 33 while HB 701 remains on the books creates a legal contradiction the Kentucky Senate will need to resolve before a final vote. Why the Provision Was Added and What the Bill Was Designed to Do ---------------------------------------------------------------- HB 380 originated as a consumer protection bill targeting crypto ATM kiosks, not hardware wallets. The primary provisions establish a $2,000 daily transaction limit for kiosk operators and introduce licensing requirements for their operation. AARP Kentucky has publicly supported these provisions, citing cases where seniors have lost entire life savings through unregulated kiosks in single transactions. The bill passed 85 to 0 in the House precisely because those consumer protection measures have broad bipartisan support. Section 33 was added as a last-minute floor amendment. Its inclusion did not receive the scrutiny that the primary provisions received during the drafting process. The legislative path it took, added late and passed as part of a package with near-unanimous support for unrelated provisions, is exactly why the Bitcoin Policy Institute and crypto advocacy groups are now targeting the Senate review rather than treating the bill as settled. ### The FBI’s Name Is Being Used to Scam Crypto Wallets on Tron – 728 Wallets Have Already Been Hit The Senate Window and the National Context ------------------------------------------ HB 380 was referred to the Senate Committee on Committees on March 16, three days after the House vote. As of March 19, advocacy groups are actively lobbying for Section 33 to be stripped before the Senate votes. Because the provision was a late addition rather than a foundational element of the bill, removing it does not undermine the kiosk regulation framework that the bill was designed to create. The broader regulatory picture adds context. Minnesota is considering total bans on crypto ATMs rather than transaction limits, reflecting the difficulty states are encountering when attempting to enforce behavioral restrictions on kiosk operators. Kentucky’s transaction cap and licensing approach is more targeted than a blanket ban, which gives the core bill continued merit even if Section 33 is removed. The hardware wallet provision, if it survives into law, would not only affect Kentucky residents. Hardware wallet manufacturers that cannot or will not build backdoor reset mechanisms into their products would face a choice between withdrawing from the Kentucky market or facing legal exposure. Neither outcome serves the consumer protection goals that HB 380 was designed to advance.
0
0
0
0
SleepTrader

SleepTrader

10 ore fa
* * * _Zachary Amos is the Features Editor at ReHack.com. His tech insights have been featured in VentureBeat, TalentCulture, ISAGCA, Unite.AI, HR.com, and numerous other publications._ * * * **Discover top fintech news and events!** **Subscribe to FinTech Weekly's newsletter** **Read by executives at JP Morgan, Coinbase, Blackrock, Klarna and more** * * * Biometric authentication has become pivotal in fintech because it allows users to access banking apps with a simple fingerprint, facial scan or iris recognition. This technology enhances user experience while significantly reducing fraud. **However, as security measures evolve, so do cybercriminal tactics**. **Biometric hacking has become a growing concern**. Unlike passwords, this type of data is permanent and cannot be reset if compromised, making breaches more dangerous. This rising threat highlights the need for app developers to implement advanced measures. These upgrades must outpace dynamic cyberthreats while ensuring a smooth and secure user experience. **What Is Biometric Hacking?** ------------------------------ Biometric hacking exploits weaknesses in authentication systems to gain unauthorized access to sensitive accounts or data. As banking apps and **fintech** platforms increasingly rely on fingerprint scanning, facial recognition and voice authentication, **cybercriminals find new ways to manipulate these systems.** Beyond security risks, reliance on biometric technology raises bias concerns and data protection issues. Poorly designed systems are less accurate for specific demographics, leading to discrimination and access issues. Additionally, the lack of transparency around data collection leaves users vulnerable to misuse and surveillance. **Stronger safeguards, ethical practices and bias-free technology are essential** to protecting consumers and ensuring fair, reliable authentication. **How Biometric Hacking Threatens Banking Apps** ------------------------------------------------ Biometric hacking jeopardizes banking apps, exposing users and financial institutions to fraud, identity theft and costly breaches. I**n 2023, the average incident response cost for a ransomware attack was estimated at $4.54 million**,highlighting the high stakes of cybersecurity failures. Here are some of the ways this cyberattack threatens apps: * Spoofing attacks: Hackers use fake fingerprints, masks or high-resolution images to trick biometric scanners into granting unauthorized access. * Data breaches: Malicious actors can sell stolen data from poorly secured databases on the dark web or use them for identity fraud. * Replay attacks: Cybercriminals intercept and reuse authentication data to impersonate legitimate users. * Man-in-the-middle attacks: Hackers intercept data during transmission, manipulating the authentication process to gain access. * Malware exploits: Malicious software can compromise banking apps, capturing credentials without the user’s knowledge. * AI-powered deepfakes: Advanced artificial intelligence tools can generate hyper-realistic facial or voice deepfakes to bypass biometric verification. * Regulatory and compliance risks: Failing to secure data properly can lead to legal consequences, regulatory fines and loss of customer trust. **5 Ways Banking App Creators Can Prevent Biometric Hacking** ------------------------------------------------------------- As biometric hacking techniques become more sophisticated, **app creators must take proactive steps to strengthen security and protect user data**. Here are strategies to reduce the risk of breaches while ensuring a seamless user experience. 2. ### **Encrypt Biometric Data End-to-End** Securing biometric data with strong encryption protects users from fraud and identity theft, but centralized storage systems remain a prime target for hackers. App developers can adopt decentralized storage solutions that distribute data across secure networks to reduce breach risks. Blockchain technology is a leading example. It offers transparency, decentralization and immutability — making it much harder for cybercriminals to compromise user data. Leveraging this tool can ensure credentials are secure and under the user’s control, which eliminates the need for third-party data management. **This approach reduces the risk of mass breaches** while reinforcing consumer trust in biometric authentication. 3. ### **Implement Multilayered Security Measures** Relying solely on biometrics for authentication leaves banking apps vulnerable to sophisticated hacking attempts. **Developers can create a more robust security framework by combining biometrics with PINs, passwords or behavioral authentication** — such as keystroke dynamics or device usage patterns. In addition, enforcing multifactor authentication for all remote access to an organization’s network — as well as privileged or administrative accounts — reduces the likelihood of damaging cyber intrusions in banking sectors. This extra security barrier makes it exponentially harder for hackers to exploit stolen credentials, enhancing overall system integrity. 4. ### **Regularly Update Security Protocols** Frequent software updates strengthen banking app security by patching vulnerabilities and preventing emerging threats. Cybercriminals constantly change tactics, and outdated systems create openings for biometric hacking attempts. **Regularly updating security protocols** allows apps to avoid potential exploits and reduce the risk of breaches. **Implementing AI-driven anomaly detection adds a layer of protection by identifying unusual login behavior in real time**. This technology can detect suspicious activities — such as logins from unrecognized devices or abnormal access patterns — and trigger additional authentication steps to block unauthorized access. 5. ### **Use Liveness Detection Technology** **Banking apps must integrate liveness detection technology **to prevent spoofing attacks and differentiate between real and fake human features. Advanced liveness detection solutions process data using 3D scanning, analyzing depth, movement and other subtle characteristics to verify authenticity. This **AI-powered** approach improves the system’s efficiency by detecting attempts to bypass biometric authentication with photos, masks or deepfake technology. By continuously learning from real-world interactions, AI-driven liveness detection becomes more effective at identifying fraud attempts while maintaining a seamless user experience. 6. ### **Limit Biometric Data Storage** Storing biometric data locally on a user’s device instead of cloud storage minimizes security risks and protects sensitive information. With a 71% increase in cyberattacks using stolen or compromised credentials in 2024, centralized databases have become prime targets for hackers looking to exploit authentication systems. Keeping this data on the device can reduce the risk of large-scale breaches while giving users greater control over their personal information. **Implementing cryptographic hash functions enhances security by ensuring raw biometric data is never in its original form**. This makes it nearly impossible for cybercriminals to reconstruct or misuse it. **The Future of Biometric Security and Fintech’s Responsibility** ----------------------------------------------------------------- **Fintech companies** must implement advanced encryption and AI-driven fraud detection to protect users from emerging threats. As biometric technology becomes more complicated, financial institutions must stay ahead of malicious actors to create a safer and more seamless banking experience.
0
0
0
0
SleepTrader

SleepTrader

20 ore fa
_**April Miller** is Managing Editor a ReHack Magazine._  * * * **Discover top fintech news and events!** **Subscribe to FinTech Weekly's newsletter** **Read by executives at JP Morgan, Coinbase, Blackrock, Klarna and more** * * * Neobanks are digital-first, tech-driven financial institutions built around apps, APIs and automated decisioning, rather than branches and batch processing. They are reshaping everyday credit and debit card habits, from how quickly a card can be issued to how granularly spending can be controlled. As artificial intelligence (AI) matures inside modern banking stacks, cards are becoming programmable tools for security, budgeting and cash-flow management.  **The Tech Foundation With AI and Automation** ------------------------------------------------- Neobanks run on cloud-native infrastructure built for continuous data ingestion and fast iteration. That architecture enables scoring transactions as they occur and automates back-office workflows. Legacy banks can add these capabilities, but many still struggle with fragmented cores, slower release cycles and risk models designed for delayed reconciliation.  AI investment signals where the industry is heading. Market forecasts expect AI in banking to grow from its 2020 baseline to more than $64 billion by 2030, reflecting how quickly automation is becoming central to product design.  Adoption varies widely across banks, and that gap can determine security and competition. Institutions that move faster can detect fraud sooner and roll out stronger card controls, while slower adopters risk falling behind on protection and customer experience.  According to a study by IBM, only 8% of banks developed generative AI systematically in 2024, while 78% pursued it through tactical initiatives. It linked deeper AI integration to fewer service outages and higher IT customer satisfaction. Neobanks often see these gains sooner because their systems support faster model updates and automated responses.  **A New Standard for Consumer Cards** ---------------------------------------- Consumer card behavior is shifting toward institutions that feel more like security-forward software products than traditional accounts. Trust is part of this shift — 54% of global consumers trust at least one large technology company more than banks. This is a sign that experience and perceived competence influence where people feel safer managing money and identity data. ### **Radically Improved User Experience** Neobank cards are managed like configurable endpoints, with real-time purchase notifications reducing the “unknown transaction” window that attackers depend on. Spending analytics also run in near real time, helping cardholders recognize subscription creep, merchant anomalies and unusual geographies before they become chargebacks. Card life cycle actions also happen from inside the app. Freezing and unfreezing accounts, setting travel rules, changing PINs and provisioning a card to a mobile wallet can be handled after a few authenticated actions. The key detail is latency reduction. Faster visibility and response compress the blast radius of both fraud and account takeover. ### **Advanced Security and Control** Neobanks typically apply AI-assisted risk scoring across device signals, transaction contexts and behavior patterns. These include device binding and anomaly detection.  Some offer controls that support threat modeling for online card fraud. Virtual cards can limit the usefulness of stolen card details by reducing reuse. Merchant or category limits and location-aware prompts can also block unexpected spending or trigger extra verification when an activity deviates from normal patterns.  While these do not eliminate fraud, they convert security from a hidden back-end function into an active control surface where the user can participate in containment.  **Revolutionizing Commercial Card Usage** -------------------------------------------- For small and medium-sized enterprises, neobanks position cards as operating infrastructure. Traditional business banking often treats cards, lending and treasury as separate products with different onboarding flows. Neobanks unify these capabilities in a single interface with role-based access, programmable controls and integrations that fit modern finance teams.  The result is tighter financial control without adding administrative load. Businesses can connect banking to accounting systems, payroll platforms and payment processors, then use those connections to automate policy enforcement. Better data lineage and faster categorization thereby reduce the blind spots where fraud and compliance failures thrive.  ### **AI-Powered Underwriting and Credit** Neobanks use automation to evaluate cash flow data, invoices, payment histories and account activity to adjust limits or extend credit faster than manual review cycles. End-to-end automation also improves risk management across the lending life cycle by analyzing large volumes of financial statements, histories and market signals to arrive at informed credit decisions and reduce exposure to losses.  Automation changes how businesses use cards daily. Faster underwriting means a company can access credit sooner, then continue using it without the constant stop-start that happens when assessments drag on. Ongoing monitoring also keeps things moving. If a transaction looks risky, the system can step in right away by reducing a limit, launching a quick verification or flagging a vendor.  ### **Streamlined Expense Management** Rather than passing around one corporate card, finance teams can give each employee, project or vendor its own card and set specific rules. A contractor can get a card that works only for a week. A project card can be limited to certain merchants. A high-risk category can be blocked outright. Receipts can also flow in automatically, so expenses get matched and coded sooner. From a cybersecurity standpoint, segmentation reduces the value of any single compromised credential. Virtual cards can be rotated frequently, employee access can be revoked instantly and anomalous expense patterns can trigger finance and security.  **What This Means for Traditional Banking** ---------------------------------------------- Incumbent banks are responding to neobanks, partly because customers now seek instant alerts, self-service freezes and app-native dispute flows as baseline features. Regulators are also paying attention to how AI changes risk and resilience, especially when models depend on third-party providers or introduce new attack surfaces. The U.S. Federal Reserve has even emphasized the need to balance innovation with safety, soundness and evolving risk management practices as AI adoption expands. Supervisors in Europe have also described banks using AI for credit scoring and fraud detection as adoption becomes more mainstream. **Next Steps for Safer and Smarter Card Use** ------------------------------------------------ Cards now act like smart controls for identity, risk and cash flow. Neobanks pushed that shift by using AI and automation to speed up processes for a range of financial services. As these systems improve, credit and debit use will adapt in real time, staying more secure and fitting more naturally into daily spending and business operations.
0
0
0
0