• NVIDIA helps Germany lead Europe’s AI manufacturing race

    Germany and NVIDIA are building possibly the most ambitious European tech project of the decade: the continent’s first industrial AI cloud.NVIDIA has been on a European tour over the past month with CEO Jensen Huang charming audiences at London Tech Week before dazzling the crowds at Paris’s VivaTech. But it was his meeting with German Chancellor Friedrich Merz that might prove the most consequential stop.The resulting partnership between NVIDIA and Deutsche Telekom isn’t just another corporate handshake; it’s potentially a turning point for European technological sovereignty.An “AI factory”will be created with a focus on manufacturing, which is hardly surprising given Germany’s renowned industrial heritage. The facility aims to give European industrial players the computational firepower to revolutionise everything from design to robotics.“In the era of AI, every manufacturer needs two factories: one for making things, and one for creating the intelligence that powers them,” said Huang. “By building Europe’s first industrial AI infrastructure, we’re enabling the region’s leading industrial companies to advance simulation-first, AI-driven manufacturing.”It’s rare to hear such urgency from a telecoms CEO, but Deutsche Telekom’s Timotheus Höttges added: “Europe’s technological future needs a sprint, not a stroll. We must seize the opportunities of artificial intelligence now, revolutionise our industry, and secure a leading position in the global technology competition. Our economic success depends on quick decisions and collaborative innovations.”The first phase alone will deploy 10,000 NVIDIA Blackwell GPUs spread across various high-performance systems. That makes this Germany’s largest AI deployment ever; a statement the country isn’t content to watch from the sidelines as AI transforms global industry.A Deloitte study recently highlighted the critical importance of AI technology development to Germany’s future competitiveness, particularly noting the need for expanded data centre capacity. When you consider that demand is expected to triple within just five years, this investment seems less like ambition and more like necessity.Robots teaching robotsOne of the early adopters is NEURA Robotics, a German firm that specialises in cognitive robotics. They’re using this computational muscle to power something called the Neuraverse which is essentially a connected network where robots can learn from each other.Think of it as a robotic hive mind for skills ranging from precision welding to household ironing, with each machine contributing its learnings to a collective intelligence.“Physical AI is the electricity of the future—it will power every machine on the planet,” said David Reger, Founder and CEO of NEURA Robotics. “Through this initiative, we’re helping build the sovereign infrastructure Europe needs to lead in intelligent robotics and stay in control of its future.”The implications of this AI project for manufacturing in Germany could be profound. This isn’t just about making existing factories slightly more efficient; it’s about reimagining what manufacturing can be in an age of intelligent machines.AI for more than just Germany’s industrial titansWhat’s particularly promising about this project is its potential reach beyond Germany’s industrial titans. The famed Mittelstand – the network of specialised small and medium-sized businesses that forms the backbone of the German economy – stands to benefit.These companies often lack the resources to build their own AI infrastructure but possess the specialised knowledge that makes them perfect candidates for AI-enhanced innovation. Democratising access to cutting-edge AI could help preserve their competitive edge in a challenging global market.Academic and research institutions will also gain access, potentially accelerating innovation across numerous fields. The approximately 900 Germany-based startups in NVIDIA’s Inception program will be eligible to use these resources, potentially unleashing a wave of entrepreneurial AI applications.However impressive this massive project is, it’s viewed merely as a stepping stone towards something even more ambitious: Europe’s AI gigafactory. This planned 100,000 GPU-powered initiative backed by the EU and Germany won’t come online until 2027, but it represents Europe’s determination to carve out its own technological future.As other European telecom providers follow suit with their own AI infrastructure projects, we may be witnessing the beginning of a concerted effort to establish technological sovereignty across the continent.For a region that has often found itself caught between American tech dominance and Chinese ambitions, building indigenous AI capability represents more than economic opportunity. Whether this bold project in Germany will succeed remains to be seen, but one thing is clear: Europe is no longer content to be a passive consumer of AI technology developed elsewhere.Want to learn more about AI and big data from industry leaders? Check out AI & Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is co-located with other leading events including Intelligent Automation Conference, BlockX, Digital Transformation Week, and Cyber Security & Cloud Expo.Explore other upcoming enterprise technology events and webinars powered by TechForge here.
    #nvidia #helps #germany #lead #europes
    NVIDIA helps Germany lead Europe’s AI manufacturing race
    Germany and NVIDIA are building possibly the most ambitious European tech project of the decade: the continent’s first industrial AI cloud.NVIDIA has been on a European tour over the past month with CEO Jensen Huang charming audiences at London Tech Week before dazzling the crowds at Paris’s VivaTech. But it was his meeting with German Chancellor Friedrich Merz that might prove the most consequential stop.The resulting partnership between NVIDIA and Deutsche Telekom isn’t just another corporate handshake; it’s potentially a turning point for European technological sovereignty.An “AI factory”will be created with a focus on manufacturing, which is hardly surprising given Germany’s renowned industrial heritage. The facility aims to give European industrial players the computational firepower to revolutionise everything from design to robotics.“In the era of AI, every manufacturer needs two factories: one for making things, and one for creating the intelligence that powers them,” said Huang. “By building Europe’s first industrial AI infrastructure, we’re enabling the region’s leading industrial companies to advance simulation-first, AI-driven manufacturing.”It’s rare to hear such urgency from a telecoms CEO, but Deutsche Telekom’s Timotheus Höttges added: “Europe’s technological future needs a sprint, not a stroll. We must seize the opportunities of artificial intelligence now, revolutionise our industry, and secure a leading position in the global technology competition. Our economic success depends on quick decisions and collaborative innovations.”The first phase alone will deploy 10,000 NVIDIA Blackwell GPUs spread across various high-performance systems. That makes this Germany’s largest AI deployment ever; a statement the country isn’t content to watch from the sidelines as AI transforms global industry.A Deloitte study recently highlighted the critical importance of AI technology development to Germany’s future competitiveness, particularly noting the need for expanded data centre capacity. When you consider that demand is expected to triple within just five years, this investment seems less like ambition and more like necessity.Robots teaching robotsOne of the early adopters is NEURA Robotics, a German firm that specialises in cognitive robotics. They’re using this computational muscle to power something called the Neuraverse which is essentially a connected network where robots can learn from each other.Think of it as a robotic hive mind for skills ranging from precision welding to household ironing, with each machine contributing its learnings to a collective intelligence.“Physical AI is the electricity of the future—it will power every machine on the planet,” said David Reger, Founder and CEO of NEURA Robotics. “Through this initiative, we’re helping build the sovereign infrastructure Europe needs to lead in intelligent robotics and stay in control of its future.”The implications of this AI project for manufacturing in Germany could be profound. This isn’t just about making existing factories slightly more efficient; it’s about reimagining what manufacturing can be in an age of intelligent machines.AI for more than just Germany’s industrial titansWhat’s particularly promising about this project is its potential reach beyond Germany’s industrial titans. The famed Mittelstand – the network of specialised small and medium-sized businesses that forms the backbone of the German economy – stands to benefit.These companies often lack the resources to build their own AI infrastructure but possess the specialised knowledge that makes them perfect candidates for AI-enhanced innovation. Democratising access to cutting-edge AI could help preserve their competitive edge in a challenging global market.Academic and research institutions will also gain access, potentially accelerating innovation across numerous fields. The approximately 900 Germany-based startups in NVIDIA’s Inception program will be eligible to use these resources, potentially unleashing a wave of entrepreneurial AI applications.However impressive this massive project is, it’s viewed merely as a stepping stone towards something even more ambitious: Europe’s AI gigafactory. This planned 100,000 GPU-powered initiative backed by the EU and Germany won’t come online until 2027, but it represents Europe’s determination to carve out its own technological future.As other European telecom providers follow suit with their own AI infrastructure projects, we may be witnessing the beginning of a concerted effort to establish technological sovereignty across the continent.For a region that has often found itself caught between American tech dominance and Chinese ambitions, building indigenous AI capability represents more than economic opportunity. Whether this bold project in Germany will succeed remains to be seen, but one thing is clear: Europe is no longer content to be a passive consumer of AI technology developed elsewhere.Want to learn more about AI and big data from industry leaders? Check out AI & Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is co-located with other leading events including Intelligent Automation Conference, BlockX, Digital Transformation Week, and Cyber Security & Cloud Expo.Explore other upcoming enterprise technology events and webinars powered by TechForge here. #nvidia #helps #germany #lead #europes
    WWW.ARTIFICIALINTELLIGENCE-NEWS.COM
    NVIDIA helps Germany lead Europe’s AI manufacturing race
    Germany and NVIDIA are building possibly the most ambitious European tech project of the decade: the continent’s first industrial AI cloud.NVIDIA has been on a European tour over the past month with CEO Jensen Huang charming audiences at London Tech Week before dazzling the crowds at Paris’s VivaTech. But it was his meeting with German Chancellor Friedrich Merz that might prove the most consequential stop.The resulting partnership between NVIDIA and Deutsche Telekom isn’t just another corporate handshake; it’s potentially a turning point for European technological sovereignty.An “AI factory” (as they’re calling it) will be created with a focus on manufacturing, which is hardly surprising given Germany’s renowned industrial heritage. The facility aims to give European industrial players the computational firepower to revolutionise everything from design to robotics.“In the era of AI, every manufacturer needs two factories: one for making things, and one for creating the intelligence that powers them,” said Huang. “By building Europe’s first industrial AI infrastructure, we’re enabling the region’s leading industrial companies to advance simulation-first, AI-driven manufacturing.”It’s rare to hear such urgency from a telecoms CEO, but Deutsche Telekom’s Timotheus Höttges added: “Europe’s technological future needs a sprint, not a stroll. We must seize the opportunities of artificial intelligence now, revolutionise our industry, and secure a leading position in the global technology competition. Our economic success depends on quick decisions and collaborative innovations.”The first phase alone will deploy 10,000 NVIDIA Blackwell GPUs spread across various high-performance systems. That makes this Germany’s largest AI deployment ever; a statement the country isn’t content to watch from the sidelines as AI transforms global industry.A Deloitte study recently highlighted the critical importance of AI technology development to Germany’s future competitiveness, particularly noting the need for expanded data centre capacity. When you consider that demand is expected to triple within just five years, this investment seems less like ambition and more like necessity.Robots teaching robotsOne of the early adopters is NEURA Robotics, a German firm that specialises in cognitive robotics. They’re using this computational muscle to power something called the Neuraverse which is essentially a connected network where robots can learn from each other.Think of it as a robotic hive mind for skills ranging from precision welding to household ironing, with each machine contributing its learnings to a collective intelligence.“Physical AI is the electricity of the future—it will power every machine on the planet,” said David Reger, Founder and CEO of NEURA Robotics. “Through this initiative, we’re helping build the sovereign infrastructure Europe needs to lead in intelligent robotics and stay in control of its future.”The implications of this AI project for manufacturing in Germany could be profound. This isn’t just about making existing factories slightly more efficient; it’s about reimagining what manufacturing can be in an age of intelligent machines.AI for more than just Germany’s industrial titansWhat’s particularly promising about this project is its potential reach beyond Germany’s industrial titans. The famed Mittelstand – the network of specialised small and medium-sized businesses that forms the backbone of the German economy – stands to benefit.These companies often lack the resources to build their own AI infrastructure but possess the specialised knowledge that makes them perfect candidates for AI-enhanced innovation. Democratising access to cutting-edge AI could help preserve their competitive edge in a challenging global market.Academic and research institutions will also gain access, potentially accelerating innovation across numerous fields. The approximately 900 Germany-based startups in NVIDIA’s Inception program will be eligible to use these resources, potentially unleashing a wave of entrepreneurial AI applications.However impressive this massive project is, it’s viewed merely as a stepping stone towards something even more ambitious: Europe’s AI gigafactory. This planned 100,000 GPU-powered initiative backed by the EU and Germany won’t come online until 2027, but it represents Europe’s determination to carve out its own technological future.As other European telecom providers follow suit with their own AI infrastructure projects, we may be witnessing the beginning of a concerted effort to establish technological sovereignty across the continent.For a region that has often found itself caught between American tech dominance and Chinese ambitions, building indigenous AI capability represents more than economic opportunity. Whether this bold project in Germany will succeed remains to be seen, but one thing is clear: Europe is no longer content to be a passive consumer of AI technology developed elsewhere.(Photo by Maheshkumar Painam)Want to learn more about AI and big data from industry leaders? Check out AI & Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is co-located with other leading events including Intelligent Automation Conference, BlockX, Digital Transformation Week, and Cyber Security & Cloud Expo.Explore other upcoming enterprise technology events and webinars powered by TechForge here.
    0 Commenti 0 condivisioni
  • On this day: June 14

    June 14

    Killing of Sudbury and Hales

    1381 – During the Peasants' Revolt in England, rebels stormed the Tower of London, killing Simon Sudbury, Lord Chancellor, and Robert Hales, Lord High Treasurer.
    1644 – First English Civil War: Prince Maurice abandoned his siege of Lyme Regis in Dorset after learning of the approach of a Parliamentarian relief force.
    1934 – The landmark Australian Eastern Mission concluded after a three-month diplomatic tour of East and South-East Asia.
    2014 – War in Donbas: An Ilyushin Il-76 transport aircraft of the Ukrainian Air Force was shot down by forces of the self-proclaimed Luhansk People's Republic, killing all 49 people on board.
    QalaherriaqEmmeline PankhurstHeike FriedrichMoon Tae-ilMore anniversaries:
    June 13
    June 14
    June 15

    Archive
    By email
    List of days of the year
    About
    #this #day #june
    On this day: June 14
    June 14 Killing of Sudbury and Hales 1381 – During the Peasants' Revolt in England, rebels stormed the Tower of London, killing Simon Sudbury, Lord Chancellor, and Robert Hales, Lord High Treasurer. 1644 – First English Civil War: Prince Maurice abandoned his siege of Lyme Regis in Dorset after learning of the approach of a Parliamentarian relief force. 1934 – The landmark Australian Eastern Mission concluded after a three-month diplomatic tour of East and South-East Asia. 2014 – War in Donbas: An Ilyushin Il-76 transport aircraft of the Ukrainian Air Force was shot down by forces of the self-proclaimed Luhansk People's Republic, killing all 49 people on board. QalaherriaqEmmeline PankhurstHeike FriedrichMoon Tae-ilMore anniversaries: June 13 June 14 June 15 Archive By email List of days of the year About #this #day #june
    EN.WIKIPEDIA.ORG
    On this day: June 14
    June 14 Killing of Sudbury and Hales 1381 – During the Peasants' Revolt in England, rebels stormed the Tower of London, killing Simon Sudbury, Lord Chancellor, and Robert Hales, Lord High Treasurer (both pictured). 1644 – First English Civil War: Prince Maurice abandoned his siege of Lyme Regis in Dorset after learning of the approach of a Parliamentarian relief force. 1934 – The landmark Australian Eastern Mission concluded after a three-month diplomatic tour of East and South-East Asia. 2014 – War in Donbas: An Ilyushin Il-76 transport aircraft of the Ukrainian Air Force was shot down by forces of the self-proclaimed Luhansk People's Republic, killing all 49 people on board. Qalaherriaq (d. 1856)Emmeline Pankhurst (d. 1928)Heike Friedrich (b. 1976)Moon Tae-il (b. 1994) More anniversaries: June 13 June 14 June 15 Archive By email List of days of the year About
    0 Commenti 0 condivisioni
  • NVIDIA and Deutsche Telekom Partner to Advance Germany’s Sovereign AI

    Industrial AI isn’t slowing down. Germany is ready.
    Following London Tech Week and GTC Paris at VivaTech, NVIDIA founder and CEO Jensen Huang’s European tour continued with a stop in Germany to discuss with Chancellor Friedrich Merz — pictured above — new partnerships poised to bring breakthrough innovations on the world’s first industrial AI cloud.
    This AI factory, to be located in Germany and operated by Deutsche Telekom, will enable Europe’s industrial leaders to accelerate manufacturing applications including design, engineering, simulation, digital twins and robotics.
    “In the era of AI, every manufacturer needs two factories: one for making things, and one for creating the intelligence that powers them,” said Jensen Huang, founder and CEO of NVIDIA. “By building Europe’s first industrial AI infrastructure, we’re enabling the region’s leading industrial companies to advance simulation-first, AI-driven manufacturing.”
    “Europe’s technological future needs a sprint, not a stroll,” said Timotheus Höttges, CEO of Deutsche Telekom AG. “We must seize the opportunities of artificial intelligence now, revolutionize our industry and secure a leading position in the global technology competition. Our economic success depends on quick decisions and collaborative innovations.”
    This AI infrastructure — Germany’s single largest AI deployment — is an important leap for the nation in establishing its own sovereign AI infrastructure and providing a launchpad to accelerate AI development and adoption across industries. In its first phase, it’ll feature 10,000 NVIDIA Blackwell GPUs — spanning NVIDIA DGX B200 systems and NVIDIA RTX PRO Servers — as well as NVIDIA networking and AI software.
    NEURA Robotics’ training center for cognitive robots.
    NEURA Robotics, a Germany-based global pioneer in physical AI and cognitive robotics, will use the computing resources to power its state-of-the-art training centers for cognitive robots — a tangible example of how physical AI can evolve through powerful, connected infrastructure.
    At this work’s core is the Neuraverse, a seamlessly networked robot ecosystem that allows robots to learn from each other across a wide range of industrial and domestic applications. This platform creates an app-store-like hub for robotic intelligence — for tasks like welding and ironing — enabling continuous development and deployment of robotic skills in real-world environments.
    “Physical AI is the electricity of the future — it will power every machine on the planet,” said David Reger, founder and CEO of NEURA Robotics. “Through this initiative, we’re helping build the sovereign infrastructure Europe needs to lead in intelligent robotics and stay in control of its future.”
    Critical to Germany’s competitiveness is AI technology development, including the expansion of data center capacity, according to a Deloitte study. This is strategically important because demand for data center capacity is expected to triple over the next five years to 5 gigawatts.
    Driving Germany’s Industrial Ecosystem
    Deutsche Telekom will operate the AI factory and provide AI cloud computing resources to Europe’s industrial ecosystem.
    Customers will be able to run NVIDIA CUDA-X libraries, as well as NVIDIA RTX- and Omniverse-accelerated workloads from leading software providers such as Siemens, Ansys, Cadence and Rescale.
    Many more stand to benefit. From the country’s robust small- and medium-sized businesses, known as the Mittelstand, to academia, research and major enterprises — the AI factory offers strategic technology leaps.
    A Speedboat Toward AI Gigafactories
    The industrial AI cloud will accelerate AI development and adoption from European manufacturers, driving simulation-first, AI-driven manufacturing practices and helping prepare for the country’s transition to AI gigafactories, the next step in Germany’s sovereign AI infrastructure journey.
    The AI gigafactory initiative is a 100,000 GPU-powered program backed by the European Union, Germany and partners.
    Poised to go online in 2027, it’ll provide state-of-the-art AI infrastructure that gives enterprises, startups, researchers and universities access to accelerated computing through the establishment and expansion of high-performance computing centers.
    As of March, there are about 900 Germany-based members of the NVIDIA Inception program for cutting-edge startups, all of which will be eligible to access the AI resources.
    NVIDIA offers learning courses through its Deep Learning Institute to promote education and certification in AI across the globe, and those resources are broadly available across Germany’s computing ecosystem to offer upskilling opportunities.
    Additional European telcos are building AI infrastructure for regional enterprises to build and deploy agentic AI applications.
    Learn more about the latest AI advancements by watching Huang’s GTC Paris keynote in replay.
    #nvidia #deutsche #telekom #partner #advance
    NVIDIA and Deutsche Telekom Partner to Advance Germany’s Sovereign AI
    Industrial AI isn’t slowing down. Germany is ready. Following London Tech Week and GTC Paris at VivaTech, NVIDIA founder and CEO Jensen Huang’s European tour continued with a stop in Germany to discuss with Chancellor Friedrich Merz — pictured above — new partnerships poised to bring breakthrough innovations on the world’s first industrial AI cloud. This AI factory, to be located in Germany and operated by Deutsche Telekom, will enable Europe’s industrial leaders to accelerate manufacturing applications including design, engineering, simulation, digital twins and robotics. “In the era of AI, every manufacturer needs two factories: one for making things, and one for creating the intelligence that powers them,” said Jensen Huang, founder and CEO of NVIDIA. “By building Europe’s first industrial AI infrastructure, we’re enabling the region’s leading industrial companies to advance simulation-first, AI-driven manufacturing.” “Europe’s technological future needs a sprint, not a stroll,” said Timotheus Höttges, CEO of Deutsche Telekom AG. “We must seize the opportunities of artificial intelligence now, revolutionize our industry and secure a leading position in the global technology competition. Our economic success depends on quick decisions and collaborative innovations.” This AI infrastructure — Germany’s single largest AI deployment — is an important leap for the nation in establishing its own sovereign AI infrastructure and providing a launchpad to accelerate AI development and adoption across industries. In its first phase, it’ll feature 10,000 NVIDIA Blackwell GPUs — spanning NVIDIA DGX B200 systems and NVIDIA RTX PRO Servers — as well as NVIDIA networking and AI software. NEURA Robotics’ training center for cognitive robots. NEURA Robotics, a Germany-based global pioneer in physical AI and cognitive robotics, will use the computing resources to power its state-of-the-art training centers for cognitive robots — a tangible example of how physical AI can evolve through powerful, connected infrastructure. At this work’s core is the Neuraverse, a seamlessly networked robot ecosystem that allows robots to learn from each other across a wide range of industrial and domestic applications. This platform creates an app-store-like hub for robotic intelligence — for tasks like welding and ironing — enabling continuous development and deployment of robotic skills in real-world environments. “Physical AI is the electricity of the future — it will power every machine on the planet,” said David Reger, founder and CEO of NEURA Robotics. “Through this initiative, we’re helping build the sovereign infrastructure Europe needs to lead in intelligent robotics and stay in control of its future.” Critical to Germany’s competitiveness is AI technology development, including the expansion of data center capacity, according to a Deloitte study. This is strategically important because demand for data center capacity is expected to triple over the next five years to 5 gigawatts. Driving Germany’s Industrial Ecosystem Deutsche Telekom will operate the AI factory and provide AI cloud computing resources to Europe’s industrial ecosystem. Customers will be able to run NVIDIA CUDA-X libraries, as well as NVIDIA RTX- and Omniverse-accelerated workloads from leading software providers such as Siemens, Ansys, Cadence and Rescale. Many more stand to benefit. From the country’s robust small- and medium-sized businesses, known as the Mittelstand, to academia, research and major enterprises — the AI factory offers strategic technology leaps. A Speedboat Toward AI Gigafactories The industrial AI cloud will accelerate AI development and adoption from European manufacturers, driving simulation-first, AI-driven manufacturing practices and helping prepare for the country’s transition to AI gigafactories, the next step in Germany’s sovereign AI infrastructure journey. The AI gigafactory initiative is a 100,000 GPU-powered program backed by the European Union, Germany and partners. Poised to go online in 2027, it’ll provide state-of-the-art AI infrastructure that gives enterprises, startups, researchers and universities access to accelerated computing through the establishment and expansion of high-performance computing centers. As of March, there are about 900 Germany-based members of the NVIDIA Inception program for cutting-edge startups, all of which will be eligible to access the AI resources. NVIDIA offers learning courses through its Deep Learning Institute to promote education and certification in AI across the globe, and those resources are broadly available across Germany’s computing ecosystem to offer upskilling opportunities. Additional European telcos are building AI infrastructure for regional enterprises to build and deploy agentic AI applications. Learn more about the latest AI advancements by watching Huang’s GTC Paris keynote in replay. #nvidia #deutsche #telekom #partner #advance
    BLOGS.NVIDIA.COM
    NVIDIA and Deutsche Telekom Partner to Advance Germany’s Sovereign AI
    Industrial AI isn’t slowing down. Germany is ready. Following London Tech Week and GTC Paris at VivaTech, NVIDIA founder and CEO Jensen Huang’s European tour continued with a stop in Germany to discuss with Chancellor Friedrich Merz — pictured above — new partnerships poised to bring breakthrough innovations on the world’s first industrial AI cloud. This AI factory, to be located in Germany and operated by Deutsche Telekom, will enable Europe’s industrial leaders to accelerate manufacturing applications including design, engineering, simulation, digital twins and robotics. “In the era of AI, every manufacturer needs two factories: one for making things, and one for creating the intelligence that powers them,” said Jensen Huang, founder and CEO of NVIDIA. “By building Europe’s first industrial AI infrastructure, we’re enabling the region’s leading industrial companies to advance simulation-first, AI-driven manufacturing.” “Europe’s technological future needs a sprint, not a stroll,” said Timotheus Höttges, CEO of Deutsche Telekom AG. “We must seize the opportunities of artificial intelligence now, revolutionize our industry and secure a leading position in the global technology competition. Our economic success depends on quick decisions and collaborative innovations.” This AI infrastructure — Germany’s single largest AI deployment — is an important leap for the nation in establishing its own sovereign AI infrastructure and providing a launchpad to accelerate AI development and adoption across industries. In its first phase, it’ll feature 10,000 NVIDIA Blackwell GPUs — spanning NVIDIA DGX B200 systems and NVIDIA RTX PRO Servers — as well as NVIDIA networking and AI software. NEURA Robotics’ training center for cognitive robots. NEURA Robotics, a Germany-based global pioneer in physical AI and cognitive robotics, will use the computing resources to power its state-of-the-art training centers for cognitive robots — a tangible example of how physical AI can evolve through powerful, connected infrastructure. At this work’s core is the Neuraverse, a seamlessly networked robot ecosystem that allows robots to learn from each other across a wide range of industrial and domestic applications. This platform creates an app-store-like hub for robotic intelligence — for tasks like welding and ironing — enabling continuous development and deployment of robotic skills in real-world environments. “Physical AI is the electricity of the future — it will power every machine on the planet,” said David Reger, founder and CEO of NEURA Robotics. “Through this initiative, we’re helping build the sovereign infrastructure Europe needs to lead in intelligent robotics and stay in control of its future.” Critical to Germany’s competitiveness is AI technology development, including the expansion of data center capacity, according to a Deloitte study. This is strategically important because demand for data center capacity is expected to triple over the next five years to 5 gigawatts. Driving Germany’s Industrial Ecosystem Deutsche Telekom will operate the AI factory and provide AI cloud computing resources to Europe’s industrial ecosystem. Customers will be able to run NVIDIA CUDA-X libraries, as well as NVIDIA RTX- and Omniverse-accelerated workloads from leading software providers such as Siemens, Ansys, Cadence and Rescale. Many more stand to benefit. From the country’s robust small- and medium-sized businesses, known as the Mittelstand, to academia, research and major enterprises — the AI factory offers strategic technology leaps. A Speedboat Toward AI Gigafactories The industrial AI cloud will accelerate AI development and adoption from European manufacturers, driving simulation-first, AI-driven manufacturing practices and helping prepare for the country’s transition to AI gigafactories, the next step in Germany’s sovereign AI infrastructure journey. The AI gigafactory initiative is a 100,000 GPU-powered program backed by the European Union, Germany and partners. Poised to go online in 2027, it’ll provide state-of-the-art AI infrastructure that gives enterprises, startups, researchers and universities access to accelerated computing through the establishment and expansion of high-performance computing centers. As of March, there are about 900 Germany-based members of the NVIDIA Inception program for cutting-edge startups, all of which will be eligible to access the AI resources. NVIDIA offers learning courses through its Deep Learning Institute to promote education and certification in AI across the globe, and those resources are broadly available across Germany’s computing ecosystem to offer upskilling opportunities. Additional European telcos are building AI infrastructure for regional enterprises to build and deploy agentic AI applications. Learn more about the latest AI advancements by watching Huang’s GTC Paris keynote in replay.
    0 Commenti 0 condivisioni
  • Government to spend £15bn on transport projects outside the South-east

    Schemes include jobs in Liverpool, Bradford and NewcastleRachel Reeves has announced £15bn for transport projects in the north of England, the Midlands and the West Country to stimulate growth outside of the South-east.
    The chancellor unveiled a funding package this morning for a raft of rail, tram and bus projects ahead of the government’s spending review, due next week, which is expected to include cuts to many departmental budgets.
    It is also expected to be part of the government’s 10-year infrastructure strategy, which will be announced later this month.

    Rachel Reeves delivering her speech in Manchester this morning
    Tram schemes have been handed the biggest investments, including £2.5bn to extend Manchester’s network to Stockport and £2.4bn to expand Birmingham’s network to the city’s planned ‘sports quarter’.
    A long-awaited tram network in West Yorkshire will get £2.1bn to start construction of the first two lines by 2028, along with new bus stations in Bradford and Wakefield, while South Yorkshire’s tram network has been handed £2.1bn for renewal works and bus service.
    Liverpool has been allocated £1.6bn to improve links to locations in the city including the new Everton Stadium, and the North East will get £1.8bn to extend the Newcastle to Sunderland Metro via Washington.
    Other funding packages include £2bn for the East Midlands to improve road, rail and bus links between Derby and Nottingham and £800m for rail upgrades in the West of England.
    Some of these projects were part of former prime minister Rishi Sunak’s Network North plan, which backed schemes including the West Yorkshire tram system to compensate for the decision to scrap HS2 north of Birmingham.
    Network North was put on ice following Labour’s election victory last year after Reeves claimed the programme had not been fully funded.
    The money will be part of a five-year funding allocation from 2027/28 to 2031/32. 

    >> Also read: It’s time for trams – and Britain needs to catch up
    >> Also read: Traffic in Towns: 60 years on from Colin Buchanan’s prophetic report
    #government #spend #15bn #transport #projects
    Government to spend £15bn on transport projects outside the South-east
    Schemes include jobs in Liverpool, Bradford and NewcastleRachel Reeves has announced £15bn for transport projects in the north of England, the Midlands and the West Country to stimulate growth outside of the South-east. The chancellor unveiled a funding package this morning for a raft of rail, tram and bus projects ahead of the government’s spending review, due next week, which is expected to include cuts to many departmental budgets. It is also expected to be part of the government’s 10-year infrastructure strategy, which will be announced later this month. Rachel Reeves delivering her speech in Manchester this morning Tram schemes have been handed the biggest investments, including £2.5bn to extend Manchester’s network to Stockport and £2.4bn to expand Birmingham’s network to the city’s planned ‘sports quarter’. A long-awaited tram network in West Yorkshire will get £2.1bn to start construction of the first two lines by 2028, along with new bus stations in Bradford and Wakefield, while South Yorkshire’s tram network has been handed £2.1bn for renewal works and bus service. Liverpool has been allocated £1.6bn to improve links to locations in the city including the new Everton Stadium, and the North East will get £1.8bn to extend the Newcastle to Sunderland Metro via Washington. Other funding packages include £2bn for the East Midlands to improve road, rail and bus links between Derby and Nottingham and £800m for rail upgrades in the West of England. Some of these projects were part of former prime minister Rishi Sunak’s Network North plan, which backed schemes including the West Yorkshire tram system to compensate for the decision to scrap HS2 north of Birmingham. Network North was put on ice following Labour’s election victory last year after Reeves claimed the programme had not been fully funded. The money will be part of a five-year funding allocation from 2027/28 to 2031/32.  >> Also read: It’s time for trams – and Britain needs to catch up >> Also read: Traffic in Towns: 60 years on from Colin Buchanan’s prophetic report #government #spend #15bn #transport #projects
    WWW.BDONLINE.CO.UK
    Government to spend £15bn on transport projects outside the South-east
    Schemes include jobs in Liverpool, Bradford and NewcastleRachel Reeves has announced £15bn for transport projects in the north of England, the Midlands and the West Country to stimulate growth outside of the South-east. The chancellor unveiled a funding package this morning for a raft of rail, tram and bus projects ahead of the government’s spending review, due next week, which is expected to include cuts to many departmental budgets. It is also expected to be part of the government’s 10-year infrastructure strategy, which will be announced later this month. Rachel Reeves delivering her speech in Manchester this morning Tram schemes have been handed the biggest investments, including £2.5bn to extend Manchester’s network to Stockport and £2.4bn to expand Birmingham’s network to the city’s planned ‘sports quarter’. A long-awaited tram network in West Yorkshire will get £2.1bn to start construction of the first two lines by 2028, along with new bus stations in Bradford and Wakefield, while South Yorkshire’s tram network has been handed £2.1bn for renewal works and bus service. Liverpool has been allocated £1.6bn to improve links to locations in the city including the new Everton Stadium, and the North East will get £1.8bn to extend the Newcastle to Sunderland Metro via Washington. Other funding packages include £2bn for the East Midlands to improve road, rail and bus links between Derby and Nottingham and £800m for rail upgrades in the West of England. Some of these projects were part of former prime minister Rishi Sunak’s Network North plan, which backed schemes including the West Yorkshire tram system to compensate for the decision to scrap HS2 north of Birmingham. Network North was put on ice following Labour’s election victory last year after Reeves claimed the programme had not been fully funded. The money will be part of a five-year funding allocation from 2027/28 to 2031/32.  >> Also read: It’s time for trams – and Britain needs to catch up >> Also read: Traffic in Towns: 60 years on from Colin Buchanan’s prophetic report
    Like
    Love
    Wow
    Angry
    Sad
    269
    0 Commenti 0 condivisioni
  • Ballerina Review: Ana de Armas Vehicle Doesn’t Hold A Candle To the John Wick Movies

    Ballerina is what happens when a studio wants to extend a franchise but really has no reason to do so except a financial one. Subtitled From The World of John Wick, this action thriller contains too much action and precious little thrills. Directedby Len Wiseman of Underworld fame, Ballerina is set in the same universe as the four majestic adrenaline epics starring Keanu Reeves, and incorporates as many elements from those films as possible, including the Continental Hotel and the Ruska Roma, not to mention appearances from Ian McShane, Anjelica Huston, the late, great Lance Reddick, and Mr. Reeves himself.
    But what is also found in ample supply in the John Wick movies and sadly missing in Ballerina is heart, character, and a sense of conviction. At the center of the movie is a miscast, utterly bland Ana de Armas as Eve Macarro, whose father’s death sent her as a little girl into the custody of McShane’s Winston Scott and, eventually, the tutelage of the Directorof the Ruska Roma ballet/assassin school. It’s there that Eve goes through the usual training montage, with her inability to dance only matched by her evident aptitude at killing and fighting.

    Once her training is complete, Eve is sent out into the world on Ruska Roma business, but of course her main goal is avenging her dad, who was killed by members of a mysterious cult led by the enigmatic Chancellor. No sooner can you say “she’s gone rogue” than she does just that, jetting off to Prague in pursuit of a cult memberwho’s trying to get himself and his own little daughter out from under the Chancellor’s thumb, while finding herself at odds with the Director and pursued by the Chancellor’s minions at every turn.
    The movie’s thin “lady vengeance” premise, which we’ve seen countless times before, is reheated once again by screenwriter Shay Hatten, who has co-written the last two John Wick entries but seems lost here. Unlike John Wick himself, whose single-minded quest for revenge over the death of his dog took on mythic overtones as more layers to both John and the surreal world of elegant criminality in which he moved were revealed, Eve has nothing to define her that hasn’t been done or said before. It doesn’t help that Armas, while up to the role’s physicality, offers nothing in terms of personality—she’s an empty vessel. Which is a shame, since she’s displayed earthiness, complexity, and a sexy playfulnessin previous work.

    The rest of the non-Wick cast is forgettable as well, with Byrne’s Chancellor and his entire regime badly underdeveloped, and Reedus completely wasted in what amounts to maybe two scenes. McShane, Reddick, and Huston just go through their paces, spouting lots of portentous lines about “choice” and “fate” that ring mostly hollow, as does a late-stage twist that carries no weight because one of the characters involved barely registers.
    As for the Baba Yaga himself, the largely non-verbal Reeves is the “Chekhov’s gun” of the film: introduced briefly in the first act, he inevitably turns up again in the third act, parachuted in by the magic of rumored reshoots even though his contribution to the narrative amounts to absolutely nothing. It’s always nice to see him, but if you took him out, it wouldn’t drastically change the picture.
    Speaking of reshoots, there’s a Frankenstein nature to the proceedings that provides evidence for the reports that Wick directorChad Stahelski refilmed much of the movie after Wiseman’s first draft came up short. While the first act is a murky, enervated slog, things seem to pick up in the middle, with a more eye-catching color scheme, a creative, free-flowing use of the camera, and some of the more inventive, oddball action that has become part and parcel of the franchise—most notably in a scene where de Armas and an enemy smash a pile of dinner plates over each other’s heads with manic Three Stooges-like energy.
    Unfortunately, there’s also a sadistic edge to a lot of the action this time as well, particularly in a climactic fight involving flamethrowers that badly wants to emulate the famous overhead apartment shot from John Wick: Chapter 4 but goes on for far too long and ultimately becomes actively unpleasant. That’s a problem with even the better action on hand in Ballerina, as if the filmmakers want to make up for the film’s deficiencies by overdoing what the series is best known for.
    Hatten’s script was an original piece that was rewritten to fit into the John Wick universe, with elements introduced in John Wick: Chapter 3 – Parabellum to pave the way for the arrival of Eve and Ballerina. But this reverse engineering highlights the pitfalls of trying to create a cinematic universe without stopping to wonder whether it’s a good idea.
    Watching John Wick stonily fight and slaughter his way through his off-center world and its population of funky, eccentric weirdos has been fantastic funbecause of the unique nature of the character and that world. But dropping the more conventional, cliched tropes of Ballerina into the mix, along with a protagonistnot nearly as compelling, only exemplifies that the John Wick movies are character-driven first and foremost. All the brutal action, heavy-handed callbacks, and predictable cameos in the world can’t make this Ballerina into a better dancer.

    Ballerina opens in theaters in the U.S. on Friday, June 6.

    Join our mailing list
    Get the best of Den of Geek delivered right to your inbox!
    #ballerina #review #ana #armas #vehicle
    Ballerina Review: Ana de Armas Vehicle Doesn’t Hold A Candle To the John Wick Movies
    Ballerina is what happens when a studio wants to extend a franchise but really has no reason to do so except a financial one. Subtitled From The World of John Wick, this action thriller contains too much action and precious little thrills. Directedby Len Wiseman of Underworld fame, Ballerina is set in the same universe as the four majestic adrenaline epics starring Keanu Reeves, and incorporates as many elements from those films as possible, including the Continental Hotel and the Ruska Roma, not to mention appearances from Ian McShane, Anjelica Huston, the late, great Lance Reddick, and Mr. Reeves himself. But what is also found in ample supply in the John Wick movies and sadly missing in Ballerina is heart, character, and a sense of conviction. At the center of the movie is a miscast, utterly bland Ana de Armas as Eve Macarro, whose father’s death sent her as a little girl into the custody of McShane’s Winston Scott and, eventually, the tutelage of the Directorof the Ruska Roma ballet/assassin school. It’s there that Eve goes through the usual training montage, with her inability to dance only matched by her evident aptitude at killing and fighting. Once her training is complete, Eve is sent out into the world on Ruska Roma business, but of course her main goal is avenging her dad, who was killed by members of a mysterious cult led by the enigmatic Chancellor. No sooner can you say “she’s gone rogue” than she does just that, jetting off to Prague in pursuit of a cult memberwho’s trying to get himself and his own little daughter out from under the Chancellor’s thumb, while finding herself at odds with the Director and pursued by the Chancellor’s minions at every turn. The movie’s thin “lady vengeance” premise, which we’ve seen countless times before, is reheated once again by screenwriter Shay Hatten, who has co-written the last two John Wick entries but seems lost here. Unlike John Wick himself, whose single-minded quest for revenge over the death of his dog took on mythic overtones as more layers to both John and the surreal world of elegant criminality in which he moved were revealed, Eve has nothing to define her that hasn’t been done or said before. It doesn’t help that Armas, while up to the role’s physicality, offers nothing in terms of personality—she’s an empty vessel. Which is a shame, since she’s displayed earthiness, complexity, and a sexy playfulnessin previous work. The rest of the non-Wick cast is forgettable as well, with Byrne’s Chancellor and his entire regime badly underdeveloped, and Reedus completely wasted in what amounts to maybe two scenes. McShane, Reddick, and Huston just go through their paces, spouting lots of portentous lines about “choice” and “fate” that ring mostly hollow, as does a late-stage twist that carries no weight because one of the characters involved barely registers. As for the Baba Yaga himself, the largely non-verbal Reeves is the “Chekhov’s gun” of the film: introduced briefly in the first act, he inevitably turns up again in the third act, parachuted in by the magic of rumored reshoots even though his contribution to the narrative amounts to absolutely nothing. It’s always nice to see him, but if you took him out, it wouldn’t drastically change the picture. Speaking of reshoots, there’s a Frankenstein nature to the proceedings that provides evidence for the reports that Wick directorChad Stahelski refilmed much of the movie after Wiseman’s first draft came up short. While the first act is a murky, enervated slog, things seem to pick up in the middle, with a more eye-catching color scheme, a creative, free-flowing use of the camera, and some of the more inventive, oddball action that has become part and parcel of the franchise—most notably in a scene where de Armas and an enemy smash a pile of dinner plates over each other’s heads with manic Three Stooges-like energy. Unfortunately, there’s also a sadistic edge to a lot of the action this time as well, particularly in a climactic fight involving flamethrowers that badly wants to emulate the famous overhead apartment shot from John Wick: Chapter 4 but goes on for far too long and ultimately becomes actively unpleasant. That’s a problem with even the better action on hand in Ballerina, as if the filmmakers want to make up for the film’s deficiencies by overdoing what the series is best known for. Hatten’s script was an original piece that was rewritten to fit into the John Wick universe, with elements introduced in John Wick: Chapter 3 – Parabellum to pave the way for the arrival of Eve and Ballerina. But this reverse engineering highlights the pitfalls of trying to create a cinematic universe without stopping to wonder whether it’s a good idea. Watching John Wick stonily fight and slaughter his way through his off-center world and its population of funky, eccentric weirdos has been fantastic funbecause of the unique nature of the character and that world. But dropping the more conventional, cliched tropes of Ballerina into the mix, along with a protagonistnot nearly as compelling, only exemplifies that the John Wick movies are character-driven first and foremost. All the brutal action, heavy-handed callbacks, and predictable cameos in the world can’t make this Ballerina into a better dancer. Ballerina opens in theaters in the U.S. on Friday, June 6. Join our mailing list Get the best of Den of Geek delivered right to your inbox! #ballerina #review #ana #armas #vehicle
    WWW.DENOFGEEK.COM
    Ballerina Review: Ana de Armas Vehicle Doesn’t Hold A Candle To the John Wick Movies
    Ballerina is what happens when a studio wants to extend a franchise but really has no reason to do so except a financial one. Subtitled From The World of John Wick, this action thriller contains too much action and precious little thrills. Directed (maybe) by Len Wiseman of Underworld fame, Ballerina is set in the same universe as the four majestic adrenaline epics starring Keanu Reeves, and incorporates as many elements from those films as possible, including the Continental Hotel and the Ruska Roma, not to mention appearances from Ian McShane, Anjelica Huston, the late, great Lance Reddick, and Mr. Reeves himself. But what is also found in ample supply in the John Wick movies and sadly missing in Ballerina is heart, character, and a sense of conviction. At the center of the movie is a miscast, utterly bland Ana de Armas as Eve Macarro, whose father’s death sent her as a little girl into the custody of McShane’s Winston Scott and, eventually, the tutelage of the Director (Huston) of the Ruska Roma ballet/assassin school. It’s there that Eve goes through the usual training montage, with her inability to dance only matched by her evident aptitude at killing and fighting. Once her training is complete, Eve is sent out into the world on Ruska Roma business, but of course her main goal is avenging her dad, who was killed by members of a mysterious cult led by the enigmatic Chancellor (Gabriel Byrne). No sooner can you say “she’s gone rogue” than she does just that, jetting off to Prague in pursuit of a cult member (Norman Reedus) who’s trying to get himself and his own little daughter out from under the Chancellor’s thumb, while finding herself at odds with the Director and pursued by the Chancellor’s minions at every turn. The movie’s thin “lady vengeance” premise, which we’ve seen countless times before, is reheated once again by screenwriter Shay Hatten, who has co-written the last two John Wick entries but seems lost here. Unlike John Wick himself, whose single-minded quest for revenge over the death of his dog took on mythic overtones as more layers to both John and the surreal world of elegant criminality in which he moved were revealed, Eve has nothing to define her that hasn’t been done or said before. It doesn’t help that Armas, while up to the role’s physicality, offers nothing in terms of personality—she’s an empty vessel. Which is a shame, since she’s displayed earthiness (Knives Out), complexity (Blonde), and a sexy playfulness (No Time to Die) in previous work. The rest of the non-Wick cast is forgettable as well, with Byrne’s Chancellor and his entire regime badly underdeveloped, and Reedus completely wasted in what amounts to maybe two scenes. McShane, Reddick, and Huston just go through their paces, spouting lots of portentous lines about “choice” and “fate” that ring mostly hollow, as does a late-stage twist that carries no weight because one of the characters involved barely registers. As for the Baba Yaga himself, the largely non-verbal Reeves is the “Chekhov’s gun” of the film: introduced briefly in the first act, he inevitably turns up again in the third act, parachuted in by the magic of rumored reshoots even though his contribution to the narrative amounts to absolutely nothing. It’s always nice to see him, but if you took him out, it wouldn’t drastically change the picture. Speaking of reshoots, there’s a Frankenstein nature to the proceedings that provides evidence for the reports that Wick director (and franchise torch-bearer) Chad Stahelski refilmed much of the movie after Wiseman’s first draft came up short. While the first act is a murky, enervated slog, things seem to pick up in the middle, with a more eye-catching color scheme (such as a sequence in a neon-lit club reminiscent of a similar scene in the magnificent John Wick: Chapter 4), a creative, free-flowing use of the camera, and some of the more inventive, oddball action that has become part and parcel of the franchise—most notably in a scene where de Armas and an enemy smash a pile of dinner plates over each other’s heads with manic Three Stooges-like energy. Unfortunately, there’s also a sadistic edge to a lot of the action this time as well, particularly in a climactic fight involving flamethrowers that badly wants to emulate the famous overhead apartment shot from John Wick: Chapter 4 but goes on for far too long and ultimately becomes actively unpleasant. That’s a problem with even the better action on hand in Ballerina, as if the filmmakers want to make up for the film’s deficiencies by overdoing what the series is best known for. Hatten’s script was an original piece that was rewritten to fit into the John Wick universe, with elements introduced in John Wick: Chapter 3 – Parabellum to pave the way for the arrival of Eve and Ballerina. But this reverse engineering highlights the pitfalls of trying to create a cinematic universe without stopping to wonder whether it’s a good idea. Watching John Wick stonily fight and slaughter his way through his off-center world and its population of funky, eccentric weirdos has been fantastic fun (the threat of an arc-undermining John Wick 5 notwithstanding) because of the unique nature of the character and that world. But dropping the more conventional, cliched tropes of Ballerina into the mix, along with a protagonist (and actor) not nearly as compelling, only exemplifies that the John Wick movies are character-driven first and foremost. All the brutal action, heavy-handed callbacks, and predictable cameos in the world can’t make this Ballerina into a better dancer. Ballerina opens in theaters in the U.S. on Friday, June 6. Join our mailing list Get the best of Den of Geek delivered right to your inbox!
    Like
    Love
    Wow
    Sad
    Angry
    249
    0 Commenti 0 condivisioni
  • Germany is considering a 10 percent digital service tax on US tech giants

    Under new Chancellor Friedrich Merz, Germany could impose a new 10 percent tax on major online platforms such as Google and Facebook. Reuters reported that political factions in the country struck a deal earlier this year to pursue these fees for digital service companies.
    "These corporations do billions in business in Germany with extremely high profit margins and benefit enormously from the country’s media and cultural output as well as its infrastructure — but they pay hardly any taxes, invest too little, and give far too little back to society," Germany's Culture Minister Wolfram Weimer said of the draft rule during an interview with the magazine Stern.
    Other nations around the world have also explored and enacted taxes on online revenue generated by the largest internet tech companies. Britain, France, Italy, Spain, Turkey, India, Austria and Canada have similar legislation to the draft rule Germany's culture minister is proposing, according to Reuters.
    If the tax is passed, Germany could see retaliation from President Donald Trump's administration. Trump had said in February that he would seek tariffs on nations that impose a digital service tax on US tech businesses.This article originally appeared on Engadget at
    #germany #considering #percent #digital #service
    Germany is considering a 10 percent digital service tax on US tech giants
    Under new Chancellor Friedrich Merz, Germany could impose a new 10 percent tax on major online platforms such as Google and Facebook. Reuters reported that political factions in the country struck a deal earlier this year to pursue these fees for digital service companies. "These corporations do billions in business in Germany with extremely high profit margins and benefit enormously from the country’s media and cultural output as well as its infrastructure — but they pay hardly any taxes, invest too little, and give far too little back to society," Germany's Culture Minister Wolfram Weimer said of the draft rule during an interview with the magazine Stern. Other nations around the world have also explored and enacted taxes on online revenue generated by the largest internet tech companies. Britain, France, Italy, Spain, Turkey, India, Austria and Canada have similar legislation to the draft rule Germany's culture minister is proposing, according to Reuters. If the tax is passed, Germany could see retaliation from President Donald Trump's administration. Trump had said in February that he would seek tariffs on nations that impose a digital service tax on US tech businesses.This article originally appeared on Engadget at #germany #considering #percent #digital #service
    WWW.ENGADGET.COM
    Germany is considering a 10 percent digital service tax on US tech giants
    Under new Chancellor Friedrich Merz, Germany could impose a new 10 percent tax on major online platforms such as Google and Facebook. Reuters reported that political factions in the country struck a deal earlier this year to pursue these fees for digital service companies. "These corporations do billions in business in Germany with extremely high profit margins and benefit enormously from the country’s media and cultural output as well as its infrastructure — but they pay hardly any taxes, invest too little, and give far too little back to society," Germany's Culture Minister Wolfram Weimer said of the draft rule during an interview with the magazine Stern. Other nations around the world have also explored and enacted taxes on online revenue generated by the largest internet tech companies. Britain, France, Italy, Spain, Turkey, India, Austria and Canada have similar legislation to the draft rule Germany's culture minister is proposing, according to Reuters. If the tax is passed, Germany could see retaliation from President Donald Trump's administration. Trump had said in February that he would seek tariffs on nations that impose a digital service tax on US tech businesses.This article originally appeared on Engadget at https://www.engadget.com/big-tech/germany-is-considering-a-10-percent-digital-service-tax-on-us-tech-giants-195705330.html?src=rss
    0 Commenti 0 condivisioni
  • NCSU CIO Marc Hoit Talks Fed Funding Limbo, AI’s Role in Shrinking Talent Pool

    Shane Snider, Senior Writer, InformationWeekMay 30, 20254 Min ReadPaul Hamilton via Alamy StockWhen Marc Hoit came to North Carolina State Universityin 2008 to take on the role of vice chancellor for information technology and chief information officer, the school and its IT operation looked much different.Hoit had left his role as Interim CIO at the University of Florida, where he was also a professional in structural engineering.At the time, NC State had an IT staff of about 210 and an annual budget of million. Fast forward to 2025, and Hoit now oversees a bigger department with a budget of million. NCSU has a total of 39,603 students.Aside from taking care of the university’s massive IT needs, Hoit’s department must also lend a hand to research initiatives and academic computing needs. Before Hoit’s arrival, those functions were handled by separate departments. The administration decided to merge the functions under one CIO.“They wanted a lot of the IT to be centralized,” Hoit says in a live interview with InformationWeek. “We had a lot of pieces and had to decide how much we could centralize … It balanced out nicely.”That unified approach would prove to be beneficial, especially as technology was advancing at an unprecedented pace. While many find the pace of innovation dizzying, Hoit has a different viewpoint.Related:Marc Hoit, North Carolina State University“Really, the pace of the fundamentals has not rapidly changed,” he says. “Networking is networking. You have to ask: Do I need fiber instead of copper? Do I need bigger servers? Do I need to change routing protocols? Those are the operational pieces that make it work. You have to change, but the high-level strategy stays the same. We need to register students … we need to make that easier. We need to give them classes. We need to give them grades … those needs are consistent.”The Trump EffectThe Trump Administration’s rapid cost-cutting measures hit research universities especially hard. Just this week, the attorneys general of 16 states filed a lawsuit to block the administration from making massive federal funding cuts for research. And earlier this month, 13 US universities sued to block Trump’s cuts to research funding by the National Science Foundation. Cuts from the National Institutes of Healthand the US Department of Energy also sought to cap funds for research.Hoit says people may want to see less government spending but may not realize that the university already picks up a substantial share of the costs for those research projects. “We’ll have to adjust and figure out what to do, and that may mean that grants that paid for some expensive equipment … the university will have to pick up those on its own. And that might be difficult to accomplish.”Related:Hoit says NCSU is in a somewhat better position because its research funding is more spread out than some public institutions. “If you were a big NIH grant recipient with a medical school and a lot of money company from grants, you probably got hit harder. In our case, we have a very interesting portfolio with a broader mix of funding. And we have a lot of industry funding and partnerships.”The Trump administration’s aggressive tariff policies have also impacted universities, who must attempt to budget for hardware needs without knowing the ultimate impact of the trade war. On Wednesday, the US Court of International Trade halted the administration's sweeping tariffs on goods imported from foreign nations. But legal experts warn that the block may be temporary as the administration expects to appeal and use other potential workarounds.Hoit says the university learned lessons from the first Trump administration. “The writing was kind of on the wall then,” he says. “But a lot of the vendors are trying their best to manufacture in the US or to manufacture in lower tariff countries and to move out of the problematic ones.”Related:He said the COVID 19 pandemic was also a learning opportunity for dealing with massive supply chain disruptions. “taught us that the supply chain that we relied on to be super-fast, integrated and efficient … you can’t really rely on that.”Shrinking Talent Pool and AI SolutionAccording to the National Center for Education Statistics, colleges and universities saw a 15% drop in enrollment between 2010 and 2021. NCSU has largely bucked that trend because of explosive growth in the Research Triangle Park area of the state. But the drop in higher education ambition has created another problem for IT leaders in general: A shrinking talent pool. That’s true at the university level as well.AI could help bridge the talent gap but could cause interest to dwindle in certain tech careers.“I keep telling my civil engineering peers that the world is changing,” Hoit says. “If you can write a code that gives you the formulas and process steps in order to build a bridge, why do I need an engineer? Why don’t I just feed that to AI and let it build it. When I started teaching, I would tell people, go be a civil engineer … you’ll have a career for life. In the last three years, I’ve started thinking, ‘Hmm … How many civil engineers are we really going to need?”About the AuthorShane SniderSenior Writer, InformationWeekShane Snider is a veteran journalist with more than 20 years of industry experience. He started his career as a general assignment reporter and has covered government, business, education, technology and much more. He was a reporter for the Triangle Business Journal, Raleigh News and Observer and most recently a tech reporter for CRN. He was also a top wedding photographer for many years, traveling across the country and around the world. He lives in Raleigh with his wife and two children.See more from Shane SniderWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    #ncsu #cio #marc #hoit #talks
    NCSU CIO Marc Hoit Talks Fed Funding Limbo, AI’s Role in Shrinking Talent Pool
    Shane Snider, Senior Writer, InformationWeekMay 30, 20254 Min ReadPaul Hamilton via Alamy StockWhen Marc Hoit came to North Carolina State Universityin 2008 to take on the role of vice chancellor for information technology and chief information officer, the school and its IT operation looked much different.Hoit had left his role as Interim CIO at the University of Florida, where he was also a professional in structural engineering.At the time, NC State had an IT staff of about 210 and an annual budget of million. Fast forward to 2025, and Hoit now oversees a bigger department with a budget of million. NCSU has a total of 39,603 students.Aside from taking care of the university’s massive IT needs, Hoit’s department must also lend a hand to research initiatives and academic computing needs. Before Hoit’s arrival, those functions were handled by separate departments. The administration decided to merge the functions under one CIO.“They wanted a lot of the IT to be centralized,” Hoit says in a live interview with InformationWeek. “We had a lot of pieces and had to decide how much we could centralize … It balanced out nicely.”That unified approach would prove to be beneficial, especially as technology was advancing at an unprecedented pace. While many find the pace of innovation dizzying, Hoit has a different viewpoint.Related:Marc Hoit, North Carolina State University“Really, the pace of the fundamentals has not rapidly changed,” he says. “Networking is networking. You have to ask: Do I need fiber instead of copper? Do I need bigger servers? Do I need to change routing protocols? Those are the operational pieces that make it work. You have to change, but the high-level strategy stays the same. We need to register students … we need to make that easier. We need to give them classes. We need to give them grades … those needs are consistent.”The Trump EffectThe Trump Administration’s rapid cost-cutting measures hit research universities especially hard. Just this week, the attorneys general of 16 states filed a lawsuit to block the administration from making massive federal funding cuts for research. And earlier this month, 13 US universities sued to block Trump’s cuts to research funding by the National Science Foundation. Cuts from the National Institutes of Healthand the US Department of Energy also sought to cap funds for research.Hoit says people may want to see less government spending but may not realize that the university already picks up a substantial share of the costs for those research projects. “We’ll have to adjust and figure out what to do, and that may mean that grants that paid for some expensive equipment … the university will have to pick up those on its own. And that might be difficult to accomplish.”Related:Hoit says NCSU is in a somewhat better position because its research funding is more spread out than some public institutions. “If you were a big NIH grant recipient with a medical school and a lot of money company from grants, you probably got hit harder. In our case, we have a very interesting portfolio with a broader mix of funding. And we have a lot of industry funding and partnerships.”The Trump administration’s aggressive tariff policies have also impacted universities, who must attempt to budget for hardware needs without knowing the ultimate impact of the trade war. On Wednesday, the US Court of International Trade halted the administration's sweeping tariffs on goods imported from foreign nations. But legal experts warn that the block may be temporary as the administration expects to appeal and use other potential workarounds.Hoit says the university learned lessons from the first Trump administration. “The writing was kind of on the wall then,” he says. “But a lot of the vendors are trying their best to manufacture in the US or to manufacture in lower tariff countries and to move out of the problematic ones.”Related:He said the COVID 19 pandemic was also a learning opportunity for dealing with massive supply chain disruptions. “taught us that the supply chain that we relied on to be super-fast, integrated and efficient … you can’t really rely on that.”Shrinking Talent Pool and AI SolutionAccording to the National Center for Education Statistics, colleges and universities saw a 15% drop in enrollment between 2010 and 2021. NCSU has largely bucked that trend because of explosive growth in the Research Triangle Park area of the state. But the drop in higher education ambition has created another problem for IT leaders in general: A shrinking talent pool. That’s true at the university level as well.AI could help bridge the talent gap but could cause interest to dwindle in certain tech careers.“I keep telling my civil engineering peers that the world is changing,” Hoit says. “If you can write a code that gives you the formulas and process steps in order to build a bridge, why do I need an engineer? Why don’t I just feed that to AI and let it build it. When I started teaching, I would tell people, go be a civil engineer … you’ll have a career for life. In the last three years, I’ve started thinking, ‘Hmm … How many civil engineers are we really going to need?”About the AuthorShane SniderSenior Writer, InformationWeekShane Snider is a veteran journalist with more than 20 years of industry experience. He started his career as a general assignment reporter and has covered government, business, education, technology and much more. He was a reporter for the Triangle Business Journal, Raleigh News and Observer and most recently a tech reporter for CRN. He was also a top wedding photographer for many years, traveling across the country and around the world. He lives in Raleigh with his wife and two children.See more from Shane SniderWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like #ncsu #cio #marc #hoit #talks
    WWW.INFORMATIONWEEK.COM
    NCSU CIO Marc Hoit Talks Fed Funding Limbo, AI’s Role in Shrinking Talent Pool
    Shane Snider, Senior Writer, InformationWeekMay 30, 20254 Min ReadPaul Hamilton via Alamy StockWhen Marc Hoit came to North Carolina State University (NCSU) in 2008 to take on the role of vice chancellor for information technology and chief information officer, the school and its IT operation looked much different.Hoit had left his role as Interim CIO at the University of Florida, where he was also a professional in structural engineering.At the time, NC State had an IT staff of about 210 and an annual budget of $34 million. Fast forward to 2025, and Hoit now oversees a bigger department with a budget of $72 million. NCSU has a total of 39,603 students.Aside from taking care of the university’s massive IT needs, Hoit’s department must also lend a hand to research initiatives and academic computing needs. Before Hoit’s arrival, those functions were handled by separate departments. The administration decided to merge the functions under one CIO.“They wanted a lot of the IT to be centralized,” Hoit says in a live interview with InformationWeek. “We had a lot of pieces and had to decide how much we could centralize … It balanced out nicely.”That unified approach would prove to be beneficial, especially as technology was advancing at an unprecedented pace. While many find the pace of innovation dizzying, Hoit has a different viewpoint.Related:Marc Hoit, North Carolina State University“Really, the pace of the fundamentals has not rapidly changed,” he says. “Networking is networking. You have to ask: Do I need fiber instead of copper? Do I need bigger servers? Do I need to change routing protocols? Those are the operational pieces that make it work. You have to change, but the high-level strategy stays the same. We need to register students … we need to make that easier. We need to give them classes. We need to give them grades … those needs are consistent.”The Trump EffectThe Trump Administration’s rapid cost-cutting measures hit research universities especially hard. Just this week, the attorneys general of 16 states filed a lawsuit to block the administration from making massive federal funding cuts for research. And earlier this month, 13 US universities sued to block Trump’s cuts to research funding by the National Science Foundation. Cuts from the National Institutes of Health (NIH) and the US Department of Energy also sought to cap funds for research.Hoit says people may want to see less government spending but may not realize that the university already picks up a substantial share of the costs for those research projects. “We’ll have to adjust and figure out what to do, and that may mean that grants that paid for some expensive equipment … the university will have to pick up those on its own. And that might be difficult to accomplish.”Related:Hoit says NCSU is in a somewhat better position because its research funding is more spread out than some public institutions. “If you were a big NIH grant recipient with a medical school and a lot of money company from grants, you probably got hit harder. In our case, we have a very interesting portfolio with a broader mix of funding. And we have a lot of industry funding and partnerships.”The Trump administration’s aggressive tariff policies have also impacted universities, who must attempt to budget for hardware needs without knowing the ultimate impact of the trade war. On Wednesday, the US Court of International Trade halted the administration's sweeping tariffs on goods imported from foreign nations. But legal experts warn that the block may be temporary as the administration expects to appeal and use other potential workarounds.Hoit says the university learned lessons from the first Trump administration. “The writing was kind of on the wall then,” he says. “But a lot of the vendors are trying their best to manufacture in the US or to manufacture in lower tariff countries and to move out of the problematic ones.”Related:He said the COVID 19 pandemic was also a learning opportunity for dealing with massive supply chain disruptions. “[The pandemic] taught us that the supply chain that we relied on to be super-fast, integrated and efficient … you can’t really rely on that.”Shrinking Talent Pool and AI SolutionAccording to the National Center for Education Statistics (NCES), colleges and universities saw a 15% drop in enrollment between 2010 and 2021. NCSU has largely bucked that trend because of explosive growth in the Research Triangle Park area of the state. But the drop in higher education ambition has created another problem for IT leaders in general: A shrinking talent pool. That’s true at the university level as well.AI could help bridge the talent gap but could cause interest to dwindle in certain tech careers.“I keep telling my civil engineering peers that the world is changing,” Hoit says. “If you can write a code that gives you the formulas and process steps in order to build a bridge, why do I need an engineer? Why don’t I just feed that to AI and let it build it. When I started teaching, I would tell people, go be a civil engineer … you’ll have a career for life. In the last three years, I’ve started thinking, ‘Hmm … How many civil engineers are we really going to need?”About the AuthorShane SniderSenior Writer, InformationWeekShane Snider is a veteran journalist with more than 20 years of industry experience. He started his career as a general assignment reporter and has covered government, business, education, technology and much more. He was a reporter for the Triangle Business Journal, Raleigh News and Observer and most recently a tech reporter for CRN. He was also a top wedding photographer for many years, traveling across the country and around the world. He lives in Raleigh with his wife and two children.See more from Shane SniderWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
    0 Commenti 0 condivisioni
  • Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs

    Cyber threats don't show up one at a time anymore. They're layered, planned, and often stay hidden until it's too late.
    For cybersecurity teams, the key isn't just reacting to alerts—it's spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With today's complex systems, we need focused analysis—not noise.
    What you'll see here isn't just a list of incidents, but a clear look at where control is being gained, lost, or quietly tested.
    Threat of the Week
    Lumma Stealer, DanaBot Operations Disrupted — A coalition of private sector companies and law enforcement agencies have taken down the infrastructure associated with Lumma Stealer and DanaBot. Charges have also been unsealed against 16 individuals for their alleged involvement in the development and deployment of DanaBot. The malware is equipped to siphon data from victim computers, hijack banking sessions, and steal device information. More uniquely, though, DanaBot has also been used for hacking campaigns that appear to be linked to Russian state-sponsored interests. All of that makes DanaBot a particularly clear example of how commodity malware has been repurposed by Russian state hackers for their own goals. In tandem, about 2,300 domains that acted as the command-and-controlbackbone for the Lumma information stealer have been seized, alongside taking down 300 servers and neutralizing 650 domains that were used to launch ransomware attacks. The actions against international cybercrime in the past few days constituted the latest phase of Operation Endgame.

    Get the Guide ➝

    Top News

    Threat Actors Use TikTok Videos to Distribute Stealers — While ClickFix has become a popular social engineering tactic to deliver malware, threat actors have been observed using artificial intelligence-generated videos uploaded to TikTok to deceive users into running malicious commands on their systems and deploy malware like Vidar and StealC under the guise of activating pirated version of Windows, Microsoft Office, CapCut, and Spotify. "This campaign highlights how attackers are ready to weaponize whichever social media platforms are currently popular to distribute malware," Trend Micro said.
    APT28 Hackers Target Western Logistics and Tech Firms — Several cybersecurity and intelligence agencies from Australia, Europe, and the United States issued a joint alert warning of a state-sponsored campaign orchestrated by the Russian state-sponsored threat actor APT28 targeting Western logistics entities and technology companies since 2022. "This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors' wide scale targeting of IP cameras in Ukraine and bordering NATO nations," the agencies said. The attacks are designed to steal sensitive information and maintain long-term persistence on compromised hosts.
    Chinese Threat Actors Exploit Ivanti EPMM Flaws — The China-nexus cyber espionage group tracked as UNC5221 has been attributed to the exploitation of a pair of security flaws affecting Ivanti Endpoint Manager Mobilesoftwareto target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The intrusions leverage the vulnerabilities to obtain a reverse shell and drop malicious payloads like KrustyLoader, which is known to deliver the Sliver command-and-controlframework. "UNC5221 demonstrates a deep understanding of EPMM's internal architecture, repurposing legitimate system components for covert data exfiltration," EclecticIQ said. "Given EPMM's role in managing and pushing configurations to enterprise mobile devices, a successful exploitation could allow threat actors to remotely access, manipulate, or compromise thousands of managed devices across an organization."
    Over 100 Google Chrome Extensions Mimic Popular Tools — An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities such as DeepSeek, Manus, DeBank, FortiVPN, and Site Stats but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. Links to these browser add-ons are hosted on specially crafted sites to which users are likely redirected to via phishing and social media posts. While the extensions appear to offer the advertised features, they also stealthily facilitate credential and cookie theft, session hijacking, ad injection, malicious redirects, traffic manipulation, and phishing via DOM manipulation. Several of these extensions have been taken down by Google.
    CISA Warns of SaaS Providers of Attacks Targeting Cloud Environments — The U.S. Cybersecurity and Infrastructure Security Agencywarned that SaaS companies are under threat from bad actors who are on the prowl for cloud applications with default configurations and elevated permissions. While the agency did not attribute the activity to a specific group, the advisory said enterprise backup platform Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. "Threat actors may have accessed client secrets for Commvault'sMicrosoft 365backup software-as-a-servicesolution, hosted in Azure," CISA said. "This provided the threat actors with unauthorized access to Commvault's customers' M365 environments that have application secrets stored by Commvault."
    GitLab AI Coding Assistant Flaws Could Be Used to Inject Malicious Code — Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligenceassistant Duo that could have allowed attackers to steal source code and inject untrusted HTML into its responses, which could then be used to direct victims to malicious websites. The attack could also leak confidential issue data, such as zero-day vulnerability details. All that's required is for the attacker to instruct the chatbot to interact with a merge requestby taking advantage of the fact that GitLab Duo has extensive access to the platform. "By embedding hidden instructions in seemingly harmless project content, we were able to manipulate Duo's behavior, exfiltrate private source code, and demonstrate how AI responses can be leveraged for unintended and harmful outcomes," Legit Security said. One variation of the attack involved hiding a malicious instruction in an otherwise legitimate piece of source code, while another exploited Duo's parsing of markdown responses in real-time asynchronously. An attacker could leverage this behavior – that Duo begins rendering the output line by line rather than waiting until the entire response is generated and sending it all at once – to introduce malicious HTML code that can access sensitive data and exfiltrate the information to a remote server. The issues have been patched by GitLab following responsible disclosure.

    ‎️‍ Trending CVEs
    Software vulnerabilities remain one of the simplest—and most effective—entry points for attackers. Each week uncovers new flaws, and even small delays in patching can escalate into serious security incidents. Staying ahead means acting fast. Below is this week's list of high-risk vulnerabilities that demand attention. Review them carefully, apply updates without delay, and close the doors before they're forced open.
    This week's list includes — CVE-2025-34025, CVE-2025-34026, CVE-2025-34027, CVE-2025-30911, CVE-2024-57273, CVE-2024-54780, and CVE-2024-54779, CVE-2025-41229, CVE-2025-4322, CVE-2025-47934, CVE-2025-30193, CVE-2025-0993, CVE-2025-36535, CVE-2025-47949, CVE-2025-40775, CVE-2025-20152, CVE-2025-4123, CVE-2025-5063, CVE-2025-37899, CVE-2025-26817, CVE-2025-47947, CVE-2025-3078, CVE-2025-3079, and CVE-2025-4978.
    Around the Cyber World

    Sandworm Drops New Wiper in Ukraine — The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named ZEROLOT. "The infamous Sandworm group concentrated heavily on compromising Ukrainian energy infrastructure. In recent cases, it deployed the ZEROLOT wiper in Ukraine. For this, the attackers abused Active Directory Group Policy in the affected organizations," ESET Director of Threat Research, Jean-Ian Boutin, said. Another Russian hacking group, Gamaredon, remained the most prolific actor targeting the East European nation, enhancing malware obfuscation and introducing PteroBox, a file stealer leveraging Dropbox.
    Signal Says No to Recall — Signal has released a new version of its messaging app for Windows that, by default, blocks the ability of Windows to use Recall to periodically take screenshots of the app. "Although Microsoft made several adjustments over the past twelve months in response to critical feedback, the revamped version of Recall still places any content that's displayed within privacy-preserving apps like Signal at risk," Signal said. "As a result, we are enabling an extra layer of protection by default on Windows 11 in order to help maintain the security of Signal Desktop on that platform even though it introduces some usability trade-offs. Microsoft has simply given us no other option." Microsoft began officially rolling out Recall last month.
    Russia Introduces New Law to Track Foreigners Using Their Smartphones — The Russian government has introduced a new law that makes installing a tracking app mandatory for all foreign nationals in the Moscow region. This includes gathering their real-time locations, fingerprint, face photograph, and residential information. "The adopted mechanism will allow, using modern technologies, to strengthen control in the field of migration and will also contribute to reducing the number of violations and crimes in this area," Vyacheslav Volodin, chairman of the State Duma, said. "If migrants change their actual place of residence, they will be required to inform the Ministry of Internal Affairswithin three working days." A proposed four-year trial period begins on September 1, 2025, and runs until September 1, 2029.
    Dutch Government Passes Law to Criminalize Cyber Espionage — The Dutch government has approved a law criminalizing a wide range of espionage activities, including digital espionage, in an effort to protect national security, critical infrastructure, and high-quality technologies. Under the amended law, leaking sensitive information that is not classified as a state secret or engaging in activities on behalf of a foreign government that harm Dutch interests can also result in criminal charges. "Foreign governments are also interested in non-state-secret, sensitive information about a particular economic sector or about political decision-making," the government said. "Such information can be used to influence political processes, weaken the Dutch economy or play allies against each other. Espionage can also involve actions other than sharing information."
    Microsoft Announces Availability of Quantum-Resistant Algorithms to SymCrypt — Microsoft has revealed that it's making post-quantum cryptographycapabilities, including ML-KEM and ML-DSA, available for Windows Insiders, Canary Channel Build 27852 and higher, and Linux, SymCrypt-OpenSSL version 1.9.0. "This advancement will enable customers to commence their exploration and experimentation of PQC within their operational environments," Microsoft said. "By obtaining early access to PQC capabilities, organizations can proactively assess the compatibility, performance, and integration of these novel algorithms alongside their existing security infrastructure."
    New Malware DOUBLELOADER Uses ALCATRAZ for Obfuscation — The open-source obfuscator ALCATRAZ has been seen within a new generic loader dubbed DOUBLELOADER, which has been deployed alongside Rhadamanthys Stealer infections starting December 2024. The malware collects host information, requests an updated version of itself, and starts beaconing to a hardcoded IP addressstored within the binary. "Obfuscators such as ALCATRAZ end up increasing the complexity when triaging malware," Elastic Security Labs said. "Its main goal is to hinder binary analysis tools and increase the time of the reverse engineering process through different techniques; such as hiding the control flow or making decompilation hard to follow."
    New Formjacking Campaign Targets WooCommerce Sites — Cybersecurity researchers have detected a sophisticated formjacking campaign targeting WooCommerce sites. The malware, per Wordfence, injects a fake but professional-looking payment form into legitimate checkout processes and exfiltrates sensitive customer data to an external server. Further analysis has revealed that the infection likely originated from a compromised WordPress admin account, which was used to inject malicious JavaScript via a Simple Custom CSS and JS pluginthat allows administrators to add custom code. "Unlike traditional card skimmers that simply overlay existing forms, this variant carefully integrates with the WooCommerce site's design and payment workflow, making it particularly difficult for site owners and users to detect," the WordPress security company said. "The malware author repurposed the browser's localStorage mechanism – typically used by websites to remember user preferences – to silently store stolen data and maintain access even after page reloads or when navigating away from the checkout page."

    E.U. Sanctions Stark Industries — The European Unionhas announced sanctions against 21 individuals and six entities in Russia over its "destabilising actions" in the region. One of the sanctioned entities is Stark Industries, a bulletproof hosting provider that has been accused of acting as "enablers of various Russian state-sponsored and affiliated actors to conduct destabilising activities including, information manipulation interference and cyber attacks against the Union and third countries." The sanctions also target its CEO Iurie Neculiti and owner Ivan Neculiti. Stark Industries was previously spotlighted by independent cybersecurity journalist Brian Krebs, detailing its use in DDoS attacks in Ukraine and across Europe. In August 2024, Team Cymru said it discovered 25 Stark-assigned IP addresses used to host domains associated with FIN7 activities and that it had been working with Stark Industries for several months to identify and reduce abuse of their systems. The sanctions have also targeted Kremlin-backed manufacturers of drones and radio communication equipment used by the Russian military, as well as those involved in GPS signal jamming in Baltic states and disrupting civil aviation.
    The Mask APT Unmasked as Tied to the Spanish Government — The mysterious threat actor known as The Maskhas been identified as run by the Spanish government, according to a report published by TechCrunch, citing people who worked at Kaspersky at the time and had knowledge of the investigation. The Russian cybersecurity company first exposed the hacking group in 2014, linking it to highly sophisticated attacks since at least 2007 targeting high-profile organizations, such as governments, diplomatic entities, and research institutions. A majority of the group's attacks have targeted Cuba, followed by hundreds of victims in Brazil, Morocco, Spain, and Gibraltar. While Kaspersky has not publicly attributed it to a specific country, the latest revelation makes The Mask one of the few Western government hacking groups that has ever been discussed in public. This includes the Equation Group, the Lamberts, and Animal Farm.
    Social Engineering Scams Target Coinbase Users — Earlier this month, cryptocurrency exchange Coinbase revealed that it was the victim of a malicious attack perpetrated by unknown threat actors to breach its systems by bribing customer support agents in India and siphon funds from nearly 70,000 customers. According to Blockchain security firm SlowMist, Coinbase users have been the target of social engineering scams since the start of the year, bombarding with SMS messages claiming to be fake withdrawal requests and seeking their confirmation as part of a "sustained and organized scam campaign." The goal is to induce a false sense of urgency and trick them into calling a number, eventually convincing them to transfer the funds to a secure wallet with a seed phrase pre-generated by the attackers and ultimately drain the assets. It's assessed that the activities are primarily carried out by two groups: low-level skid attackers from the Com community and organized cybercrime groups based in India. "Using spoofed PBX phone systems, scammers impersonate Coinbase support and claim there's been 'unauthorized access' or 'suspicious withdrawals' on the user's account," SlowMist said. "They create a sense of urgency, then follow up with phishing emails or texts containing fake ticket numbers or 'recovery links.'"
    Delta Can Sue CrowdStrike Over July 2024 Mega Outage — Delta Air Lines, which had its systems crippled and almost 7,000 flights canceled in the wake of a massive outage caused by a faulty update issued by CrowdStrike in mid-July 2024, has been given the green light to pursue to its lawsuit against the cybersecurity company. A judge in the U.S. state of Georgia stating Delta can try to prove that CrowdStrike was grossly negligent by pushing a defective update to its Falcon software to customers. The update crashed 8.5 million Windows devices across the world. Crowdstrike previously claimed that the airline had rejected technical support offers both from itself and Microsoft. In a statement shared with Reuters, lawyers representing CrowdStrike said they were "confident the judge will find Delta's case has no merit, or will limit damages to the 'single-digit millions of dollars' under Georgia law." The development comes months after MGM Resorts International agreed to pay million to settle multiple class-action lawsuits related to a data breach in 2019 and a ransomware attack the company experienced in 2023.
    Storm-1516 Uses AI-Generated Media to Spread Disinformation — The Russian influence operation known as Storm-1516sought to spread narratives that undermined the European support for Ukraine by amplifying fabricated stories on X about European leaders using drugs while traveling by train to Kyiv for peace talks. One of the posts was subsequently shared by Russian state media and Maria Zakharova, a senior official in Russia's foreign ministry, as part of what has been described as a coordinated disinformation campaign by EclecticIQ. The activity is also notable for the use of synthetic content depicting French President Emmanuel Macron, U.K. Labour Party leader Keir Starmer, and German chancellor Friedrich Merz of drug possession during their return from Ukraine. "By attacking the reputation of these leaders, the campaign likely aimed to turn their own voters against them, using influence operationsto reduce public support for Ukraine by discrediting the politicians who back it," the Dutch threat intelligence firm said.
    Turkish Users Targeted by DBatLoader — AhnLab has disclosed details of a malware campaign that's distributing a malware loader called DBatLoadervia banking-themed banking emails, which then acts as a conduit to deliver SnakeKeylogger, an information stealer developed in .NET. "The DBatLoader malware distributed through phishing emails has the cunning behavior of exploiting normal processesthrough techniques such as DLL side-loading and injection for most of its behaviors, and it also utilizes normal processesfor behaviors such as file copying and changing policies," the company said.
    SEC SIM-Swapper Sentenced to 14 Months for SEC X Account Hack — A 26-year-old Alabama man, Eric Council Jr., has been sentenced to 14 months in prison and three years of supervised release for using SIM swapping attacks to breach the U.S. Securities and Exchange Commission'sofficial X account in January 2024 and falsely announced that the SEC approved BitcoinExchange Traded Funds. Council Jr.was arrested in October 2024 and pleaded guilty to the crime earlier this February. He has also been ordered to forfeit According to court documents, Council used his personal computer to search incriminating phrases such as "SECGOV hack," "telegram sim swap," "how can I know for sure if I am being investigated by the FBI," "What are the signs that you are under investigation by law enforcement or the FBI even if you have not been contacted by them," "what are some signs that the FBI is after you," "Verizon store list," "federal identity theft statute," and "how long does it take to delete telegram account."
    FBI Warns of Malicious Campaign Impersonating Government Officials — The U.S. Federal Bureau of Investigationis warning of a new campaign that involves malicious actors impersonating senior U.S. federal or state government officials and their contacts to target individuals since April 2025. "The malicious actors have sent text messages and AI-generated voice messages — techniques known as smishing and vishing, respectively — that claim to come from a senior US official in an effort to establish rapport before gaining access to personal accounts," the FBI said. "One way the actors gain such access is by sending targeted individuals a malicious link under the guise of transitioning to a separate messaging platform." From there, the actor may present malware or introduce hyperlinks that lead intended targets to an actor-controlled site that steals login information.
    DICOM Flaw Enables Attackers to Embed Malicious Code Within Medical Image Files — Praetorian has released a proof-of-conceptfor a high-severity security flaw in Digital Imaging and Communications in Medicine, predominant file format for medical images, that enables attackers to embed malicious code within legitimate medical image files. CVE-2019-11687, originally disclosed in 2019 by Markel Picado Ortiz, stems from a design decision that allows arbitrary content at the start of the file, otherwise called the Preamble, which enables the creation of malicious polyglots. Codenamed ELFDICOM, the PoC extends the attack surface to Linux environments, making it a much more potent threat. As mitigations, it's advised to implement a DICOM preamble whitelist. "DICOM's file structure inherently allows arbitrary bytes at the beginning of the file, where Linux and most operating systems will look for magic bytes," Praetorian researcher Ryan Hennessee said. "would check a DICOM file's preamble before it is imported into the system. This would allow known good patterns, such as 'TIFF' magic bytes, or '\x00' null bytes, while files with the ELF magic bytes would be blocked."
    Cookie-Bite Attack Uses Chrome Extension to Steal Session Tokens — Cybersecurity researchers have demonstrated a new attack technique called Cookie-Bite that employs custom-made malicious browser extensions to steal "ESTAUTH" and "ESTSAUTHPERSISTNT" cookies in Microsoft Azure Entra ID and bypass multi-factor authentication. The attack has multiple moving parts to it: A custom Chrome extension that monitors authentication events and captures cookies; a PowerShell script that automates the extension deployment and ensures persistence; an exfiltration mechanism to send the cookies to a remote collection point; and a complementary extension to inject the captured cookies into the attacker's browser. "Threat actors often use infostealers to extract authentication tokens directly from a victim's machine or buy them directly through darkness markets, allowing adversaries to hijack active cloud sessions without triggering MFA," Varonis said. "By injecting these cookies while mimicking the victim's OS, browser, and network, attackers can evade Conditional Access Policiesand maintain persistent access." Authentication cookies can also be stolen using adversary-in-the-middlephishing kits in real-time, or using rogue browser extensions that request excessive permissions to interact with web sessions, modify page content, and extract stored authentication data. Once installed, the extension can access the browser's storage API, intercept network requests, or inject malicious JavaScript into active sessions to harvest real-time session cookies. "By leveraging stolen session cookies, an adversary can bypass authentication mechanisms, gaining seamless entry into cloud environments without requiring user credentials," Varonis said. "Beyond initial access, session hijacking can facilitate lateral movement across the tenant, allowing attackers to explore additional resources, access sensitive data, and escalate privileges by abusing existing permissions or misconfigured roles."

    Cybersecurity Webinars

    Non-Human Identities: The AI Backdoor You're Not Watching → AI agents rely on Non-Human Identitiesto function—but these are often left untracked and unsecured. As attackers shift focus to this hidden layer, the risk is growing fast. In this session, you'll learn how to find, secure, and monitor these identities before they're exploited. Join the webinar to understand the real risks behind AI adoption—and how to stay ahead.
    Inside the LOTS Playbook: How Hackers Stay Undetected → Attackers are using trusted sites to stay hidden. In this webinar, Zscaler experts share how they detect these stealthy LOTS attacks using insights from the world's largest security cloud. Join to learn how to spot hidden threats and improve your defense.

    Cybersecurity Tools

    ScriptSentry → It is a free tool that scans your environment for dangerous logon script misconfigurations—like plaintext credentials, insecure file/share permissions, and references to non-existent servers. These overlooked issues can enable lateral movement, privilege escalation, or even credential theft. ScriptSentry helps you quickly identify and fix them across large Active Directory environments.
    Aftermath → It is a Swift-based, open-source tool for macOS incident response. It collects forensic data—like logs, browser activity, and process info—from compromised systems, then analyzes it to build timelines and track infection paths. Deploy via MDM or run manually. Fast, lightweight, and ideal for post-incident investigation.
    AI Red Teaming Playground Labs → It is an open-source training suite with hands-on challenges designed to teach security professionals how to red team AI systems. Originally developed for Black Hat USA 2024, the labs cover prompt injections, safety bypasses, indirect attacks, and Responsible AI failures. Built on Chat Copilot and deployable via Docker, it's a practical resource for testing and understanding real-world AI vulnerabilities.

    Tip of the Week
    Review and Revoke Old OAuth App Permissions — They're Silent Backdoor → You've likely logged into apps using "Continue with Google," "Sign in with Microsoft," or GitHub/Twitter/Facebook logins. That's OAuth. But did you know many of those apps still have access to your data long after you stop using them?
    Why it matters:
    Even if you delete the app or forget it existed, it might still have ongoing access to your calendar, email, cloud files, or contact list — no password needed. If that third-party gets breached, your data is at risk.
    What to do:

    Go through your connected apps here:
    Google: myaccount.google.com/permissions
    Microsoft: account.live.com/consent/Manage
    GitHub: github.com/settings/applications
    Facebook: facebook.com/settings?tab=applications

    Revoke anything you don't actively use. It's a fast, silent cleanup — and it closes doors you didn't know were open.
    Conclusion
    Looking ahead, it's not just about tracking threats—it's about understanding what they reveal. Every tactic used, every system tested, points to deeper issues in how trust, access, and visibility are managed. As attackers adapt quickly, defenders need sharper awareness and faster response loops.
    The takeaways from this week aren't just technical—they speak to how teams prioritize risk, design safeguards, and make choices under pressure. Use these insights not just to react, but to rethink what "secure" really needs to mean in today's environment.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    #weekly #recap #apt #campaigns #browser
    ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
    Cyber threats don't show up one at a time anymore. They're layered, planned, and often stay hidden until it's too late. For cybersecurity teams, the key isn't just reacting to alerts—it's spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With today's complex systems, we need focused analysis—not noise. What you'll see here isn't just a list of incidents, but a clear look at where control is being gained, lost, or quietly tested. ⚡ Threat of the Week Lumma Stealer, DanaBot Operations Disrupted — A coalition of private sector companies and law enforcement agencies have taken down the infrastructure associated with Lumma Stealer and DanaBot. Charges have also been unsealed against 16 individuals for their alleged involvement in the development and deployment of DanaBot. The malware is equipped to siphon data from victim computers, hijack banking sessions, and steal device information. More uniquely, though, DanaBot has also been used for hacking campaigns that appear to be linked to Russian state-sponsored interests. All of that makes DanaBot a particularly clear example of how commodity malware has been repurposed by Russian state hackers for their own goals. In tandem, about 2,300 domains that acted as the command-and-controlbackbone for the Lumma information stealer have been seized, alongside taking down 300 servers and neutralizing 650 domains that were used to launch ransomware attacks. The actions against international cybercrime in the past few days constituted the latest phase of Operation Endgame. Get the Guide ➝ 🔔 Top News Threat Actors Use TikTok Videos to Distribute Stealers — While ClickFix has become a popular social engineering tactic to deliver malware, threat actors have been observed using artificial intelligence-generated videos uploaded to TikTok to deceive users into running malicious commands on their systems and deploy malware like Vidar and StealC under the guise of activating pirated version of Windows, Microsoft Office, CapCut, and Spotify. "This campaign highlights how attackers are ready to weaponize whichever social media platforms are currently popular to distribute malware," Trend Micro said. APT28 Hackers Target Western Logistics and Tech Firms — Several cybersecurity and intelligence agencies from Australia, Europe, and the United States issued a joint alert warning of a state-sponsored campaign orchestrated by the Russian state-sponsored threat actor APT28 targeting Western logistics entities and technology companies since 2022. "This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors' wide scale targeting of IP cameras in Ukraine and bordering NATO nations," the agencies said. The attacks are designed to steal sensitive information and maintain long-term persistence on compromised hosts. Chinese Threat Actors Exploit Ivanti EPMM Flaws — The China-nexus cyber espionage group tracked as UNC5221 has been attributed to the exploitation of a pair of security flaws affecting Ivanti Endpoint Manager Mobilesoftwareto target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The intrusions leverage the vulnerabilities to obtain a reverse shell and drop malicious payloads like KrustyLoader, which is known to deliver the Sliver command-and-controlframework. "UNC5221 demonstrates a deep understanding of EPMM's internal architecture, repurposing legitimate system components for covert data exfiltration," EclecticIQ said. "Given EPMM's role in managing and pushing configurations to enterprise mobile devices, a successful exploitation could allow threat actors to remotely access, manipulate, or compromise thousands of managed devices across an organization." Over 100 Google Chrome Extensions Mimic Popular Tools — An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities such as DeepSeek, Manus, DeBank, FortiVPN, and Site Stats but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. Links to these browser add-ons are hosted on specially crafted sites to which users are likely redirected to via phishing and social media posts. While the extensions appear to offer the advertised features, they also stealthily facilitate credential and cookie theft, session hijacking, ad injection, malicious redirects, traffic manipulation, and phishing via DOM manipulation. Several of these extensions have been taken down by Google. CISA Warns of SaaS Providers of Attacks Targeting Cloud Environments — The U.S. Cybersecurity and Infrastructure Security Agencywarned that SaaS companies are under threat from bad actors who are on the prowl for cloud applications with default configurations and elevated permissions. While the agency did not attribute the activity to a specific group, the advisory said enterprise backup platform Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. "Threat actors may have accessed client secrets for Commvault'sMicrosoft 365backup software-as-a-servicesolution, hosted in Azure," CISA said. "This provided the threat actors with unauthorized access to Commvault's customers' M365 environments that have application secrets stored by Commvault." GitLab AI Coding Assistant Flaws Could Be Used to Inject Malicious Code — Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligenceassistant Duo that could have allowed attackers to steal source code and inject untrusted HTML into its responses, which could then be used to direct victims to malicious websites. The attack could also leak confidential issue data, such as zero-day vulnerability details. All that's required is for the attacker to instruct the chatbot to interact with a merge requestby taking advantage of the fact that GitLab Duo has extensive access to the platform. "By embedding hidden instructions in seemingly harmless project content, we were able to manipulate Duo's behavior, exfiltrate private source code, and demonstrate how AI responses can be leveraged for unintended and harmful outcomes," Legit Security said. One variation of the attack involved hiding a malicious instruction in an otherwise legitimate piece of source code, while another exploited Duo's parsing of markdown responses in real-time asynchronously. An attacker could leverage this behavior – that Duo begins rendering the output line by line rather than waiting until the entire response is generated and sending it all at once – to introduce malicious HTML code that can access sensitive data and exfiltrate the information to a remote server. The issues have been patched by GitLab following responsible disclosure. ‎️‍🔥 Trending CVEs Software vulnerabilities remain one of the simplest—and most effective—entry points for attackers. Each week uncovers new flaws, and even small delays in patching can escalate into serious security incidents. Staying ahead means acting fast. Below is this week's list of high-risk vulnerabilities that demand attention. Review them carefully, apply updates without delay, and close the doors before they're forced open. This week's list includes — CVE-2025-34025, CVE-2025-34026, CVE-2025-34027, CVE-2025-30911, CVE-2024-57273, CVE-2024-54780, and CVE-2024-54779, CVE-2025-41229, CVE-2025-4322, CVE-2025-47934, CVE-2025-30193, CVE-2025-0993, CVE-2025-36535, CVE-2025-47949, CVE-2025-40775, CVE-2025-20152, CVE-2025-4123, CVE-2025-5063, CVE-2025-37899, CVE-2025-26817, CVE-2025-47947, CVE-2025-3078, CVE-2025-3079, and CVE-2025-4978. 📰 Around the Cyber World Sandworm Drops New Wiper in Ukraine — The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named ZEROLOT. "The infamous Sandworm group concentrated heavily on compromising Ukrainian energy infrastructure. In recent cases, it deployed the ZEROLOT wiper in Ukraine. For this, the attackers abused Active Directory Group Policy in the affected organizations," ESET Director of Threat Research, Jean-Ian Boutin, said. Another Russian hacking group, Gamaredon, remained the most prolific actor targeting the East European nation, enhancing malware obfuscation and introducing PteroBox, a file stealer leveraging Dropbox. Signal Says No to Recall — Signal has released a new version of its messaging app for Windows that, by default, blocks the ability of Windows to use Recall to periodically take screenshots of the app. "Although Microsoft made several adjustments over the past twelve months in response to critical feedback, the revamped version of Recall still places any content that's displayed within privacy-preserving apps like Signal at risk," Signal said. "As a result, we are enabling an extra layer of protection by default on Windows 11 in order to help maintain the security of Signal Desktop on that platform even though it introduces some usability trade-offs. Microsoft has simply given us no other option." Microsoft began officially rolling out Recall last month. Russia Introduces New Law to Track Foreigners Using Their Smartphones — The Russian government has introduced a new law that makes installing a tracking app mandatory for all foreign nationals in the Moscow region. This includes gathering their real-time locations, fingerprint, face photograph, and residential information. "The adopted mechanism will allow, using modern technologies, to strengthen control in the field of migration and will also contribute to reducing the number of violations and crimes in this area," Vyacheslav Volodin, chairman of the State Duma, said. "If migrants change their actual place of residence, they will be required to inform the Ministry of Internal Affairswithin three working days." A proposed four-year trial period begins on September 1, 2025, and runs until September 1, 2029. Dutch Government Passes Law to Criminalize Cyber Espionage — The Dutch government has approved a law criminalizing a wide range of espionage activities, including digital espionage, in an effort to protect national security, critical infrastructure, and high-quality technologies. Under the amended law, leaking sensitive information that is not classified as a state secret or engaging in activities on behalf of a foreign government that harm Dutch interests can also result in criminal charges. "Foreign governments are also interested in non-state-secret, sensitive information about a particular economic sector or about political decision-making," the government said. "Such information can be used to influence political processes, weaken the Dutch economy or play allies against each other. Espionage can also involve actions other than sharing information." Microsoft Announces Availability of Quantum-Resistant Algorithms to SymCrypt — Microsoft has revealed that it's making post-quantum cryptographycapabilities, including ML-KEM and ML-DSA, available for Windows Insiders, Canary Channel Build 27852 and higher, and Linux, SymCrypt-OpenSSL version 1.9.0. "This advancement will enable customers to commence their exploration and experimentation of PQC within their operational environments," Microsoft said. "By obtaining early access to PQC capabilities, organizations can proactively assess the compatibility, performance, and integration of these novel algorithms alongside their existing security infrastructure." New Malware DOUBLELOADER Uses ALCATRAZ for Obfuscation — The open-source obfuscator ALCATRAZ has been seen within a new generic loader dubbed DOUBLELOADER, which has been deployed alongside Rhadamanthys Stealer infections starting December 2024. The malware collects host information, requests an updated version of itself, and starts beaconing to a hardcoded IP addressstored within the binary. "Obfuscators such as ALCATRAZ end up increasing the complexity when triaging malware," Elastic Security Labs said. "Its main goal is to hinder binary analysis tools and increase the time of the reverse engineering process through different techniques; such as hiding the control flow or making decompilation hard to follow." New Formjacking Campaign Targets WooCommerce Sites — Cybersecurity researchers have detected a sophisticated formjacking campaign targeting WooCommerce sites. The malware, per Wordfence, injects a fake but professional-looking payment form into legitimate checkout processes and exfiltrates sensitive customer data to an external server. Further analysis has revealed that the infection likely originated from a compromised WordPress admin account, which was used to inject malicious JavaScript via a Simple Custom CSS and JS pluginthat allows administrators to add custom code. "Unlike traditional card skimmers that simply overlay existing forms, this variant carefully integrates with the WooCommerce site's design and payment workflow, making it particularly difficult for site owners and users to detect," the WordPress security company said. "The malware author repurposed the browser's localStorage mechanism – typically used by websites to remember user preferences – to silently store stolen data and maintain access even after page reloads or when navigating away from the checkout page." E.U. Sanctions Stark Industries — The European Unionhas announced sanctions against 21 individuals and six entities in Russia over its "destabilising actions" in the region. One of the sanctioned entities is Stark Industries, a bulletproof hosting provider that has been accused of acting as "enablers of various Russian state-sponsored and affiliated actors to conduct destabilising activities including, information manipulation interference and cyber attacks against the Union and third countries." The sanctions also target its CEO Iurie Neculiti and owner Ivan Neculiti. Stark Industries was previously spotlighted by independent cybersecurity journalist Brian Krebs, detailing its use in DDoS attacks in Ukraine and across Europe. In August 2024, Team Cymru said it discovered 25 Stark-assigned IP addresses used to host domains associated with FIN7 activities and that it had been working with Stark Industries for several months to identify and reduce abuse of their systems. The sanctions have also targeted Kremlin-backed manufacturers of drones and radio communication equipment used by the Russian military, as well as those involved in GPS signal jamming in Baltic states and disrupting civil aviation. The Mask APT Unmasked as Tied to the Spanish Government — The mysterious threat actor known as The Maskhas been identified as run by the Spanish government, according to a report published by TechCrunch, citing people who worked at Kaspersky at the time and had knowledge of the investigation. The Russian cybersecurity company first exposed the hacking group in 2014, linking it to highly sophisticated attacks since at least 2007 targeting high-profile organizations, such as governments, diplomatic entities, and research institutions. A majority of the group's attacks have targeted Cuba, followed by hundreds of victims in Brazil, Morocco, Spain, and Gibraltar. While Kaspersky has not publicly attributed it to a specific country, the latest revelation makes The Mask one of the few Western government hacking groups that has ever been discussed in public. This includes the Equation Group, the Lamberts, and Animal Farm. Social Engineering Scams Target Coinbase Users — Earlier this month, cryptocurrency exchange Coinbase revealed that it was the victim of a malicious attack perpetrated by unknown threat actors to breach its systems by bribing customer support agents in India and siphon funds from nearly 70,000 customers. According to Blockchain security firm SlowMist, Coinbase users have been the target of social engineering scams since the start of the year, bombarding with SMS messages claiming to be fake withdrawal requests and seeking their confirmation as part of a "sustained and organized scam campaign." The goal is to induce a false sense of urgency and trick them into calling a number, eventually convincing them to transfer the funds to a secure wallet with a seed phrase pre-generated by the attackers and ultimately drain the assets. It's assessed that the activities are primarily carried out by two groups: low-level skid attackers from the Com community and organized cybercrime groups based in India. "Using spoofed PBX phone systems, scammers impersonate Coinbase support and claim there's been 'unauthorized access' or 'suspicious withdrawals' on the user's account," SlowMist said. "They create a sense of urgency, then follow up with phishing emails or texts containing fake ticket numbers or 'recovery links.'" Delta Can Sue CrowdStrike Over July 2024 Mega Outage — Delta Air Lines, which had its systems crippled and almost 7,000 flights canceled in the wake of a massive outage caused by a faulty update issued by CrowdStrike in mid-July 2024, has been given the green light to pursue to its lawsuit against the cybersecurity company. A judge in the U.S. state of Georgia stating Delta can try to prove that CrowdStrike was grossly negligent by pushing a defective update to its Falcon software to customers. The update crashed 8.5 million Windows devices across the world. Crowdstrike previously claimed that the airline had rejected technical support offers both from itself and Microsoft. In a statement shared with Reuters, lawyers representing CrowdStrike said they were "confident the judge will find Delta's case has no merit, or will limit damages to the 'single-digit millions of dollars' under Georgia law." The development comes months after MGM Resorts International agreed to pay million to settle multiple class-action lawsuits related to a data breach in 2019 and a ransomware attack the company experienced in 2023. Storm-1516 Uses AI-Generated Media to Spread Disinformation — The Russian influence operation known as Storm-1516sought to spread narratives that undermined the European support for Ukraine by amplifying fabricated stories on X about European leaders using drugs while traveling by train to Kyiv for peace talks. One of the posts was subsequently shared by Russian state media and Maria Zakharova, a senior official in Russia's foreign ministry, as part of what has been described as a coordinated disinformation campaign by EclecticIQ. The activity is also notable for the use of synthetic content depicting French President Emmanuel Macron, U.K. Labour Party leader Keir Starmer, and German chancellor Friedrich Merz of drug possession during their return from Ukraine. "By attacking the reputation of these leaders, the campaign likely aimed to turn their own voters against them, using influence operationsto reduce public support for Ukraine by discrediting the politicians who back it," the Dutch threat intelligence firm said. Turkish Users Targeted by DBatLoader — AhnLab has disclosed details of a malware campaign that's distributing a malware loader called DBatLoadervia banking-themed banking emails, which then acts as a conduit to deliver SnakeKeylogger, an information stealer developed in .NET. "The DBatLoader malware distributed through phishing emails has the cunning behavior of exploiting normal processesthrough techniques such as DLL side-loading and injection for most of its behaviors, and it also utilizes normal processesfor behaviors such as file copying and changing policies," the company said. SEC SIM-Swapper Sentenced to 14 Months for SEC X Account Hack — A 26-year-old Alabama man, Eric Council Jr., has been sentenced to 14 months in prison and three years of supervised release for using SIM swapping attacks to breach the U.S. Securities and Exchange Commission'sofficial X account in January 2024 and falsely announced that the SEC approved BitcoinExchange Traded Funds. Council Jr.was arrested in October 2024 and pleaded guilty to the crime earlier this February. He has also been ordered to forfeit According to court documents, Council used his personal computer to search incriminating phrases such as "SECGOV hack," "telegram sim swap," "how can I know for sure if I am being investigated by the FBI," "What are the signs that you are under investigation by law enforcement or the FBI even if you have not been contacted by them," "what are some signs that the FBI is after you," "Verizon store list," "federal identity theft statute," and "how long does it take to delete telegram account." FBI Warns of Malicious Campaign Impersonating Government Officials — The U.S. Federal Bureau of Investigationis warning of a new campaign that involves malicious actors impersonating senior U.S. federal or state government officials and their contacts to target individuals since April 2025. "The malicious actors have sent text messages and AI-generated voice messages — techniques known as smishing and vishing, respectively — that claim to come from a senior US official in an effort to establish rapport before gaining access to personal accounts," the FBI said. "One way the actors gain such access is by sending targeted individuals a malicious link under the guise of transitioning to a separate messaging platform." From there, the actor may present malware or introduce hyperlinks that lead intended targets to an actor-controlled site that steals login information. DICOM Flaw Enables Attackers to Embed Malicious Code Within Medical Image Files — Praetorian has released a proof-of-conceptfor a high-severity security flaw in Digital Imaging and Communications in Medicine, predominant file format for medical images, that enables attackers to embed malicious code within legitimate medical image files. CVE-2019-11687, originally disclosed in 2019 by Markel Picado Ortiz, stems from a design decision that allows arbitrary content at the start of the file, otherwise called the Preamble, which enables the creation of malicious polyglots. Codenamed ELFDICOM, the PoC extends the attack surface to Linux environments, making it a much more potent threat. As mitigations, it's advised to implement a DICOM preamble whitelist. "DICOM's file structure inherently allows arbitrary bytes at the beginning of the file, where Linux and most operating systems will look for magic bytes," Praetorian researcher Ryan Hennessee said. "would check a DICOM file's preamble before it is imported into the system. This would allow known good patterns, such as 'TIFF' magic bytes, or '\x00' null bytes, while files with the ELF magic bytes would be blocked." Cookie-Bite Attack Uses Chrome Extension to Steal Session Tokens — Cybersecurity researchers have demonstrated a new attack technique called Cookie-Bite that employs custom-made malicious browser extensions to steal "ESTAUTH" and "ESTSAUTHPERSISTNT" cookies in Microsoft Azure Entra ID and bypass multi-factor authentication. The attack has multiple moving parts to it: A custom Chrome extension that monitors authentication events and captures cookies; a PowerShell script that automates the extension deployment and ensures persistence; an exfiltration mechanism to send the cookies to a remote collection point; and a complementary extension to inject the captured cookies into the attacker's browser. "Threat actors often use infostealers to extract authentication tokens directly from a victim's machine or buy them directly through darkness markets, allowing adversaries to hijack active cloud sessions without triggering MFA," Varonis said. "By injecting these cookies while mimicking the victim's OS, browser, and network, attackers can evade Conditional Access Policiesand maintain persistent access." Authentication cookies can also be stolen using adversary-in-the-middlephishing kits in real-time, or using rogue browser extensions that request excessive permissions to interact with web sessions, modify page content, and extract stored authentication data. Once installed, the extension can access the browser's storage API, intercept network requests, or inject malicious JavaScript into active sessions to harvest real-time session cookies. "By leveraging stolen session cookies, an adversary can bypass authentication mechanisms, gaining seamless entry into cloud environments without requiring user credentials," Varonis said. "Beyond initial access, session hijacking can facilitate lateral movement across the tenant, allowing attackers to explore additional resources, access sensitive data, and escalate privileges by abusing existing permissions or misconfigured roles." 🎥 Cybersecurity Webinars Non-Human Identities: The AI Backdoor You're Not Watching → AI agents rely on Non-Human Identitiesto function—but these are often left untracked and unsecured. As attackers shift focus to this hidden layer, the risk is growing fast. In this session, you'll learn how to find, secure, and monitor these identities before they're exploited. Join the webinar to understand the real risks behind AI adoption—and how to stay ahead. Inside the LOTS Playbook: How Hackers Stay Undetected → Attackers are using trusted sites to stay hidden. In this webinar, Zscaler experts share how they detect these stealthy LOTS attacks using insights from the world's largest security cloud. Join to learn how to spot hidden threats and improve your defense. 🔧 Cybersecurity Tools ScriptSentry → It is a free tool that scans your environment for dangerous logon script misconfigurations—like plaintext credentials, insecure file/share permissions, and references to non-existent servers. These overlooked issues can enable lateral movement, privilege escalation, or even credential theft. ScriptSentry helps you quickly identify and fix them across large Active Directory environments. Aftermath → It is a Swift-based, open-source tool for macOS incident response. It collects forensic data—like logs, browser activity, and process info—from compromised systems, then analyzes it to build timelines and track infection paths. Deploy via MDM or run manually. Fast, lightweight, and ideal for post-incident investigation. AI Red Teaming Playground Labs → It is an open-source training suite with hands-on challenges designed to teach security professionals how to red team AI systems. Originally developed for Black Hat USA 2024, the labs cover prompt injections, safety bypasses, indirect attacks, and Responsible AI failures. Built on Chat Copilot and deployable via Docker, it's a practical resource for testing and understanding real-world AI vulnerabilities. 🔒 Tip of the Week Review and Revoke Old OAuth App Permissions — They're Silent Backdoor → You've likely logged into apps using "Continue with Google," "Sign in with Microsoft," or GitHub/Twitter/Facebook logins. That's OAuth. But did you know many of those apps still have access to your data long after you stop using them? Why it matters: Even if you delete the app or forget it existed, it might still have ongoing access to your calendar, email, cloud files, or contact list — no password needed. If that third-party gets breached, your data is at risk. What to do: Go through your connected apps here: Google: myaccount.google.com/permissions Microsoft: account.live.com/consent/Manage GitHub: github.com/settings/applications Facebook: facebook.com/settings?tab=applications Revoke anything you don't actively use. It's a fast, silent cleanup — and it closes doors you didn't know were open. Conclusion Looking ahead, it's not just about tracking threats—it's about understanding what they reveal. Every tactic used, every system tested, points to deeper issues in how trust, access, and visibility are managed. As attackers adapt quickly, defenders need sharper awareness and faster response loops. The takeaways from this week aren't just technical—they speak to how teams prioritize risk, design safeguards, and make choices under pressure. Use these insights not just to react, but to rethink what "secure" really needs to mean in today's environment. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. #weekly #recap #apt #campaigns #browser
    THEHACKERNEWS.COM
    ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
    Cyber threats don't show up one at a time anymore. They're layered, planned, and often stay hidden until it's too late. For cybersecurity teams, the key isn't just reacting to alerts—it's spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With today's complex systems, we need focused analysis—not noise. What you'll see here isn't just a list of incidents, but a clear look at where control is being gained, lost, or quietly tested. ⚡ Threat of the Week Lumma Stealer, DanaBot Operations Disrupted — A coalition of private sector companies and law enforcement agencies have taken down the infrastructure associated with Lumma Stealer and DanaBot. Charges have also been unsealed against 16 individuals for their alleged involvement in the development and deployment of DanaBot. The malware is equipped to siphon data from victim computers, hijack banking sessions, and steal device information. More uniquely, though, DanaBot has also been used for hacking campaigns that appear to be linked to Russian state-sponsored interests. All of that makes DanaBot a particularly clear example of how commodity malware has been repurposed by Russian state hackers for their own goals. In tandem, about 2,300 domains that acted as the command-and-control (C2) backbone for the Lumma information stealer have been seized, alongside taking down 300 servers and neutralizing 650 domains that were used to launch ransomware attacks. The actions against international cybercrime in the past few days constituted the latest phase of Operation Endgame. Get the Guide ➝ 🔔 Top News Threat Actors Use TikTok Videos to Distribute Stealers — While ClickFix has become a popular social engineering tactic to deliver malware, threat actors have been observed using artificial intelligence (AI)-generated videos uploaded to TikTok to deceive users into running malicious commands on their systems and deploy malware like Vidar and StealC under the guise of activating pirated version of Windows, Microsoft Office, CapCut, and Spotify. "This campaign highlights how attackers are ready to weaponize whichever social media platforms are currently popular to distribute malware," Trend Micro said. APT28 Hackers Target Western Logistics and Tech Firms — Several cybersecurity and intelligence agencies from Australia, Europe, and the United States issued a joint alert warning of a state-sponsored campaign orchestrated by the Russian state-sponsored threat actor APT28 targeting Western logistics entities and technology companies since 2022. "This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors' wide scale targeting of IP cameras in Ukraine and bordering NATO nations," the agencies said. The attacks are designed to steal sensitive information and maintain long-term persistence on compromised hosts. Chinese Threat Actors Exploit Ivanti EPMM Flaws — The China-nexus cyber espionage group tracked as UNC5221 has been attributed to the exploitation of a pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software (CVE-2025-4427 and CVE-2025-4428) to target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The intrusions leverage the vulnerabilities to obtain a reverse shell and drop malicious payloads like KrustyLoader, which is known to deliver the Sliver command-and-control (C2) framework. "UNC5221 demonstrates a deep understanding of EPMM's internal architecture, repurposing legitimate system components for covert data exfiltration," EclecticIQ said. "Given EPMM's role in managing and pushing configurations to enterprise mobile devices, a successful exploitation could allow threat actors to remotely access, manipulate, or compromise thousands of managed devices across an organization." Over 100 Google Chrome Extensions Mimic Popular Tools — An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities such as DeepSeek, Manus, DeBank, FortiVPN, and Site Stats but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. Links to these browser add-ons are hosted on specially crafted sites to which users are likely redirected to via phishing and social media posts. While the extensions appear to offer the advertised features, they also stealthily facilitate credential and cookie theft, session hijacking, ad injection, malicious redirects, traffic manipulation, and phishing via DOM manipulation. Several of these extensions have been taken down by Google. CISA Warns of SaaS Providers of Attacks Targeting Cloud Environments — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that SaaS companies are under threat from bad actors who are on the prowl for cloud applications with default configurations and elevated permissions. While the agency did not attribute the activity to a specific group, the advisory said enterprise backup platform Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. "Threat actors may have accessed client secrets for Commvault's (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure," CISA said. "This provided the threat actors with unauthorized access to Commvault's customers' M365 environments that have application secrets stored by Commvault." GitLab AI Coding Assistant Flaws Could Be Used to Inject Malicious Code — Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligence (AI) assistant Duo that could have allowed attackers to steal source code and inject untrusted HTML into its responses, which could then be used to direct victims to malicious websites. The attack could also leak confidential issue data, such as zero-day vulnerability details. All that's required is for the attacker to instruct the chatbot to interact with a merge request (or commit, issue, or source code) by taking advantage of the fact that GitLab Duo has extensive access to the platform. "By embedding hidden instructions in seemingly harmless project content, we were able to manipulate Duo's behavior, exfiltrate private source code, and demonstrate how AI responses can be leveraged for unintended and harmful outcomes," Legit Security said. One variation of the attack involved hiding a malicious instruction in an otherwise legitimate piece of source code, while another exploited Duo's parsing of markdown responses in real-time asynchronously. An attacker could leverage this behavior – that Duo begins rendering the output line by line rather than waiting until the entire response is generated and sending it all at once – to introduce malicious HTML code that can access sensitive data and exfiltrate the information to a remote server. The issues have been patched by GitLab following responsible disclosure. ‎️‍🔥 Trending CVEs Software vulnerabilities remain one of the simplest—and most effective—entry points for attackers. Each week uncovers new flaws, and even small delays in patching can escalate into serious security incidents. Staying ahead means acting fast. Below is this week's list of high-risk vulnerabilities that demand attention. Review them carefully, apply updates without delay, and close the doors before they're forced open. This week's list includes — CVE-2025-34025, CVE-2025-34026, CVE-2025-34027 (Versa Concerto), CVE-2025-30911 (RomethemeKit For Elementor WordPress plugin), CVE-2024-57273, CVE-2024-54780, and CVE-2024-54779 (pfSense), CVE-2025-41229 (VMware Cloud Foundation), CVE-2025-4322 (Motors WordPress theme), CVE-2025-47934 (OpenPGP.js), CVE-2025-30193 (PowerDNS), CVE-2025-0993 (GitLab), CVE-2025-36535 (AutomationDirect MB-Gateway), CVE-2025-47949 (Samlify), CVE-2025-40775 (BIND DNS), CVE-2025-20152 (Cisco Identity Services Engine), CVE-2025-4123 (Grafana), CVE-2025-5063 (Google Chrome), CVE-2025-37899 (Linux Kernel), CVE-2025-26817 (Netwrix Password Secure), CVE-2025-47947 (ModSecurity), CVE-2025-3078, CVE-2025-3079 (Canon Printers), and CVE-2025-4978 (NETGEAR). 📰 Around the Cyber World Sandworm Drops New Wiper in Ukraine — The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named ZEROLOT. "The infamous Sandworm group concentrated heavily on compromising Ukrainian energy infrastructure. In recent cases, it deployed the ZEROLOT wiper in Ukraine. For this, the attackers abused Active Directory Group Policy in the affected organizations," ESET Director of Threat Research, Jean-Ian Boutin, said. Another Russian hacking group, Gamaredon, remained the most prolific actor targeting the East European nation, enhancing malware obfuscation and introducing PteroBox, a file stealer leveraging Dropbox. Signal Says No to Recall — Signal has released a new version of its messaging app for Windows that, by default, blocks the ability of Windows to use Recall to periodically take screenshots of the app. "Although Microsoft made several adjustments over the past twelve months in response to critical feedback, the revamped version of Recall still places any content that's displayed within privacy-preserving apps like Signal at risk," Signal said. "As a result, we are enabling an extra layer of protection by default on Windows 11 in order to help maintain the security of Signal Desktop on that platform even though it introduces some usability trade-offs. Microsoft has simply given us no other option." Microsoft began officially rolling out Recall last month. Russia Introduces New Law to Track Foreigners Using Their Smartphones — The Russian government has introduced a new law that makes installing a tracking app mandatory for all foreign nationals in the Moscow region. This includes gathering their real-time locations, fingerprint, face photograph, and residential information. "The adopted mechanism will allow, using modern technologies, to strengthen control in the field of migration and will also contribute to reducing the number of violations and crimes in this area," Vyacheslav Volodin, chairman of the State Duma, said. "If migrants change their actual place of residence, they will be required to inform the Ministry of Internal Affairs (MVD) within three working days." A proposed four-year trial period begins on September 1, 2025, and runs until September 1, 2029. Dutch Government Passes Law to Criminalize Cyber Espionage — The Dutch government has approved a law criminalizing a wide range of espionage activities, including digital espionage, in an effort to protect national security, critical infrastructure, and high-quality technologies. Under the amended law, leaking sensitive information that is not classified as a state secret or engaging in activities on behalf of a foreign government that harm Dutch interests can also result in criminal charges. "Foreign governments are also interested in non-state-secret, sensitive information about a particular economic sector or about political decision-making," the government said. "Such information can be used to influence political processes, weaken the Dutch economy or play allies against each other. Espionage can also involve actions other than sharing information." Microsoft Announces Availability of Quantum-Resistant Algorithms to SymCrypt — Microsoft has revealed that it's making post-quantum cryptography (PQC) capabilities, including ML-KEM and ML-DSA, available for Windows Insiders, Canary Channel Build 27852 and higher, and Linux, SymCrypt-OpenSSL version 1.9.0. "This advancement will enable customers to commence their exploration and experimentation of PQC within their operational environments," Microsoft said. "By obtaining early access to PQC capabilities, organizations can proactively assess the compatibility, performance, and integration of these novel algorithms alongside their existing security infrastructure." New Malware DOUBLELOADER Uses ALCATRAZ for Obfuscation — The open-source obfuscator ALCATRAZ has been seen within a new generic loader dubbed DOUBLELOADER, which has been deployed alongside Rhadamanthys Stealer infections starting December 2024. The malware collects host information, requests an updated version of itself, and starts beaconing to a hardcoded IP address (185.147.125[.]81) stored within the binary. "Obfuscators such as ALCATRAZ end up increasing the complexity when triaging malware," Elastic Security Labs said. "Its main goal is to hinder binary analysis tools and increase the time of the reverse engineering process through different techniques; such as hiding the control flow or making decompilation hard to follow." New Formjacking Campaign Targets WooCommerce Sites — Cybersecurity researchers have detected a sophisticated formjacking campaign targeting WooCommerce sites. The malware, per Wordfence, injects a fake but professional-looking payment form into legitimate checkout processes and exfiltrates sensitive customer data to an external server. Further analysis has revealed that the infection likely originated from a compromised WordPress admin account, which was used to inject malicious JavaScript via a Simple Custom CSS and JS plugin (or something similar) that allows administrators to add custom code. "Unlike traditional card skimmers that simply overlay existing forms, this variant carefully integrates with the WooCommerce site's design and payment workflow, making it particularly difficult for site owners and users to detect," the WordPress security company said. "The malware author repurposed the browser's localStorage mechanism – typically used by websites to remember user preferences – to silently store stolen data and maintain access even after page reloads or when navigating away from the checkout page." E.U. Sanctions Stark Industries — The European Union (E.U.) has announced sanctions against 21 individuals and six entities in Russia over its "destabilising actions" in the region. One of the sanctioned entities is Stark Industries, a bulletproof hosting provider that has been accused of acting as "enablers of various Russian state-sponsored and affiliated actors to conduct destabilising activities including, information manipulation interference and cyber attacks against the Union and third countries." The sanctions also target its CEO Iurie Neculiti and owner Ivan Neculiti. Stark Industries was previously spotlighted by independent cybersecurity journalist Brian Krebs, detailing its use in DDoS attacks in Ukraine and across Europe. In August 2024, Team Cymru said it discovered 25 Stark-assigned IP addresses used to host domains associated with FIN7 activities and that it had been working with Stark Industries for several months to identify and reduce abuse of their systems. The sanctions have also targeted Kremlin-backed manufacturers of drones and radio communication equipment used by the Russian military, as well as those involved in GPS signal jamming in Baltic states and disrupting civil aviation. The Mask APT Unmasked as Tied to the Spanish Government — The mysterious threat actor known as The Mask (aka Careto) has been identified as run by the Spanish government, according to a report published by TechCrunch, citing people who worked at Kaspersky at the time and had knowledge of the investigation. The Russian cybersecurity company first exposed the hacking group in 2014, linking it to highly sophisticated attacks since at least 2007 targeting high-profile organizations, such as governments, diplomatic entities, and research institutions. A majority of the group's attacks have targeted Cuba, followed by hundreds of victims in Brazil, Morocco, Spain, and Gibraltar. While Kaspersky has not publicly attributed it to a specific country, the latest revelation makes The Mask one of the few Western government hacking groups that has ever been discussed in public. This includes the Equation Group, the Lamberts (the U.S.), and Animal Farm (France). Social Engineering Scams Target Coinbase Users — Earlier this month, cryptocurrency exchange Coinbase revealed that it was the victim of a malicious attack perpetrated by unknown threat actors to breach its systems by bribing customer support agents in India and siphon funds from nearly 70,000 customers. According to Blockchain security firm SlowMist, Coinbase users have been the target of social engineering scams since the start of the year, bombarding with SMS messages claiming to be fake withdrawal requests and seeking their confirmation as part of a "sustained and organized scam campaign." The goal is to induce a false sense of urgency and trick them into calling a number, eventually convincing them to transfer the funds to a secure wallet with a seed phrase pre-generated by the attackers and ultimately drain the assets. It's assessed that the activities are primarily carried out by two groups: low-level skid attackers from the Com community and organized cybercrime groups based in India. "Using spoofed PBX phone systems, scammers impersonate Coinbase support and claim there's been 'unauthorized access' or 'suspicious withdrawals' on the user's account," SlowMist said. "They create a sense of urgency, then follow up with phishing emails or texts containing fake ticket numbers or 'recovery links.'" Delta Can Sue CrowdStrike Over July 2024 Mega Outage — Delta Air Lines, which had its systems crippled and almost 7,000 flights canceled in the wake of a massive outage caused by a faulty update issued by CrowdStrike in mid-July 2024, has been given the green light to pursue to its lawsuit against the cybersecurity company. A judge in the U.S. state of Georgia stating Delta can try to prove that CrowdStrike was grossly negligent by pushing a defective update to its Falcon software to customers. The update crashed 8.5 million Windows devices across the world. Crowdstrike previously claimed that the airline had rejected technical support offers both from itself and Microsoft. In a statement shared with Reuters, lawyers representing CrowdStrike said they were "confident the judge will find Delta's case has no merit, or will limit damages to the 'single-digit millions of dollars' under Georgia law." The development comes months after MGM Resorts International agreed to pay $45 million to settle multiple class-action lawsuits related to a data breach in 2019 and a ransomware attack the company experienced in 2023. Storm-1516 Uses AI-Generated Media to Spread Disinformation — The Russian influence operation known as Storm-1516 (aka CopyCop) sought to spread narratives that undermined the European support for Ukraine by amplifying fabricated stories on X about European leaders using drugs while traveling by train to Kyiv for peace talks. One of the posts was subsequently shared by Russian state media and Maria Zakharova, a senior official in Russia's foreign ministry, as part of what has been described as a coordinated disinformation campaign by EclecticIQ. The activity is also notable for the use of synthetic content depicting French President Emmanuel Macron, U.K. Labour Party leader Keir Starmer, and German chancellor Friedrich Merz of drug possession during their return from Ukraine. "By attacking the reputation of these leaders, the campaign likely aimed to turn their own voters against them, using influence operations (IO) to reduce public support for Ukraine by discrediting the politicians who back it," the Dutch threat intelligence firm said. Turkish Users Targeted by DBatLoader — AhnLab has disclosed details of a malware campaign that's distributing a malware loader called DBatLoader (aka ModiLoader) via banking-themed banking emails, which then acts as a conduit to deliver SnakeKeylogger, an information stealer developed in .NET. "The DBatLoader malware distributed through phishing emails has the cunning behavior of exploiting normal processes (easinvoker.exe, loader.exe) through techniques such as DLL side-loading and injection for most of its behaviors, and it also utilizes normal processes (cmd.exe, powershell.exe, esentutl.exe, extrac32.exe) for behaviors such as file copying and changing policies," the company said. SEC SIM-Swapper Sentenced to 14 Months for SEC X Account Hack — A 26-year-old Alabama man, Eric Council Jr., has been sentenced to 14 months in prison and three years of supervised release for using SIM swapping attacks to breach the U.S. Securities and Exchange Commission's (SEC) official X account in January 2024 and falsely announced that the SEC approved Bitcoin (BTC) Exchange Traded Funds (ETFs). Council Jr. (aka Ronin, Agiantschnauzer, and @EasyMunny) was arrested in October 2024 and pleaded guilty to the crime earlier this February. He has also been ordered to forfeit $50,000. According to court documents, Council used his personal computer to search incriminating phrases such as "SECGOV hack," "telegram sim swap," "how can I know for sure if I am being investigated by the FBI," "What are the signs that you are under investigation by law enforcement or the FBI even if you have not been contacted by them," "what are some signs that the FBI is after you," "Verizon store list," "federal identity theft statute," and "how long does it take to delete telegram account." FBI Warns of Malicious Campaign Impersonating Government Officials — The U.S. Federal Bureau of Investigation (FBI) is warning of a new campaign that involves malicious actors impersonating senior U.S. federal or state government officials and their contacts to target individuals since April 2025. "The malicious actors have sent text messages and AI-generated voice messages — techniques known as smishing and vishing, respectively — that claim to come from a senior US official in an effort to establish rapport before gaining access to personal accounts," the FBI said. "One way the actors gain such access is by sending targeted individuals a malicious link under the guise of transitioning to a separate messaging platform." From there, the actor may present malware or introduce hyperlinks that lead intended targets to an actor-controlled site that steals login information. DICOM Flaw Enables Attackers to Embed Malicious Code Within Medical Image Files — Praetorian has released a proof-of-concept (PoC) for a high-severity security flaw in Digital Imaging and Communications in Medicine (DICOM), predominant file format for medical images, that enables attackers to embed malicious code within legitimate medical image files. CVE-2019-11687 (CVSS score: 7.8), originally disclosed in 2019 by Markel Picado Ortiz, stems from a design decision that allows arbitrary content at the start of the file, otherwise called the Preamble, which enables the creation of malicious polyglots. Codenamed ELFDICOM, the PoC extends the attack surface to Linux environments, making it a much more potent threat. As mitigations, it's advised to implement a DICOM preamble whitelist. "DICOM's file structure inherently allows arbitrary bytes at the beginning of the file, where Linux and most operating systems will look for magic bytes," Praetorian researcher Ryan Hennessee said. "[The whitelist] would check a DICOM file's preamble before it is imported into the system. This would allow known good patterns, such as 'TIFF' magic bytes, or '\x00' null bytes, while files with the ELF magic bytes would be blocked." Cookie-Bite Attack Uses Chrome Extension to Steal Session Tokens — Cybersecurity researchers have demonstrated a new attack technique called Cookie-Bite that employs custom-made malicious browser extensions to steal "ESTAUTH" and "ESTSAUTHPERSISTNT" cookies in Microsoft Azure Entra ID and bypass multi-factor authentication (MFA). The attack has multiple moving parts to it: A custom Chrome extension that monitors authentication events and captures cookies; a PowerShell script that automates the extension deployment and ensures persistence; an exfiltration mechanism to send the cookies to a remote collection point; and a complementary extension to inject the captured cookies into the attacker's browser. "Threat actors often use infostealers to extract authentication tokens directly from a victim's machine or buy them directly through darkness markets, allowing adversaries to hijack active cloud sessions without triggering MFA," Varonis said. "By injecting these cookies while mimicking the victim's OS, browser, and network, attackers can evade Conditional Access Policies (CAPs) and maintain persistent access." Authentication cookies can also be stolen using adversary-in-the-middle (AitM) phishing kits in real-time, or using rogue browser extensions that request excessive permissions to interact with web sessions, modify page content, and extract stored authentication data. Once installed, the extension can access the browser's storage API, intercept network requests, or inject malicious JavaScript into active sessions to harvest real-time session cookies. "By leveraging stolen session cookies, an adversary can bypass authentication mechanisms, gaining seamless entry into cloud environments without requiring user credentials," Varonis said. "Beyond initial access, session hijacking can facilitate lateral movement across the tenant, allowing attackers to explore additional resources, access sensitive data, and escalate privileges by abusing existing permissions or misconfigured roles." 🎥 Cybersecurity Webinars Non-Human Identities: The AI Backdoor You're Not Watching → AI agents rely on Non-Human Identities (like service accounts and API keys) to function—but these are often left untracked and unsecured. As attackers shift focus to this hidden layer, the risk is growing fast. In this session, you'll learn how to find, secure, and monitor these identities before they're exploited. Join the webinar to understand the real risks behind AI adoption—and how to stay ahead. Inside the LOTS Playbook: How Hackers Stay Undetected → Attackers are using trusted sites to stay hidden. In this webinar, Zscaler experts share how they detect these stealthy LOTS attacks using insights from the world's largest security cloud. Join to learn how to spot hidden threats and improve your defense. 🔧 Cybersecurity Tools ScriptSentry → It is a free tool that scans your environment for dangerous logon script misconfigurations—like plaintext credentials, insecure file/share permissions, and references to non-existent servers. These overlooked issues can enable lateral movement, privilege escalation, or even credential theft. ScriptSentry helps you quickly identify and fix them across large Active Directory environments. Aftermath → It is a Swift-based, open-source tool for macOS incident response. It collects forensic data—like logs, browser activity, and process info—from compromised systems, then analyzes it to build timelines and track infection paths. Deploy via MDM or run manually. Fast, lightweight, and ideal for post-incident investigation. AI Red Teaming Playground Labs → It is an open-source training suite with hands-on challenges designed to teach security professionals how to red team AI systems. Originally developed for Black Hat USA 2024, the labs cover prompt injections, safety bypasses, indirect attacks, and Responsible AI failures. Built on Chat Copilot and deployable via Docker, it's a practical resource for testing and understanding real-world AI vulnerabilities. 🔒 Tip of the Week Review and Revoke Old OAuth App Permissions — They're Silent Backdoor → You've likely logged into apps using "Continue with Google," "Sign in with Microsoft," or GitHub/Twitter/Facebook logins. That's OAuth. But did you know many of those apps still have access to your data long after you stop using them? Why it matters: Even if you delete the app or forget it existed, it might still have ongoing access to your calendar, email, cloud files, or contact list — no password needed. If that third-party gets breached, your data is at risk. What to do: Go through your connected apps here: Google: myaccount.google.com/permissions Microsoft: account.live.com/consent/Manage GitHub: github.com/settings/applications Facebook: facebook.com/settings?tab=applications Revoke anything you don't actively use. It's a fast, silent cleanup — and it closes doors you didn't know were open. Conclusion Looking ahead, it's not just about tracking threats—it's about understanding what they reveal. Every tactic used, every system tested, points to deeper issues in how trust, access, and visibility are managed. As attackers adapt quickly, defenders need sharper awareness and faster response loops. The takeaways from this week aren't just technical—they speak to how teams prioritize risk, design safeguards, and make choices under pressure. Use these insights not just to react, but to rethink what "secure" really needs to mean in today's environment. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    0 Commenti 0 condivisioni
  • Where Does Joe Biden Live? Examining the Former President’s Homes

    Now that he’s out of the White House, where does Joe Biden live? The 46th US president has had a lifelong love of real estate, though he hasn’t always had the financial means to express it. “Even as a kid in high school I’d been seduced by real estate,” Biden wrote in his 2007 biography, Promises to Keep. His “idea of Saturday fun” when he was married to his first wife, Neilia, was to “drive around the Wilmington area scouting open houses, houses for sale, land where we could build,” he added. Reportedly, the former Delaware senator even carried issues of Architectural Digest on his daily commute. At one point, he was struggling to pay off three mortgages and a loan from his father-in-law to indulge his house habit. Eventually, Biden slowed down in favor of stability. Since the late 1990s, the Biden family has kept a Wilmington, Delaware, property as their main house. After his vice presidency, Biden was able to make more money through speeches and book deals, in turn allowing him to invest in a long-coveted vacation home.Read on to discover more about President Biden’s real estate portfolio.DuPont mansionIn 1974, the Scranton, Pennsylvania, native paid for a rundown 1930s mansion in Wilmington, Delaware, once owned by the prominent DuPont family. Three years later, he married Jill Biden, and she joined him at the five-bedroom, three-bathroom home, which he nicknamed the Station. The manse served as campaign headquarters during Biden’s 1988 presidential run. The 10,000-square-foot Colonial needed extensive repair, so he sunk ample time and money into renovations. “Whatever he gets, the house eats for breakfast. That house loves cash,” wrote journalist Richard Ben Cramer in his book about the 1988 presidential race, What It Takes.Biden sold the two-acre property for million in 1996.“The Lake House”The Bidens bought a four-acre Wilmington plot for shortly after offloading their DuPont mansion, then custom-built a 6,850-square-foot manse on the property overlooking a man-made lake built by the DuPonts. According to Delaware Online, Biden designed the home himself. The Colonial-style house, which was completed in 1998, has three bedrooms and four and a half bathrooms and is located in the coveted Greenville neighborhood, also known as Château Country for its concentration of stately Colonials. Reportedly, the estate also hosts a cottage that Biden rented out to the Secret Service for a month while he was vice president. Aerial photos reveal that the dwelling, which the Bidens call the Lake House, also boasts a spacious backyard pool.This is still the family’s primary residence.1 Observatory CircleFormer Vice President Kamala Harris and former German Chancellor Angela Merkel outside of the Vice President’s residence in 2021.Photo: Samuel Corum/CNP/Bloomberg via Getty Images
    #where #does #joe #biden #live
    Where Does Joe Biden Live? Examining the Former President’s Homes
    Now that he’s out of the White House, where does Joe Biden live? The 46th US president has had a lifelong love of real estate, though he hasn’t always had the financial means to express it. “Even as a kid in high school I’d been seduced by real estate,” Biden wrote in his 2007 biography, Promises to Keep. His “idea of Saturday fun” when he was married to his first wife, Neilia, was to “drive around the Wilmington area scouting open houses, houses for sale, land where we could build,” he added. Reportedly, the former Delaware senator even carried issues of Architectural Digest on his daily commute. At one point, he was struggling to pay off three mortgages and a loan from his father-in-law to indulge his house habit. Eventually, Biden slowed down in favor of stability. Since the late 1990s, the Biden family has kept a Wilmington, Delaware, property as their main house. After his vice presidency, Biden was able to make more money through speeches and book deals, in turn allowing him to invest in a long-coveted vacation home.Read on to discover more about President Biden’s real estate portfolio.DuPont mansionIn 1974, the Scranton, Pennsylvania, native paid for a rundown 1930s mansion in Wilmington, Delaware, once owned by the prominent DuPont family. Three years later, he married Jill Biden, and she joined him at the five-bedroom, three-bathroom home, which he nicknamed the Station. The manse served as campaign headquarters during Biden’s 1988 presidential run. The 10,000-square-foot Colonial needed extensive repair, so he sunk ample time and money into renovations. “Whatever he gets, the house eats for breakfast. That house loves cash,” wrote journalist Richard Ben Cramer in his book about the 1988 presidential race, What It Takes.Biden sold the two-acre property for million in 1996.“The Lake House”The Bidens bought a four-acre Wilmington plot for shortly after offloading their DuPont mansion, then custom-built a 6,850-square-foot manse on the property overlooking a man-made lake built by the DuPonts. According to Delaware Online, Biden designed the home himself. The Colonial-style house, which was completed in 1998, has three bedrooms and four and a half bathrooms and is located in the coveted Greenville neighborhood, also known as Château Country for its concentration of stately Colonials. Reportedly, the estate also hosts a cottage that Biden rented out to the Secret Service for a month while he was vice president. Aerial photos reveal that the dwelling, which the Bidens call the Lake House, also boasts a spacious backyard pool.This is still the family’s primary residence.1 Observatory CircleFormer Vice President Kamala Harris and former German Chancellor Angela Merkel outside of the Vice President’s residence in 2021.Photo: Samuel Corum/CNP/Bloomberg via Getty Images #where #does #joe #biden #live
    WWW.ARCHITECTURALDIGEST.COM
    Where Does Joe Biden Live? Examining the Former President’s Homes
    Now that he’s out of the White House, where does Joe Biden live? The 46th US president has had a lifelong love of real estate, though he hasn’t always had the financial means to express it. “Even as a kid in high school I’d been seduced by real estate,” Biden wrote in his 2007 biography, Promises to Keep. His “idea of Saturday fun” when he was married to his first wife, Neilia, was to “drive around the Wilmington area scouting open houses, houses for sale, land where we could build,” he added. Reportedly, the former Delaware senator even carried issues of Architectural Digest on his daily commute. At one point, he was struggling to pay off three mortgages and a loan from his father-in-law to indulge his house habit. Eventually, Biden slowed down in favor of stability. Since the late 1990s, the Biden family has kept a Wilmington, Delaware, property as their main house. After his vice presidency, Biden was able to make more money through speeches and book deals, in turn allowing him to invest in a long-coveted vacation home.Read on to discover more about President Biden’s real estate portfolio.DuPont mansionIn 1974, the Scranton, Pennsylvania, native paid $185,000 for a rundown 1930s mansion in Wilmington, Delaware, once owned by the prominent DuPont family. Three years later, he married Jill Biden (née Jacobs), and she joined him at the five-bedroom, three-bathroom home, which he nicknamed the Station. The manse served as campaign headquarters during Biden’s 1988 presidential run. The 10,000-square-foot Colonial needed extensive repair, so he sunk ample time and money into renovations. “Whatever he gets, the house eats for breakfast. That house loves cash,” wrote journalist Richard Ben Cramer in his book about the 1988 presidential race, What It Takes.Biden sold the two-acre property for $1.2 million in 1996.“The Lake House”The Bidens bought a four-acre Wilmington plot for $350,000 shortly after offloading their DuPont mansion, then custom-built a 6,850-square-foot manse on the property overlooking a man-made lake built by the DuPonts. According to Delaware Online, Biden designed the home himself. The Colonial-style house, which was completed in 1998, has three bedrooms and four and a half bathrooms and is located in the coveted Greenville neighborhood, also known as Château Country for its concentration of stately Colonials. Reportedly, the estate also hosts a cottage that Biden rented out to the Secret Service for $2,200 a month while he was vice president. Aerial photos reveal that the dwelling, which the Bidens call the Lake House, also boasts a spacious backyard pool.This is still the family’s primary residence.1 Observatory CircleFormer Vice President Kamala Harris and former German Chancellor Angela Merkel outside of the Vice President’s residence in 2021.Photo: Samuel Corum/CNP/Bloomberg via Getty Images
    0 Commenti 0 condivisioni
  • Rooms in the Elephant: Feix&Merlin’s restoration of Walworth Town Hall

    On a sunny spring morning in south London, Walworth Square offers a freshly minted moment of respite from the clamorous main road. Around a peculiar new war memorialnew trees shiver in the breeze, while, beneath them, a man, seemingly the worse for wear, stares vacantly at his scruffy shoes. Another man with enormous shoulders emerges from a gym and begins to take selfies.
    Across the square, steps rise to the grand Victorian jumble of Walworth Town Hall, which hasn’t been a town hall since the mid-1960s. Now, thanks to a fire and the near-bankruptcy of local government, the building houses offices, a café and a community centre. The architect of this transformation, Feix&Merlin, has had to negotiate a problematic inheritance – alandmark, catastrophic fire damage, impecunious owners and angry locals – and knead it into shape. In this they have succeeded, but the shape that it has assumed will, through no fault of the architects, prove indigestible to some. 
    The kernel of the extant structure was built as a church vestry in 1865. It later became Southwark Town Hall and was variously extended. Following the council’s evacuation to Camberwell in 1965, what remained was a public library, a local museum and municipal offices. In 2013 the roof caught fire and much of the Grade II-listed building was reduced to a shell; the remainder rotted behind hoardings until 2022, when work finally commenced on its restoration. Advertisement

    The protracted nature of this process can ultimately be attributed to chancellor George Osborne’s austerity budget of 2010. Although Southwark had at first intended to return the building to its original uses – and held a competition on this basis in 2015, which was won by Avanti Architects – it realised, on seeing the price tag, that this would be impossible. Avanti was dismissed and a new competition was held in 2018, with a revised brief. This emphasised the long-term commercial sustainability of the building, as well as an element of cultural use, taking into consideration the needs of the local community. The winners were developer General Projects working with Feix&Merlin.
    Their main gambit was to turn the building over to offices. However, on consulting the public while working up their proposal, they quickly realised how upset local residents were about the loss of public ownership. As a result, a community centre was added to the programme. It was the task of the designers to square this circle: how to retain the look and feel of a public building while optimising its new private function. They returned the exterior of the protected structure to its original form, including restoring the pattern to the roof tiles, which had been lost over the years. The ground floor houses the remaining public, or publicly accessible, spaces – the lobby café and community centre. The latter can be hired free of charge by local groups. The rest of the building is now offices. These also occupy its grandest rooms: the former main stair, debating chamber, library and museum. The last two functions have been transferred to a new building across the square, where they are housed in a new ‘heritage centre’.
    The architects have restored the historically significant interiors, more or less, removing the institutional accretions that had latterly defaced them, such as asphalt that had been laid on top of the masonry stairs and the false ceiling that hid the skylight above it. They also exposed the boxed-in balustrades on the mezzanine of the library and restored the parquet flooring throughout. All structural interventions have been achieved using cross-laminated timber. The roof has been reconstructed using it, creating a new storey with some intriguing windowless cubby holes inside its terminal turrets. In the former debating chamber, the structure of the roof is exposed to view, a striking piece of engineering. On the ground floor, the ceiling of the space that now houses the lobby-cum-café, which had fallen in during the fire, is supported by hefty wooden arches.
    In some places, the architects have made looser interpretations of the original fabric. The public viewing gallery of the debating chamber has been extended to cover three sides of the room and a pattern derived from the lost balustrade has been cut into sheet steel to create a protective barrier for this new mezzanine. Certain elements, especially in the less important interiors, have been preserved as the fire left them. Where internal walls were removed, their footprint remains, breaking up the parquet, so that, as Julia Feix puts it, visitors can still read the original plan. Above a painted dado, the pitted and scorched surface of the old plaster, or the bricks exposed beneath it, have been preserved in their damaged state. Feix says this approach ‘lets the building talk about its history, rather than creating a pastiche of an era that’s long gone’.
     This move has by now become an established procedure when dealing with rescue jobs, the obvious local example being Battersea Arts Centre, which Haworth Tompkins left similarly scarred following a 2015 fire. Its antecedents stretch back to Hans Döllgast’s post-war work on the Alte Pinakothek in Munich. In its more recent manifestations we could call this approach a fetishisation of decay, which raises questions as to what is being commemorated, and why. In Döllgast’s case, the answers were obvious: the Second World War, in order to prevent wilful amnesia. But in these two more recent examples, where the catastrophes in question were accidental fires, one might ask why a coat of plaster shouldn’t have been applied. Advertisement

    Walworth Town Hall helps to clarify the logic at work here, which is partly born of necessity. The building could not be restored to its previous condition or use, to the dismay of some locals, including the Walworth Society heritage group. The latter objected to the perceived loss of public access and was concerned that what remained could easily be revoked: for instance, if the café were unprofitable, it could be turned into more offices. They also disliked certain architectural aspects of the proposal, which they called ‘generic’: ‘neither bold and confident designs nor faithful restorations’. After protracted consultation, these concerns were taken into consideration by the architects in the restoration of the more significant rooms. Given the wrangling, it seems to me that, as in the case of Flores & Prats’ Sala Beckett in Barcelona, these patinated surfaces are intended to produce an impression of authenticity, without recourse torestoration, or ‘pastiche’, as the architects put it. It seems likely, however, that this code speaks more clearly to designers than to members of heritage groups. 
    But buildings are not made for heritage groups. Instead, this one is addressing two distinct publics. The community centre still opens to the Walworth Road, with its enduringly working-class character, and has already seen good use. However, the commercial part of the building has been reoriented to the new square to the north, from which it is accessed via the steps we traversed earlier. On the other side of the square rise the brick-slip-clad southern reaches of Elephant Park, the controversial development built by Lendlease on the rubble of the Heygate Estate. The Town Hall has turned its new face to these new Elephantines, the gym-dwellers who can afford to eat in the café and might choose to rent desk space here. To return to my earlier question regarding the catastrophe being commemorated by these charred walls, perhaps the answer is: the conflagration of local government, which produced this double-headed building.
    Tom Wilkinson is a writer, editor and teacher specialising in the history of architecture and the visual culture of modern Germany
    Architect’s view
    As architects, we often aim to deliver transformational change, but at Walworth Town Hall, transformation came through restraint. Rather than imposing a vision, we allowed the building to speak, guiding us in knowing where to intervene and where to hold back.
    One key move was the reinvention of the former debating chamber into a light-filled triple-height space. Historical features were carefully restored, while a new mezzanine with a CNC-cut solid steel balustrade subtly echoes the original decorative railings of the former viewing gallery. The space is now crowned with a new exposed CLT timber roof with a bespoke light feature at its centre. All new structural and architectural elements were executed in timber, speaking to the sustainability agenda, aligning with modern environmental standards and enhancing user wellbeing. Timber’s biophilic properties connect occupants with nature, supporting physical and mental health while improving air quality.
    Crucial to our design language was an honest celebration of the building’s history, including the fire-damaged ‘scars’ that tell its story. While a handful of spaces were traditionally restored, most were approached with a light touch. New finishes were installed only up to the lower dado level, with the rest of the wall surfaces and ceilings left as found, retaining their battle-worn character. Subtle material changes, such as microcement infills in the parquet, hint at the former wall layouts and structures.
    Striking a balance between restoration and contemporary intervention was essential. It has been a privilege to work on a building with such legacy and seeing the community return after more than a decade is deeply rewarding. Walworth Town Hall now honours its past while looking boldly to the future.
    Julia Feix, director, Feix&Merlin Architects

     
    Client’s view
    We approached this project with a vision for developing a new blueprint for bringing at-risk municipal landmarks back to life. Now restored to its former glory and removed from Historic England’s Heritage at Risk register, Walworth Town Hall has been given back to a new generation with an exciting new purpose, made viable and fit for modern standards. In partnership with Southwark Council, and closely collaborating with Historic England and local community groups, we worked with Feix&Merlin to deliver a sensitive but impactful design approach.
    Our vision was that the building’s legacy should be revealed, rather than erased. The result strikes a balance between celebrating its inherited state and adapting it to modern use, combining elements of old and new by making sympathetic references to its beautiful 19th century architecture. Distinctly modern features, such as the use of cross-laminated timber to replace sections of the building damaged by the 2013 fire, are a reflective and contemporary interpretation of the original design. Elephant and Castle is undergoing a significant regeneration and Walworth Town Hall functions as a bridge between the area’s authentic heritage and its new future. Driven by a collaborative process, and tailor-made for small businesses to create, inspire and thrive, the reimagined Walworth Town Hall lays the groundwork for a new creative community to grow in this local destination. 
    Frederic Schwass, chief development officer, General Projects

     
    Engineer’s view
    Heyne Tillett Steel was engaged as structural and civil engineer from competition stage to completion. It was both a challenging restoration of a listed building and an ambitious contemporary reconstruction, in exposed engineered timber, of its pre-fire form – at the same time creating better connectivity and adding floor area.  
    Built in various stages, the existing comprises nearly all methods of historic construction: timber, masonry, filler joist, clay pot, cast and wrought iron. The building had to be extensively investigated to understand its condition, fitness for reuse and, in some cases, capacity to extend.   Particular attention was paid to the impact of the fire and fire dousing in terms of movement, rot and corrosion. Repairs were carried out only where necessary after an extended period of drying and monitoring.
    The original council chamber roof was rebuilt as hybrid trussesto span the approximately 13 x 13m double-height volume below. The roof was prefabricated in just four pieces, built off the retained walls and installed in under two weeks.  A cross-laminated timbercovering creates the roof’s truncated pyramid shape.
    A new floor was added within the original massing of the west wing, utilising CLT slabs and a glulam ‘spine’ beam, creating unobstructed, exposed CLT ceilings across 7m bays at either side. The significant amount of retention and timber additions mean that the project scores very highly on benchmarks for embodied carbon, competitive beyond 2030 targets.
    Jonathan Flint, senior associate, Heyne Tillett Steel

     
    Working detail
    The restoration presented a rare opportunity to reimagine a historic structure using sustainable, expressive materials. The original council chamber roof, destroyed by fire, was rebuilt as a hybrid CLT/glulam and steel ties structure, combining the aesthetic warmth of timber with the tensile strength of steel. The new roof had to clear-span approximately 13 x 13m over a double-height volume, and as the truncated pyramid structure was kept exposed, the increased volume of the space added a dramatic effect while introducing a contemporary character.
    Timber was selected not only for its sustainability credentials but also for its light  weight, crucial in minimising loads on the existing retained masonry. The trusses were prefabricated offsite in four large components, ensuring precision and reducing construction time and disruption on site. Once craned into position, they were set atop an existing concrete ring beam, a structural necessity installed after the fire to stabilise the perimeter walls in the absence of a roof. This ring beam now discreetly supports the new load paths. The combination of the timber structure in combination with the exposed brick and traditional plaster achieves a visually striking, materially honest reconstruction that honours the building’s historic proportions while firmly rooting it in contemporary sustainable practice.
    Julia Feix, director, Feix&Merlin Architects

     
    Project data
    Location: Southwark, south London
    Start on site: February 2022
    Completion: November 2024
    Gross internal floor area: 5,000m2
    Construction cost: £18.4 million
    Form of contract: Design and build
    Construction cost per m2: £4,500
    Architect: Feix&Merlin Architects
    Client: General Projects
    Structural engineer: Heyne Tillett Steel
    M&E consultant: RED Engineering
    Quantity surveyor: Quartz
    Heritage architect: Donald Insall Associates, Heritage ArchitecturePlanning consultant: Rolfe Judd
    Landscape consultant: Town & Country Gardens
    Acoustic consultant: Sharps Redmore
    Transport consultant: Caneparo Associates
    Project manager: Quartz
    External lighting consultant: Atrium
    Specialist light feature: Barrisol
    Fit-out contractor: White Paper
    Art curation: Art Atelier
    Furniture, fixtures and equipment procurement: Hunter
    Community space operator: WTH Community Space
    Principal designer: ORSA
    CDM co-ordinator: ORSA
    Approved building inspector: Sweco Building Control
    Main contractor: Conamar
    Embodied carbon: 52 kgCO2/m2
    #rooms #elephant #feixampampmerlins #restoration #walworth
    Rooms in the Elephant: Feix&Merlin’s restoration of Walworth Town Hall
    On a sunny spring morning in south London, Walworth Square offers a freshly minted moment of respite from the clamorous main road. Around a peculiar new war memorialnew trees shiver in the breeze, while, beneath them, a man, seemingly the worse for wear, stares vacantly at his scruffy shoes. Another man with enormous shoulders emerges from a gym and begins to take selfies. Across the square, steps rise to the grand Victorian jumble of Walworth Town Hall, which hasn’t been a town hall since the mid-1960s. Now, thanks to a fire and the near-bankruptcy of local government, the building houses offices, a café and a community centre. The architect of this transformation, Feix&Merlin, has had to negotiate a problematic inheritance – alandmark, catastrophic fire damage, impecunious owners and angry locals – and knead it into shape. In this they have succeeded, but the shape that it has assumed will, through no fault of the architects, prove indigestible to some.  The kernel of the extant structure was built as a church vestry in 1865. It later became Southwark Town Hall and was variously extended. Following the council’s evacuation to Camberwell in 1965, what remained was a public library, a local museum and municipal offices. In 2013 the roof caught fire and much of the Grade II-listed building was reduced to a shell; the remainder rotted behind hoardings until 2022, when work finally commenced on its restoration. Advertisement The protracted nature of this process can ultimately be attributed to chancellor George Osborne’s austerity budget of 2010. Although Southwark had at first intended to return the building to its original uses – and held a competition on this basis in 2015, which was won by Avanti Architects – it realised, on seeing the price tag, that this would be impossible. Avanti was dismissed and a new competition was held in 2018, with a revised brief. This emphasised the long-term commercial sustainability of the building, as well as an element of cultural use, taking into consideration the needs of the local community. The winners were developer General Projects working with Feix&Merlin. Their main gambit was to turn the building over to offices. However, on consulting the public while working up their proposal, they quickly realised how upset local residents were about the loss of public ownership. As a result, a community centre was added to the programme. It was the task of the designers to square this circle: how to retain the look and feel of a public building while optimising its new private function. They returned the exterior of the protected structure to its original form, including restoring the pattern to the roof tiles, which had been lost over the years. The ground floor houses the remaining public, or publicly accessible, spaces – the lobby café and community centre. The latter can be hired free of charge by local groups. The rest of the building is now offices. These also occupy its grandest rooms: the former main stair, debating chamber, library and museum. The last two functions have been transferred to a new building across the square, where they are housed in a new ‘heritage centre’. The architects have restored the historically significant interiors, more or less, removing the institutional accretions that had latterly defaced them, such as asphalt that had been laid on top of the masonry stairs and the false ceiling that hid the skylight above it. They also exposed the boxed-in balustrades on the mezzanine of the library and restored the parquet flooring throughout. All structural interventions have been achieved using cross-laminated timber. The roof has been reconstructed using it, creating a new storey with some intriguing windowless cubby holes inside its terminal turrets. In the former debating chamber, the structure of the roof is exposed to view, a striking piece of engineering. On the ground floor, the ceiling of the space that now houses the lobby-cum-café, which had fallen in during the fire, is supported by hefty wooden arches. In some places, the architects have made looser interpretations of the original fabric. The public viewing gallery of the debating chamber has been extended to cover three sides of the room and a pattern derived from the lost balustrade has been cut into sheet steel to create a protective barrier for this new mezzanine. Certain elements, especially in the less important interiors, have been preserved as the fire left them. Where internal walls were removed, their footprint remains, breaking up the parquet, so that, as Julia Feix puts it, visitors can still read the original plan. Above a painted dado, the pitted and scorched surface of the old plaster, or the bricks exposed beneath it, have been preserved in their damaged state. Feix says this approach ‘lets the building talk about its history, rather than creating a pastiche of an era that’s long gone’.  This move has by now become an established procedure when dealing with rescue jobs, the obvious local example being Battersea Arts Centre, which Haworth Tompkins left similarly scarred following a 2015 fire. Its antecedents stretch back to Hans Döllgast’s post-war work on the Alte Pinakothek in Munich. In its more recent manifestations we could call this approach a fetishisation of decay, which raises questions as to what is being commemorated, and why. In Döllgast’s case, the answers were obvious: the Second World War, in order to prevent wilful amnesia. But in these two more recent examples, where the catastrophes in question were accidental fires, one might ask why a coat of plaster shouldn’t have been applied. Advertisement Walworth Town Hall helps to clarify the logic at work here, which is partly born of necessity. The building could not be restored to its previous condition or use, to the dismay of some locals, including the Walworth Society heritage group. The latter objected to the perceived loss of public access and was concerned that what remained could easily be revoked: for instance, if the café were unprofitable, it could be turned into more offices. They also disliked certain architectural aspects of the proposal, which they called ‘generic’: ‘neither bold and confident designs nor faithful restorations’. After protracted consultation, these concerns were taken into consideration by the architects in the restoration of the more significant rooms. Given the wrangling, it seems to me that, as in the case of Flores & Prats’ Sala Beckett in Barcelona, these patinated surfaces are intended to produce an impression of authenticity, without recourse torestoration, or ‘pastiche’, as the architects put it. It seems likely, however, that this code speaks more clearly to designers than to members of heritage groups.  But buildings are not made for heritage groups. Instead, this one is addressing two distinct publics. The community centre still opens to the Walworth Road, with its enduringly working-class character, and has already seen good use. However, the commercial part of the building has been reoriented to the new square to the north, from which it is accessed via the steps we traversed earlier. On the other side of the square rise the brick-slip-clad southern reaches of Elephant Park, the controversial development built by Lendlease on the rubble of the Heygate Estate. The Town Hall has turned its new face to these new Elephantines, the gym-dwellers who can afford to eat in the café and might choose to rent desk space here. To return to my earlier question regarding the catastrophe being commemorated by these charred walls, perhaps the answer is: the conflagration of local government, which produced this double-headed building. Tom Wilkinson is a writer, editor and teacher specialising in the history of architecture and the visual culture of modern Germany Architect’s view As architects, we often aim to deliver transformational change, but at Walworth Town Hall, transformation came through restraint. Rather than imposing a vision, we allowed the building to speak, guiding us in knowing where to intervene and where to hold back. One key move was the reinvention of the former debating chamber into a light-filled triple-height space. Historical features were carefully restored, while a new mezzanine with a CNC-cut solid steel balustrade subtly echoes the original decorative railings of the former viewing gallery. The space is now crowned with a new exposed CLT timber roof with a bespoke light feature at its centre. All new structural and architectural elements were executed in timber, speaking to the sustainability agenda, aligning with modern environmental standards and enhancing user wellbeing. Timber’s biophilic properties connect occupants with nature, supporting physical and mental health while improving air quality. Crucial to our design language was an honest celebration of the building’s history, including the fire-damaged ‘scars’ that tell its story. While a handful of spaces were traditionally restored, most were approached with a light touch. New finishes were installed only up to the lower dado level, with the rest of the wall surfaces and ceilings left as found, retaining their battle-worn character. Subtle material changes, such as microcement infills in the parquet, hint at the former wall layouts and structures. Striking a balance between restoration and contemporary intervention was essential. It has been a privilege to work on a building with such legacy and seeing the community return after more than a decade is deeply rewarding. Walworth Town Hall now honours its past while looking boldly to the future. Julia Feix, director, Feix&Merlin Architects   Client’s view We approached this project with a vision for developing a new blueprint for bringing at-risk municipal landmarks back to life. Now restored to its former glory and removed from Historic England’s Heritage at Risk register, Walworth Town Hall has been given back to a new generation with an exciting new purpose, made viable and fit for modern standards. In partnership with Southwark Council, and closely collaborating with Historic England and local community groups, we worked with Feix&Merlin to deliver a sensitive but impactful design approach. Our vision was that the building’s legacy should be revealed, rather than erased. The result strikes a balance between celebrating its inherited state and adapting it to modern use, combining elements of old and new by making sympathetic references to its beautiful 19th century architecture. Distinctly modern features, such as the use of cross-laminated timber to replace sections of the building damaged by the 2013 fire, are a reflective and contemporary interpretation of the original design. Elephant and Castle is undergoing a significant regeneration and Walworth Town Hall functions as a bridge between the area’s authentic heritage and its new future. Driven by a collaborative process, and tailor-made for small businesses to create, inspire and thrive, the reimagined Walworth Town Hall lays the groundwork for a new creative community to grow in this local destination.  Frederic Schwass, chief development officer, General Projects   Engineer’s view Heyne Tillett Steel was engaged as structural and civil engineer from competition stage to completion. It was both a challenging restoration of a listed building and an ambitious contemporary reconstruction, in exposed engineered timber, of its pre-fire form – at the same time creating better connectivity and adding floor area.   Built in various stages, the existing comprises nearly all methods of historic construction: timber, masonry, filler joist, clay pot, cast and wrought iron. The building had to be extensively investigated to understand its condition, fitness for reuse and, in some cases, capacity to extend.   Particular attention was paid to the impact of the fire and fire dousing in terms of movement, rot and corrosion. Repairs were carried out only where necessary after an extended period of drying and monitoring. The original council chamber roof was rebuilt as hybrid trussesto span the approximately 13 x 13m double-height volume below. The roof was prefabricated in just four pieces, built off the retained walls and installed in under two weeks.  A cross-laminated timbercovering creates the roof’s truncated pyramid shape. A new floor was added within the original massing of the west wing, utilising CLT slabs and a glulam ‘spine’ beam, creating unobstructed, exposed CLT ceilings across 7m bays at either side. The significant amount of retention and timber additions mean that the project scores very highly on benchmarks for embodied carbon, competitive beyond 2030 targets. Jonathan Flint, senior associate, Heyne Tillett Steel   Working detail The restoration presented a rare opportunity to reimagine a historic structure using sustainable, expressive materials. The original council chamber roof, destroyed by fire, was rebuilt as a hybrid CLT/glulam and steel ties structure, combining the aesthetic warmth of timber with the tensile strength of steel. The new roof had to clear-span approximately 13 x 13m over a double-height volume, and as the truncated pyramid structure was kept exposed, the increased volume of the space added a dramatic effect while introducing a contemporary character. Timber was selected not only for its sustainability credentials but also for its light  weight, crucial in minimising loads on the existing retained masonry. The trusses were prefabricated offsite in four large components, ensuring precision and reducing construction time and disruption on site. Once craned into position, they were set atop an existing concrete ring beam, a structural necessity installed after the fire to stabilise the perimeter walls in the absence of a roof. This ring beam now discreetly supports the new load paths. The combination of the timber structure in combination with the exposed brick and traditional plaster achieves a visually striking, materially honest reconstruction that honours the building’s historic proportions while firmly rooting it in contemporary sustainable practice. Julia Feix, director, Feix&Merlin Architects   Project data Location: Southwark, south London Start on site: February 2022 Completion: November 2024 Gross internal floor area: 5,000m2 Construction cost: £18.4 million Form of contract: Design and build Construction cost per m2: £4,500 Architect: Feix&Merlin Architects Client: General Projects Structural engineer: Heyne Tillett Steel M&E consultant: RED Engineering Quantity surveyor: Quartz Heritage architect: Donald Insall Associates, Heritage ArchitecturePlanning consultant: Rolfe Judd Landscape consultant: Town & Country Gardens Acoustic consultant: Sharps Redmore Transport consultant: Caneparo Associates Project manager: Quartz External lighting consultant: Atrium Specialist light feature: Barrisol Fit-out contractor: White Paper Art curation: Art Atelier Furniture, fixtures and equipment procurement: Hunter Community space operator: WTH Community Space Principal designer: ORSA CDM co-ordinator: ORSA Approved building inspector: Sweco Building Control Main contractor: Conamar Embodied carbon: 52 kgCO2/m2 #rooms #elephant #feixampampmerlins #restoration #walworth
    WWW.ARCHITECTSJOURNAL.CO.UK
    Rooms in the Elephant: Feix&Merlin’s restoration of Walworth Town Hall
    On a sunny spring morning in south London, Walworth Square offers a freshly minted moment of respite from the clamorous main road. Around a peculiar new war memorial (to which war? The tracksuited boy perched on a branch is not enlightening) new trees shiver in the breeze, while, beneath them, a man, seemingly the worse for wear, stares vacantly at his scruffy shoes. Another man with enormous shoulders emerges from a gym and begins to take selfies. Across the square, steps rise to the grand Victorian jumble of Walworth Town Hall, which hasn’t been a town hall since the mid-1960s. Now, thanks to a fire and the near-bankruptcy of local government, the building houses offices, a café and a community centre. The architect of this transformation, Feix&Merlin, has had to negotiate a problematic inheritance – a (minor) landmark, catastrophic fire damage, impecunious owners and angry locals – and knead it into shape. In this they have succeeded, but the shape that it has assumed will, through no fault of the architects, prove indigestible to some.  The kernel of the extant structure was built as a church vestry in 1865. It later became Southwark Town Hall and was variously extended. Following the council’s evacuation to Camberwell in 1965, what remained was a public library, a local museum and municipal offices. In 2013 the roof caught fire and much of the Grade II-listed building was reduced to a shell; the remainder rotted behind hoardings until 2022, when work finally commenced on its restoration. Advertisement The protracted nature of this process can ultimately be attributed to chancellor George Osborne’s austerity budget of 2010. Although Southwark had at first intended to return the building to its original uses – and held a competition on this basis in 2015, which was won by Avanti Architects – it realised, on seeing the price tag, that this would be impossible. Avanti was dismissed and a new competition was held in 2018, with a revised brief. This emphasised the long-term commercial sustainability of the building, as well as an element of cultural use, taking into consideration the needs of the local community. The winners were developer General Projects working with Feix&Merlin. Their main gambit was to turn the building over to offices. However, on consulting the public while working up their proposal, they quickly realised how upset local residents were about the loss of public ownership. As a result, a community centre was added to the programme. It was the task of the designers to square this circle: how to retain the look and feel of a public building while optimising its new private function. They returned the exterior of the protected structure to its original form, including restoring the pattern to the roof tiles, which had been lost over the years. The ground floor houses the remaining public, or publicly accessible, spaces – the lobby café and community centre. The latter can be hired free of charge by local groups. The rest of the building is now offices. These also occupy its grandest rooms: the former main stair, debating chamber, library and museum. The last two functions have been transferred to a new building across the square, where they are housed in a new ‘heritage centre’. The architects have restored the historically significant interiors, more or less, removing the institutional accretions that had latterly defaced them, such as asphalt that had been laid on top of the masonry stairs and the false ceiling that hid the skylight above it. They also exposed the boxed-in balustrades on the mezzanine of the library and restored the parquet flooring throughout. All structural interventions have been achieved using cross-laminated timber. The roof has been reconstructed using it, creating a new storey with some intriguing windowless cubby holes inside its terminal turrets (handy for undistracted meetings). In the former debating chamber, the structure of the roof is exposed to view, a striking piece of engineering. On the ground floor, the ceiling of the space that now houses the lobby-cum-café, which had fallen in during the fire, is supported by hefty wooden arches. In some places, the architects have made looser interpretations of the original fabric. The public viewing gallery of the debating chamber has been extended to cover three sides of the room and a pattern derived from the lost balustrade has been cut into sheet steel to create a protective barrier for this new mezzanine. Certain elements, especially in the less important interiors, have been preserved as the fire left them. Where internal walls were removed, their footprint remains, breaking up the parquet, so that, as Julia Feix puts it, visitors can still read the original plan. Above a painted dado, the pitted and scorched surface of the old plaster, or the bricks exposed beneath it, have been preserved in their damaged state. Feix says this approach ‘lets the building talk about its history, rather than creating a pastiche of an era that’s long gone’.  This move has by now become an established procedure when dealing with rescue jobs, the obvious local example being Battersea Arts Centre, which Haworth Tompkins left similarly scarred following a 2015 fire. Its antecedents stretch back to Hans Döllgast’s post-war work on the Alte Pinakothek in Munich. In its more recent manifestations we could call this approach a fetishisation of decay, which raises questions as to what is being commemorated, and why. In Döllgast’s case, the answers were obvious: the Second World War, in order to prevent wilful amnesia. But in these two more recent examples, where the catastrophes in question were accidental fires, one might ask why a coat of plaster shouldn’t have been applied. Advertisement Walworth Town Hall helps to clarify the logic at work here, which is partly born of necessity. The building could not be restored to its previous condition or use, to the dismay of some locals, including the Walworth Society heritage group. The latter objected to the perceived loss of public access and was concerned that what remained could easily be revoked: for instance, if the café were unprofitable, it could be turned into more offices. They also disliked certain architectural aspects of the proposal, which they called ‘generic’: ‘neither bold and confident designs nor faithful restorations’. After protracted consultation, these concerns were taken into consideration by the architects in the restoration of the more significant rooms. Given the wrangling, it seems to me that, as in the case of Flores & Prats’ Sala Beckett in Barcelona, these patinated surfaces are intended to produce an impression of authenticity, without recourse to (prohibitively expensive) restoration, or ‘pastiche’, as the architects put it. It seems likely, however, that this code speaks more clearly to designers than to members of heritage groups.  But buildings are not made for heritage groups. Instead, this one is addressing two distinct publics. The community centre still opens to the Walworth Road, with its enduringly working-class character, and has already seen good use. However, the commercial part of the building has been reoriented to the new square to the north, from which it is accessed via the steps we traversed earlier. On the other side of the square rise the brick-slip-clad southern reaches of Elephant Park, the controversial development built by Lendlease on the rubble of the Heygate Estate. The Town Hall has turned its new face to these new Elephantines, the gym-dwellers who can afford to eat in the café and might choose to rent desk space here (if they have to work, that is). To return to my earlier question regarding the catastrophe being commemorated by these charred walls, perhaps the answer is: the conflagration of local government, which produced this double-headed building. Tom Wilkinson is a writer, editor and teacher specialising in the history of architecture and the visual culture of modern Germany Architect’s view As architects, we often aim to deliver transformational change, but at Walworth Town Hall, transformation came through restraint. Rather than imposing a vision, we allowed the building to speak, guiding us in knowing where to intervene and where to hold back. One key move was the reinvention of the former debating chamber into a light-filled triple-height space. Historical features were carefully restored, while a new mezzanine with a CNC-cut solid steel balustrade subtly echoes the original decorative railings of the former viewing gallery. The space is now crowned with a new exposed CLT timber roof with a bespoke light feature at its centre. All new structural and architectural elements were executed in timber, speaking to the sustainability agenda, aligning with modern environmental standards and enhancing user wellbeing. Timber’s biophilic properties connect occupants with nature, supporting physical and mental health while improving air quality. Crucial to our design language was an honest celebration of the building’s history, including the fire-damaged ‘scars’ that tell its story. While a handful of spaces were traditionally restored, most were approached with a light touch. New finishes were installed only up to the lower dado level, with the rest of the wall surfaces and ceilings left as found, retaining their battle-worn character (cleaned up and made safe, of course). Subtle material changes, such as microcement infills in the parquet, hint at the former wall layouts and structures. Striking a balance between restoration and contemporary intervention was essential. It has been a privilege to work on a building with such legacy and seeing the community return after more than a decade is deeply rewarding. Walworth Town Hall now honours its past while looking boldly to the future. Julia Feix, director, Feix&Merlin Architects   Client’s view We approached this project with a vision for developing a new blueprint for bringing at-risk municipal landmarks back to life. Now restored to its former glory and removed from Historic England’s Heritage at Risk register, Walworth Town Hall has been given back to a new generation with an exciting new purpose, made viable and fit for modern standards. In partnership with Southwark Council, and closely collaborating with Historic England and local community groups, we worked with Feix&Merlin to deliver a sensitive but impactful design approach. Our vision was that the building’s legacy should be revealed, rather than erased. The result strikes a balance between celebrating its inherited state and adapting it to modern use, combining elements of old and new by making sympathetic references to its beautiful 19th century architecture. Distinctly modern features, such as the use of cross-laminated timber to replace sections of the building damaged by the 2013 fire, are a reflective and contemporary interpretation of the original design. Elephant and Castle is undergoing a significant regeneration and Walworth Town Hall functions as a bridge between the area’s authentic heritage and its new future. Driven by a collaborative process, and tailor-made for small businesses to create, inspire and thrive, the reimagined Walworth Town Hall lays the groundwork for a new creative community to grow in this local destination.  Frederic Schwass, chief development officer, General Projects   Engineer’s view Heyne Tillett Steel was engaged as structural and civil engineer from competition stage to completion. It was both a challenging restoration of a listed building and an ambitious contemporary reconstruction, in exposed engineered timber, of its pre-fire form – at the same time creating better connectivity and adding floor area.   Built in various stages, the existing comprises nearly all methods of historic construction: timber, masonry, filler joist, clay pot, cast and wrought iron. The building had to be extensively investigated to understand its condition, fitness for reuse and, in some cases, capacity to extend.   Particular attention was paid to the impact of the fire and fire dousing in terms of movement, rot and corrosion. Repairs were carried out only where necessary after an extended period of drying and monitoring. The original council chamber roof was rebuilt as hybrid trusses (glulam and steel) to span the approximately 13 x 13m double-height volume below. The roof was prefabricated in just four pieces, built off the retained walls and installed in under two weeks.  A cross-laminated timber (CLT) covering creates the roof’s truncated pyramid shape. A new floor was added within the original massing of the west wing, utilising CLT slabs and a glulam ‘spine’ beam, creating unobstructed, exposed CLT ceilings across 7m bays at either side. The significant amount of retention and timber additions mean that the project scores very highly on benchmarks for embodied carbon, competitive beyond 2030 targets. Jonathan Flint, senior associate, Heyne Tillett Steel   Working detail The restoration presented a rare opportunity to reimagine a historic structure using sustainable, expressive materials. The original council chamber roof, destroyed by fire, was rebuilt as a hybrid CLT/glulam and steel ties structure, combining the aesthetic warmth of timber with the tensile strength of steel. The new roof had to clear-span approximately 13 x 13m over a double-height volume, and as the truncated pyramid structure was kept exposed, the increased volume of the space added a dramatic effect while introducing a contemporary character. Timber was selected not only for its sustainability credentials but also for its light  weight, crucial in minimising loads on the existing retained masonry. The trusses were prefabricated offsite in four large components, ensuring precision and reducing construction time and disruption on site. Once craned into position, they were set atop an existing concrete ring beam, a structural necessity installed after the fire to stabilise the perimeter walls in the absence of a roof. This ring beam now discreetly supports the new load paths. The combination of the timber structure in combination with the exposed brick and traditional plaster achieves a visually striking, materially honest reconstruction that honours the building’s historic proportions while firmly rooting it in contemporary sustainable practice. Julia Feix, director, Feix&Merlin Architects   Project data Location: Southwark, south London Start on site: February 2022 Completion: November 2024 Gross internal floor area: 5,000m2 Construction cost: £18.4 million Form of contract: Design and build Construction cost per m2: £4,500 Architect: Feix&Merlin Architects Client: General Projects Structural engineer: Heyne Tillett Steel M&E consultant: RED Engineering Quantity surveyor: Quartz Heritage architect: Donald Insall Associates (planning), Heritage Architecture (tender) Planning consultant: Rolfe Judd Landscape consultant: Town & Country Gardens Acoustic consultant: Sharps Redmore Transport consultant: Caneparo Associates Project manager: Quartz External lighting consultant: Atrium Specialist light feature: Barrisol Fit-out contractor: White Paper Art curation: Art Atelier Furniture, fixtures and equipment procurement: Hunter Community space operator: WTH Community Space Principal designer: ORSA CDM co-ordinator: ORSA Approved building inspector: Sweco Building Control Main contractor: Conamar Embodied carbon: 52 kgCO2/m2
    0 Commenti 0 condivisioni
Pagine in Evidenza