San Francisco (AP): Elon Musk's tumultuous 44 billion bid to buy Twitter is on the verge of collapse after the Tesla CEO sent a letter to Twitter's board Friday saying he is terminating the acquisition.
Twitter did not immediately respond to a message for comment. It is not entirely clear whether Twitter's board will accept the 1 billion breakup fee or if there will be a court battle over the deal.
The possible unraveling of the deal is just the latest twist in a saga between the world's richest man and one of the most influential social media platforms. Much of the drama has played out on Twitter, with Musk who has more than 95 million followers lamenting that the company was failing to live up to its potential as a platform for free speech.
On Friday, shares of Twitter fell 5% to 36.81, well below the 54.20 that Musk had offered to pay. Shares of Tesla, meanwhile, climbed 2.5% to 752.29.
In a letter to the Securities and Exchange Commission, Musk said Twitter has not complied with its contractual obligations surrounding the deal, namely giving Musk enough information to make an independent assessment of the prevalence of fake or spam accounts on Twitter's platform.
Musk's flirtation with buying Twitter appeared to begin in late March. That's when Twitter has said he contacted members of its board including co-founder Jack Dorsey and told them he was buying up shares of the company and interested in either joining the board, taking Twitter private or starting a competitor. Then, on April 4, he revealed in a regulatory filing that he had became the company's largest shareholder after acquiring a 9% stake worth about 3 billion.
At first, Twitter offered Musk a seat on its board. But six days later, Twitter CEO Parag Agrawal tweeted that Musk will not be joining the board after all. His bid to buy the company came together quickly after that.
Musk had agreed to buy Twitter for 54.20 per share, inserting a 420 marijuana reference into his offer price. He sold roughly 8.5 billion worth of shares in Tesla to help fund the purchase, then strengthened his commitments of more than 7 billion from a diverse group of investors including Silicon Valley heavy hitters like Oracle co-founder Larry Ellison.
Inside Twitter, Musk's offer was met with confusion and falling morale, especially after Musk publicly criticized one of Twitter's top lawyers involved in content-moderation decisions.
As Twitter executives prepared for the deal to move forward, the company instituted a hiring freeze, halted discretionary spending and fired two top managers. The San Francisco company has also been laying off staff, most recently part of its talent acquisition team.
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
TraceX Labs has introduced a set of cybersecurity tools aimed at helping enterprises and users monitor and manage digital threats more effectively. The company focuses on developing security technologies capable of identifying suspicious behavior across websites, applications, and mobile devices.
One of the company’s enterprise-focused platforms is URL X, a security system designed to analyze and monitor web links in real time. Malicious URLs distributed through emails, messaging platforms, websites, and advertisements remain one of the most common entry points for cyberattacks. These links can redirect users to fraudulent websites or initiate malware downloads intended to steal sensitive information.
URL X works by evaluating web links at the moment they are accessed rather than relying only on static threat databases. The system analyzes link behavior, domain infrastructure, and redirect patterns to determine whether a destination may pose a potential security risk. This approach allows organizations to detect suspicious links before they can compromise systems or user data.
In addition to enterprise security tools, the company has also developed TraceX Guard, an Android-based mobile security application designed to protect smartphones from digital threats. The application monitors device activity and scans installed apps, external links, and QR codes to detect risks such as malware, spyware, ransomware, and phishing attempts.
Cybersecurity experts note that malicious links and compromised mobile applications remain among the most widely used techniques in cybercrime. As smartphones are commonly used for banking, digital payments, and communication, protecting mobile devices has become an essential component of modern cybersecurity strategies.
With the increasing reliance on connected devices and digital infrastructure, technologies capable of detecting threats in real time are expected to play an important role in helping organizations and individuals protect their digital environments.
