Reading view

There are new articles available, click to refresh the page.

China Hackers Using Brickstorm Backdoor to Target Government, IT Entities

china, flax typhoon,

Chinese-sponsored groups are using the popular Brickstorm backdoor to access and gain persistence in government and tech firm networks, part of the ongoing effort by the PRC to establish long-term footholds in agency and critical infrastructure IT environments, according to a report by U.S. and Canadian security offices.

The post China Hackers Using Brickstorm Backdoor to Target Government, IT Entities appeared first on Security Boulevard.

Meta Acquires AI Wearable Company Limitless

By: BeauHD
Meta is acquiring AI wearable startup Limitless, maker of a pendant that records conversations and generates summaries. "We're excited that Limitless will be joining Meta to help accelerate our work to build AI-enabled wearables," a Meta spokesperson said in a statement. CNBC reports: Limitless CEO Dan Siroker revealed the deal on Friday via a corporate blog post but did not disclose the financial terms. "Meta recently announced a new vision to bring personal superintelligence to everyone and a key part of that vision is building incredible AI-enabled wearables," Siroker said in the post and an accompanying video. "We share this vision and we'll be joining Meta to help bring our shared vision to life."

Read more of this story at Slashdot.

Cultural Lag Leaves Security as the Weakest Link

cybersecurity

For too long, security has been cast as a bottleneck – swooping in after developers build and engineers test to slow things down. The reality is blunt; if it’s bolted on, you’ve already lost. The ones that win make security part of every decision, from the first line of code to the last boardroom conversation...

The post Cultural Lag Leaves Security as the Weakest Link appeared first on Security Boulevard.

Dangerous RCE Flaw in React, Next.js Threatens Cloud Environments, Apps

Google, Wiz, Cnapp, Exabeam, CNAPP, cloud threat, detections, threats, CNAP, severless architecture, itte Broadcom report cloud security threat

Security and developer teams are scrambling to address a highly critical security flaw in frameworks tied to the popular React JavaScript library. Not only is the vulnerability, which also is in the Next.js framework, easy to exploit, but React is widely used, including in 39% of cloud environments.

The post Dangerous RCE Flaw in React, Next.js Threatens Cloud Environments, Apps appeared first on Security Boulevard.

Meta Poaches Apple Design Exec Alan Dye

By: BeauHD
Apple's longtime human-interface chief Alan Dye is leaving to lead a new creative studio at Meta's Reality Labs, where he'll shape AI-driven design for devices like smart glasses and VR headsets. Dye will be replaced by Steve Lemay, who has had "a key role in the design of every major Apple interface since 1999," according to a statement Apple CEO Tim Cook gave Bloomberg's Mark Gurman. TechCrunch reports: Shortly after the news broke of Dye's departure, Zuckerberg announced a new creative studio within Reality Labs that would be led by Dye. There, he'll be joined by Billy Sorrentino, another former Apple designer who led interface design across Reality Labs; Joshua To, who led interface design across Reality Labs; Meta's industrial design team, led by Pete Bristol; and its metaverse design and art teams led by Jason Rubin. Zuckerberg said the studio would "bring together design, fashion, and technology to define the next generation of our products and experiences." "Our idea is to treat intelligence as a new design material and imagine what becomes possible when it is abundant, capable, and human-centered," the Meta CEO wrote on Threads. "We plan to elevate design within Meta, and pull together a talented group with a combination of craft, creative vision, systems thinking, and deep experience building iconic products that bridge hardware and software."

Read more of this story at Slashdot.

AWS Adds Bevy of Tools and Capilities to Improve Cloud Security

maginot, defense,

Amazon Web Services (AWS) this week made an AWS Security Hub for analyzing cybersecurity data in near real time generally available, while at the same time extending the GuardDuty threat detection capabilities it provides to the Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Elastic Container Service (Amazon ECS). Announced at the AWS re:Invent 2025..

The post AWS Adds Bevy of Tools and Capilities to Improve Cloud Security appeared first on Security Boulevard.

ShadyPanda’s Years-Long Browser Hack Infected 4.3 Million Users

workforce, systems, security, security, spyware

A threat group dubbed ShadyPanda exploited traditional extension processes in browser marketplaces by uploading legitimate extensions and then quietly weaponization them with malicious updates, infecting 4.3 million Chrome and Edge users with RCE malware and spyware.

The post ShadyPanda’s Years-Long Browser Hack Infected 4.3 Million Users appeared first on Security Boulevard.

Security’s Next Control Plane: The Rise of Pipeline-First Architecture

cost, visibility, SIEM model, data, SIEM, teams, Elastic SIEM LogPoint security employees

For years, security operations have relied on monolithic architectures built around centralized collectors, rigid forwarding chains, and a single “system of record” where all data must land before action can be taken. On paper, that design promised simplicity and control. In practice, it delivered brittle systems, runaway ingest costs, and teams stuck maintaining plumbing instead..

The post Security’s Next Control Plane: The Rise of Pipeline-First Architecture appeared first on Security Boulevard.

❌