Chinese APT Drops ‘Brickstorm’ Backdoors on Edge Devices

Chinese APT Drops ‘Brickstorm’ Backdoors on Edge Devices Summary A China-linked espionage group tracked as UNC5221 has been deploying a Go-based backdoor called “Brickstorm” on network and infrastructure appliances that lack standard EDR support. Targets include firewalls, VPNs, IDS/IPS, and virtualisation management systems (notably VMware vCenter and ESXi). Google’s Threat Intelligence Group (GTIG) reports long […]

Read More →

Google’s Conversational Photo Editor Is the Rare AI Feature People Will Actually Use

Google’s Conversational Photo Editor Is the Rare AI Feature People Will Actually Use Summary Google’s new Ask Photos conversational editor, introduced on Pixel 10 phones and rolling out to supported Android devices, lets you edit pictures by typing or speaking plain-English commands. Instead of fiddling with sliders and menus, you can say things like “remove […]

Read More →

How AI and Wikipedia have sent vulnerable languages into a doom spiral

How AI and Wikipedia have sent vulnerable languages into a doom spiral Summary The article reports that many small-language editions of Wikipedia have been flooded with poor, machine-translated entries. For low‑resource languages such as Greenlandic, Inuktitut, Fulfulde, Igbo and Hawaiian, automated translations often produce grammatical nonsense and factual errors. Because AI models learn from vast […]

Read More →

CISA: Attackers Breach Federal Agency via Critical GeoServer Flaw

CISA: Attackers Breach Federal Agency via Critical GeoServer Flaw Summary On 11 July 2024 threat actors exploited a critical remote-code-execution flaw (CVE-2024-36401) in GeoServer to breach a large, unnamed federal civilian executive branch (FCEB) agency. CISA responded after the agency’s EDR flagged activity, but found the agency’s incident response playbook, patching and telemetry access were […]

Read More →

Russia Targets Moldovan Election in Disinformation Play

Russia Targets Moldovan Election in Disinformation Play Summary Researchers have tracked a state-backed Russian disinformation campaign, tracked as Storm-1679 (aka Matryoshka), aimed at influencing Moldova’s 28 September 2025 parliamentary election. Silent Push’s research (published 23 Sept) ties the campaign technically to an earlier Russian propaganda operation called Absatz via shared code fingerprints and reused IP […]

Read More →

Npm Package Hides Malware in Steganographic QR Codes

Npm Package Hides Malware in Steganographic QR Codes Summary Researchers from Socket Threat Research discovered a malicious npm package named “fezbox” that hid credential‑stealing malware inside steganographic QR codes. The package, presented as a harmless JavaScript/TypeScript utility library, fetched and executed an obfuscated payload encoded within a QR image. The payload could read browser cookies, […]

Read More →

The Future of AI: Why Data Quality Will Define Artificial General Intelligence (AIG)

The Future of AI: Why Data Quality Will Define Artificial General Intelligence (AIG) Summary The article argues that data quality — not just compute power — will determine whether artificial intelligence reaches meaningful artificial general intelligence (AIG). Using human creativity and lived experience as an analogy, the author explains that rich, diverse, well-governed data is […]

Read More →