• 8 Sage Green Color Palettes You’ve Got to Experience

    8 Sage Green Color Palettes You’ve Got to Experience

    In this article:See more ▼Post may contain affiliate links which give us commissions at no cost to you.There’s something undeniably calming about sage green that makes it one of my absolute favorite colors to work with as a designer. This muted, earthy hue has this incredible ability to ground a space while still feeling fresh and contemporary. Whether you’re working on a branding project, designing an interior space, or creating digital content, sage green offers a versatility that few colors can match.
    What I love most about sage green is how it bridges the gap between trendy and timeless. It’s not going anywhere anytime soon, and honestly, I don’t think it ever should. This sophisticated color has been quietly revolutionizing design palettes across every industry, and today I’m excited to share eight of my favorite sage green color combinations that will elevate your next project.
    Psst... Did you know you can get unlimited downloads of 59,000+ fonts and millions of other creative assets for just /mo? Learn more »The 8 Most Inspiring Sage Green Color Palettes
    1. Garden Fresh

    #D2E5C4

    #B2C69E

    #95B07B

    #79955D

    #5A743C

    Download this color palette

    735×1102
    Pinterest image

    2160×3840
    Vertical wallpaper

    900×900
    Square

    3840×2160
    4K Wallpaper

    This monochromatic sage palette is pure perfection for anyone wanting to create depth without complexity. I use this combination constantly in botanical-themed projects because it captures every shade of green you’d find in a thriving garden. The progression from light to dark creates natural hierarchy, making it incredibly functional for both print and digital work.
    2. Misty Morning

    #BDC9BB

    #ACBAA1

    #B2C1A2

    #A4B1A0

    #ADC3B7

    Download this color palette

    735×1102
    Pinterest image

    2160×3840
    Vertical wallpaper

    900×900
    Square

    3840×2160
    4K Wallpaper

    When I need something soft and ethereal, this is my go-to palette. These gentle sage tones remind me of early morning fog rolling over hills. It’s perfect for wellness brands, spa environments, or any project that needs to evoke tranquility and peace. The subtle variations create interest without ever feeling overwhelming.
    3. Harvest Moon

    #9AAB89

    #647056

    #D6C388

    #F8C565

    Download this color palette

    735×1102
    Pinterest image

    2160×3840
    Vertical wallpaper

    900×900
    Square

    3840×2160
    4K Wallpaper

    Get 300+ Fonts for FREEEnter your email to download our 100% free "Font Lover's Bundle". For commercial & personal use. No royalties. No fees. No attribution. 100% free to use anywhere.

    The combination of sage green with warm golds creates magic every single time. This palette captures that perfect autumn moment when the light hits everything just right. I love using this for brands that want to feel both grounded and optimistic – it’s earthy sophistication with a sunny disposition.
    4. Moody Botanical

    #4D5D42

    #6A894B

    #8DA67E

    #9B999A

    #C6B5DF

    Download this color palette

    735×1102
    Pinterest image

    2160×3840
    Vertical wallpaper

    900×900
    Square

    3840×2160
    4K Wallpaper

    For projects that need a bit more drama, this palette delivers beautifully. The deeper sage tones paired with that unexpected lavender create intrigue without losing the calming essence of green. I find this combination works wonderfully for upscale restaurants or luxury lifestyle brands that want to feel approachable yet refined.
    5. Countryside Charm

    #A3AC9A

    #8A9A5B

    #93A395

    #748B74

    #827D67

    Download this color palette

    735×1102
    Pinterest image

    2160×3840
    Vertical wallpaper

    900×900
    Square

    3840×2160
    4K Wallpaper

    This palette feels like a walk through the English countryside – all rolling hills and weathered stone walls. The mix of sage greens with those earthy undertones creates incredible depth. I use this combination for projects that need to feel established and trustworthy, like financial services or heritage brands.
    6. Industrial Farmhouse Zen

    #CED3D2

    #3F5054

    #6F675E

    #9CAB86

    #C8CAB5

    Download this color palette

    735×1102
    Pinterest image

    2160×3840
    Vertical wallpaper

    900×900
    Square

    3840×2160
    4K Wallpaper

    The marriage of sage green with industrial grays might seem unexpected, but it creates this incredibly sophisticated modern aesthetic. This palette is perfect for tech companies or architectural firms that want to feel innovative yet grounded. The sage adds warmth to what could otherwise be cold, sterile colors.
    7. Desert Sage

    #9AAB89

    #B2AC88

    #A06464

    #8C909C

    #C9AD99

    Download this color palette

    735×1102
    Pinterest image

    2160×3840
    Vertical wallpaper

    900×900
    Square

    3840×2160
    4K Wallpaper

    Inspired by the American Southwest, this palette combines sage with dusty terra cottas and warm beiges. There’s something so comforting about these colors together – they feel like sunset in the desert. I love using this for hospitality brands or any project that wants to evoke adventure and warmth.
    8. Forest Floor

    #B2C69E

    #ACB6A6

    #5B7553

    #745000

    #462800

    Download this color palette

    735×1102
    Pinterest image

    2160×3840
    Vertical wallpaper

    900×900
    Square

    3840×2160
    4K Wallpaper

    This rich, earthy combination takes sage green into deeper territory with those gorgeous chocolate browns. It reminds me of walking through an old-growth forest where the light filters through layers of leaves. Perfect for organic brands, outdoor companies, or any project that wants to feel authentic and connected to nature.
    Why Sage Green Is Having Its Moment
    As someone who’s been watching color trends for years, I can tell you that sage green’s popularity isn’t just a passing fad. This color speaks to our collective desire for calm in an increasingly chaotic world. It’s the visual equivalent of taking a deep breath – immediately soothing and centering.
    The rise of biophilic design has also played a huge role in sage green’s dominance. As we spend more time indoors, we’re craving those connections to nature, and sage green delivers that botanical feeling without being overly literal. It’s nature-inspired design at its most sophisticated.
    What makes sage green particularly special is its incredible adaptability. Unlike brighter greens that can feel overwhelming or dated, sage green has this chameleon-like quality that allows it to work in virtually any context. Pair it with warm woods and it feels rustic; combine it with metallics and it becomes luxurious; add some crisp whites and suddenly it’s Scandinavian minimalism.
    Mastering Sage Green in Your Design Work
    The key to working with sage green successfully is understanding its undertones. Some sage greens lean more yellow, others more blue or gray. Recognizing these subtle differences will help you create more cohesive palettes and avoid color clashes that can make your work feel off.
    I always recommend testing your sage green palettes in different lighting conditions. What looks perfect on your computer screen might feel completely different in natural light or under warm artificial lighting. This is especially crucial for interior design projects or any work that will be viewed in physical spaces.
    When building palettes around sage green, I like to think about the mood I’m trying to create. For calm, peaceful vibes, I’ll pair it with other muted tones and plenty of white space. For something more energetic, I might add unexpected pops of coral or sunny yellow. The beauty of sage green is that it’s such a diplomatic color – it plays well with almost everything.

    Sage Green Across Different Design Applications
    Branding and Logo Design In branding work, sage green communicates reliability, growth, and environmental consciousness without hitting people over the head with it. I love using it for wellness companies, sustainable brands, and professional services that want to feel approachable. The key is pairing it with typography that reinforces your brand personality – clean sans serifs for modern feels, or elegant serifs for more traditional approaches.
    Interior Spaces Sage green walls have become incredibly popular, and for good reason. The color creates an instant sense of calm while still feeling current. I particularly love using darker sage greens in dining rooms or bedrooms where you want that cozy, enveloping feeling. Lighter sages work beautifully in kitchens and bathrooms where you want freshness without the sterility of pure white.
    Digital Design For websites and apps, sage green offers a refreshing alternative to the blues and grays that dominate digital design. It’s easy on the eyes, which makes it perfect for apps focused on wellness, meditation, or any platform where users will spend extended time. Just be mindful of accessibility – always test your sage green backgrounds with various text colors to ensure proper contrast ratios.
    Product Design The natural, organic feeling of sage green makes it perfect for product packaging, especially in the beauty, food, and wellness sectors. It communicates quality and naturalness without feeling overly earthy or crunchy. I’ve seen it work beautifully on everything from skincare packaging to high-end kitchen appliances.
    The Psychology Behind Sage Green’s Appeal
    Color psychology tells us that green represents growth, harmony, and balance – all things we desperately need in our modern lives. But sage green takes these positive associations and adds sophistication. It’s green without the intensity, nature without the rawness.
    There’s also something inherently honest about sage green. It doesn’t try too hard or demand attention the way brighter colors do. This authenticity resonates with consumers who are increasingly skeptical of brands that feel forced or overly polished. Sage green whispers where other colors shout, and sometimes that’s exactly what your message needs.
    Looking Forward: Sage Green’s Staying Power
    While I can’t predict the future, I’m confident that sage green will remain relevant for years to come. It hits all the right notes for contemporary design – it’s calming without being boring, natural without being literal, and sophisticated without being pretentious.
    The color also photographs beautifully, which matters more than ever in our Instagram-driven world. Whether it’s a sage green accent wall or a product shot featuring sage packaging, this color translates perfectly to social media, helping brands create that coveted “aesthetic” that drives engagement.
    As we continue to prioritize wellness and sustainability in design, sage green offers the perfect visual shorthand for these values. It’s a color that makes people feel good, and in a world that often doesn’t, that’s incredibly powerful.
    Bringing It All Together
    These eight sage green palettes represent just the beginning of what’s possible with this incredible color. Whether you’re drawn to the monochromatic serenity of Garden Fresh or the unexpected sophistication of Industrial Zen, there’s a sage green palette that can elevate your next project.
    The secret to success with sage green is trusting its natural elegance. Don’t feel like you need to overstyling or complicate things – sage green’s beauty lies in its understated sophistication. Let it be the calm, confident foundation that allows other elements of your design to shine.
    So go ahead and embrace the sage green revolution. Your designswill thank you for it. After all, in a world full of visual noise, sometimes the most powerful statement you can make is a quiet one.

    Riley Morgan

    Riley Morgan is a globe-trotting graphic designer with a sharp eye for color, typography, and intuitive design. They are a color lover and blend creativity with culture, drawing inspiration from cities, landscapes, and stories around the world. When they’re not designing sleek visuals for clients, they’re blogging about trends, tools, and the art of making design feel like home—wherever that may be.

    8 Stunning Sunset Color PalettesThere’s something absolutely magical about watching the sun dip below the horizon, painting the sky in breathtaking hues that seem...10 Warm Color Palettes That’ll Brighten Your DayThere’s nothing quite like the embracing quality of warm colors to make a design feel inviting and alive. As someone...10 Luxurious Jewel Tone Color PalettesAs a designer who’s always searching for color combinations that exude sophistication and richness, I find myself constantly returning to...
    #sage #green #color #palettes #youve
    8 Sage Green Color Palettes You’ve Got to Experience
    8 Sage Green Color Palettes You’ve Got to Experience In this article:See more ▼Post may contain affiliate links which give us commissions at no cost to you.There’s something undeniably calming about sage green that makes it one of my absolute favorite colors to work with as a designer. This muted, earthy hue has this incredible ability to ground a space while still feeling fresh and contemporary. Whether you’re working on a branding project, designing an interior space, or creating digital content, sage green offers a versatility that few colors can match. What I love most about sage green is how it bridges the gap between trendy and timeless. It’s not going anywhere anytime soon, and honestly, I don’t think it ever should. This sophisticated color has been quietly revolutionizing design palettes across every industry, and today I’m excited to share eight of my favorite sage green color combinations that will elevate your next project. 👋 Psst... Did you know you can get unlimited downloads of 59,000+ fonts and millions of other creative assets for just /mo? Learn more »The 8 Most Inspiring Sage Green Color Palettes 1. Garden Fresh #D2E5C4 #B2C69E #95B07B #79955D #5A743C Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper This monochromatic sage palette is pure perfection for anyone wanting to create depth without complexity. I use this combination constantly in botanical-themed projects because it captures every shade of green you’d find in a thriving garden. The progression from light to dark creates natural hierarchy, making it incredibly functional for both print and digital work. 2. Misty Morning #BDC9BB #ACBAA1 #B2C1A2 #A4B1A0 #ADC3B7 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper When I need something soft and ethereal, this is my go-to palette. These gentle sage tones remind me of early morning fog rolling over hills. It’s perfect for wellness brands, spa environments, or any project that needs to evoke tranquility and peace. The subtle variations create interest without ever feeling overwhelming. 3. Harvest Moon #9AAB89 #647056 #D6C388 #F8C565 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper Get 300+ Fonts for FREEEnter your email to download our 100% free "Font Lover's Bundle". For commercial & personal use. No royalties. No fees. No attribution. 100% free to use anywhere. The combination of sage green with warm golds creates magic every single time. This palette captures that perfect autumn moment when the light hits everything just right. I love using this for brands that want to feel both grounded and optimistic – it’s earthy sophistication with a sunny disposition. 4. Moody Botanical #4D5D42 #6A894B #8DA67E #9B999A #C6B5DF Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper For projects that need a bit more drama, this palette delivers beautifully. The deeper sage tones paired with that unexpected lavender create intrigue without losing the calming essence of green. I find this combination works wonderfully for upscale restaurants or luxury lifestyle brands that want to feel approachable yet refined. 5. Countryside Charm #A3AC9A #8A9A5B #93A395 #748B74 #827D67 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper This palette feels like a walk through the English countryside – all rolling hills and weathered stone walls. The mix of sage greens with those earthy undertones creates incredible depth. I use this combination for projects that need to feel established and trustworthy, like financial services or heritage brands. 6. Industrial Farmhouse Zen #CED3D2 #3F5054 #6F675E #9CAB86 #C8CAB5 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper The marriage of sage green with industrial grays might seem unexpected, but it creates this incredibly sophisticated modern aesthetic. This palette is perfect for tech companies or architectural firms that want to feel innovative yet grounded. The sage adds warmth to what could otherwise be cold, sterile colors. 7. Desert Sage #9AAB89 #B2AC88 #A06464 #8C909C #C9AD99 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper Inspired by the American Southwest, this palette combines sage with dusty terra cottas and warm beiges. There’s something so comforting about these colors together – they feel like sunset in the desert. I love using this for hospitality brands or any project that wants to evoke adventure and warmth. 8. Forest Floor #B2C69E #ACB6A6 #5B7553 #745000 #462800 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper This rich, earthy combination takes sage green into deeper territory with those gorgeous chocolate browns. It reminds me of walking through an old-growth forest where the light filters through layers of leaves. Perfect for organic brands, outdoor companies, or any project that wants to feel authentic and connected to nature. Why Sage Green Is Having Its Moment As someone who’s been watching color trends for years, I can tell you that sage green’s popularity isn’t just a passing fad. This color speaks to our collective desire for calm in an increasingly chaotic world. It’s the visual equivalent of taking a deep breath – immediately soothing and centering. The rise of biophilic design has also played a huge role in sage green’s dominance. As we spend more time indoors, we’re craving those connections to nature, and sage green delivers that botanical feeling without being overly literal. It’s nature-inspired design at its most sophisticated. What makes sage green particularly special is its incredible adaptability. Unlike brighter greens that can feel overwhelming or dated, sage green has this chameleon-like quality that allows it to work in virtually any context. Pair it with warm woods and it feels rustic; combine it with metallics and it becomes luxurious; add some crisp whites and suddenly it’s Scandinavian minimalism. Mastering Sage Green in Your Design Work The key to working with sage green successfully is understanding its undertones. Some sage greens lean more yellow, others more blue or gray. Recognizing these subtle differences will help you create more cohesive palettes and avoid color clashes that can make your work feel off. I always recommend testing your sage green palettes in different lighting conditions. What looks perfect on your computer screen might feel completely different in natural light or under warm artificial lighting. This is especially crucial for interior design projects or any work that will be viewed in physical spaces. When building palettes around sage green, I like to think about the mood I’m trying to create. For calm, peaceful vibes, I’ll pair it with other muted tones and plenty of white space. For something more energetic, I might add unexpected pops of coral or sunny yellow. The beauty of sage green is that it’s such a diplomatic color – it plays well with almost everything. Sage Green Across Different Design Applications Branding and Logo Design In branding work, sage green communicates reliability, growth, and environmental consciousness without hitting people over the head with it. I love using it for wellness companies, sustainable brands, and professional services that want to feel approachable. The key is pairing it with typography that reinforces your brand personality – clean sans serifs for modern feels, or elegant serifs for more traditional approaches. Interior Spaces Sage green walls have become incredibly popular, and for good reason. The color creates an instant sense of calm while still feeling current. I particularly love using darker sage greens in dining rooms or bedrooms where you want that cozy, enveloping feeling. Lighter sages work beautifully in kitchens and bathrooms where you want freshness without the sterility of pure white. Digital Design For websites and apps, sage green offers a refreshing alternative to the blues and grays that dominate digital design. It’s easy on the eyes, which makes it perfect for apps focused on wellness, meditation, or any platform where users will spend extended time. Just be mindful of accessibility – always test your sage green backgrounds with various text colors to ensure proper contrast ratios. Product Design The natural, organic feeling of sage green makes it perfect for product packaging, especially in the beauty, food, and wellness sectors. It communicates quality and naturalness without feeling overly earthy or crunchy. I’ve seen it work beautifully on everything from skincare packaging to high-end kitchen appliances. The Psychology Behind Sage Green’s Appeal Color psychology tells us that green represents growth, harmony, and balance – all things we desperately need in our modern lives. But sage green takes these positive associations and adds sophistication. It’s green without the intensity, nature without the rawness. There’s also something inherently honest about sage green. It doesn’t try too hard or demand attention the way brighter colors do. This authenticity resonates with consumers who are increasingly skeptical of brands that feel forced or overly polished. Sage green whispers where other colors shout, and sometimes that’s exactly what your message needs. Looking Forward: Sage Green’s Staying Power While I can’t predict the future, I’m confident that sage green will remain relevant for years to come. It hits all the right notes for contemporary design – it’s calming without being boring, natural without being literal, and sophisticated without being pretentious. The color also photographs beautifully, which matters more than ever in our Instagram-driven world. Whether it’s a sage green accent wall or a product shot featuring sage packaging, this color translates perfectly to social media, helping brands create that coveted “aesthetic” that drives engagement. As we continue to prioritize wellness and sustainability in design, sage green offers the perfect visual shorthand for these values. It’s a color that makes people feel good, and in a world that often doesn’t, that’s incredibly powerful. Bringing It All Together These eight sage green palettes represent just the beginning of what’s possible with this incredible color. Whether you’re drawn to the monochromatic serenity of Garden Fresh or the unexpected sophistication of Industrial Zen, there’s a sage green palette that can elevate your next project. The secret to success with sage green is trusting its natural elegance. Don’t feel like you need to overstyling or complicate things – sage green’s beauty lies in its understated sophistication. Let it be the calm, confident foundation that allows other elements of your design to shine. So go ahead and embrace the sage green revolution. Your designswill thank you for it. After all, in a world full of visual noise, sometimes the most powerful statement you can make is a quiet one. Riley Morgan Riley Morgan is a globe-trotting graphic designer with a sharp eye for color, typography, and intuitive design. They are a color lover and blend creativity with culture, drawing inspiration from cities, landscapes, and stories around the world. When they’re not designing sleek visuals for clients, they’re blogging about trends, tools, and the art of making design feel like home—wherever that may be. 8 Stunning Sunset Color PalettesThere’s something absolutely magical about watching the sun dip below the horizon, painting the sky in breathtaking hues that seem...10 Warm Color Palettes That’ll Brighten Your DayThere’s nothing quite like the embracing quality of warm colors to make a design feel inviting and alive. As someone...10 Luxurious Jewel Tone Color PalettesAs a designer who’s always searching for color combinations that exude sophistication and richness, I find myself constantly returning to... #sage #green #color #palettes #youve
    DESIGNWORKLIFE.COM
    8 Sage Green Color Palettes You’ve Got to Experience
    8 Sage Green Color Palettes You’ve Got to Experience In this article:See more ▼Post may contain affiliate links which give us commissions at no cost to you.There’s something undeniably calming about sage green that makes it one of my absolute favorite colors to work with as a designer. This muted, earthy hue has this incredible ability to ground a space while still feeling fresh and contemporary. Whether you’re working on a branding project, designing an interior space, or creating digital content, sage green offers a versatility that few colors can match. What I love most about sage green is how it bridges the gap between trendy and timeless. It’s not going anywhere anytime soon, and honestly, I don’t think it ever should. This sophisticated color has been quietly revolutionizing design palettes across every industry, and today I’m excited to share eight of my favorite sage green color combinations that will elevate your next project. 👋 Psst... Did you know you can get unlimited downloads of 59,000+ fonts and millions of other creative assets for just $16.95/mo? Learn more »The 8 Most Inspiring Sage Green Color Palettes 1. Garden Fresh #D2E5C4 #B2C69E #95B07B #79955D #5A743C Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper This monochromatic sage palette is pure perfection for anyone wanting to create depth without complexity. I use this combination constantly in botanical-themed projects because it captures every shade of green you’d find in a thriving garden. The progression from light to dark creates natural hierarchy, making it incredibly functional for both print and digital work. 2. Misty Morning #BDC9BB #ACBAA1 #B2C1A2 #A4B1A0 #ADC3B7 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper When I need something soft and ethereal, this is my go-to palette. These gentle sage tones remind me of early morning fog rolling over hills. It’s perfect for wellness brands, spa environments, or any project that needs to evoke tranquility and peace. The subtle variations create interest without ever feeling overwhelming. 3. Harvest Moon #9AAB89 #647056 #D6C388 #F8C565 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper Get 300+ Fonts for FREEEnter your email to download our 100% free "Font Lover's Bundle". For commercial & personal use. No royalties. No fees. No attribution. 100% free to use anywhere. The combination of sage green with warm golds creates magic every single time. This palette captures that perfect autumn moment when the light hits everything just right. I love using this for brands that want to feel both grounded and optimistic – it’s earthy sophistication with a sunny disposition. 4. Moody Botanical #4D5D42 #6A894B #8DA67E #9B999A #C6B5DF Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper For projects that need a bit more drama, this palette delivers beautifully. The deeper sage tones paired with that unexpected lavender create intrigue without losing the calming essence of green. I find this combination works wonderfully for upscale restaurants or luxury lifestyle brands that want to feel approachable yet refined. 5. Countryside Charm #A3AC9A #8A9A5B #93A395 #748B74 #827D67 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper This palette feels like a walk through the English countryside – all rolling hills and weathered stone walls. The mix of sage greens with those earthy undertones creates incredible depth. I use this combination for projects that need to feel established and trustworthy, like financial services or heritage brands. 6. Industrial Farmhouse Zen #CED3D2 #3F5054 #6F675E #9CAB86 #C8CAB5 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper The marriage of sage green with industrial grays might seem unexpected, but it creates this incredibly sophisticated modern aesthetic. This palette is perfect for tech companies or architectural firms that want to feel innovative yet grounded. The sage adds warmth to what could otherwise be cold, sterile colors. 7. Desert Sage #9AAB89 #B2AC88 #A06464 #8C909C #C9AD99 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper Inspired by the American Southwest, this palette combines sage with dusty terra cottas and warm beiges. There’s something so comforting about these colors together – they feel like sunset in the desert. I love using this for hospitality brands or any project that wants to evoke adventure and warmth. 8. Forest Floor #B2C69E #ACB6A6 #5B7553 #745000 #462800 Download this color palette 735×1102 Pinterest image 2160×3840 Vertical wallpaper 900×900 Square 3840×2160 4K Wallpaper This rich, earthy combination takes sage green into deeper territory with those gorgeous chocolate browns. It reminds me of walking through an old-growth forest where the light filters through layers of leaves. Perfect for organic brands, outdoor companies, or any project that wants to feel authentic and connected to nature. Why Sage Green Is Having Its Moment As someone who’s been watching color trends for years, I can tell you that sage green’s popularity isn’t just a passing fad. This color speaks to our collective desire for calm in an increasingly chaotic world. It’s the visual equivalent of taking a deep breath – immediately soothing and centering. The rise of biophilic design has also played a huge role in sage green’s dominance. As we spend more time indoors, we’re craving those connections to nature, and sage green delivers that botanical feeling without being overly literal. It’s nature-inspired design at its most sophisticated. What makes sage green particularly special is its incredible adaptability. Unlike brighter greens that can feel overwhelming or dated, sage green has this chameleon-like quality that allows it to work in virtually any context. Pair it with warm woods and it feels rustic; combine it with metallics and it becomes luxurious; add some crisp whites and suddenly it’s Scandinavian minimalism. Mastering Sage Green in Your Design Work The key to working with sage green successfully is understanding its undertones. Some sage greens lean more yellow, others more blue or gray. Recognizing these subtle differences will help you create more cohesive palettes and avoid color clashes that can make your work feel off. I always recommend testing your sage green palettes in different lighting conditions. What looks perfect on your computer screen might feel completely different in natural light or under warm artificial lighting. This is especially crucial for interior design projects or any work that will be viewed in physical spaces. When building palettes around sage green, I like to think about the mood I’m trying to create. For calm, peaceful vibes, I’ll pair it with other muted tones and plenty of white space. For something more energetic, I might add unexpected pops of coral or sunny yellow. The beauty of sage green is that it’s such a diplomatic color – it plays well with almost everything. Sage Green Across Different Design Applications Branding and Logo Design In branding work, sage green communicates reliability, growth, and environmental consciousness without hitting people over the head with it. I love using it for wellness companies, sustainable brands, and professional services that want to feel approachable. The key is pairing it with typography that reinforces your brand personality – clean sans serifs for modern feels, or elegant serifs for more traditional approaches. Interior Spaces Sage green walls have become incredibly popular, and for good reason. The color creates an instant sense of calm while still feeling current. I particularly love using darker sage greens in dining rooms or bedrooms where you want that cozy, enveloping feeling. Lighter sages work beautifully in kitchens and bathrooms where you want freshness without the sterility of pure white. Digital Design For websites and apps, sage green offers a refreshing alternative to the blues and grays that dominate digital design. It’s easy on the eyes, which makes it perfect for apps focused on wellness, meditation, or any platform where users will spend extended time. Just be mindful of accessibility – always test your sage green backgrounds with various text colors to ensure proper contrast ratios. Product Design The natural, organic feeling of sage green makes it perfect for product packaging, especially in the beauty, food, and wellness sectors. It communicates quality and naturalness without feeling overly earthy or crunchy. I’ve seen it work beautifully on everything from skincare packaging to high-end kitchen appliances. The Psychology Behind Sage Green’s Appeal Color psychology tells us that green represents growth, harmony, and balance – all things we desperately need in our modern lives. But sage green takes these positive associations and adds sophistication. It’s green without the intensity, nature without the rawness. There’s also something inherently honest about sage green. It doesn’t try too hard or demand attention the way brighter colors do. This authenticity resonates with consumers who are increasingly skeptical of brands that feel forced or overly polished. Sage green whispers where other colors shout, and sometimes that’s exactly what your message needs. Looking Forward: Sage Green’s Staying Power While I can’t predict the future, I’m confident that sage green will remain relevant for years to come. It hits all the right notes for contemporary design – it’s calming without being boring, natural without being literal, and sophisticated without being pretentious. The color also photographs beautifully, which matters more than ever in our Instagram-driven world. Whether it’s a sage green accent wall or a product shot featuring sage packaging, this color translates perfectly to social media, helping brands create that coveted “aesthetic” that drives engagement. As we continue to prioritize wellness and sustainability in design, sage green offers the perfect visual shorthand for these values. It’s a color that makes people feel good, and in a world that often doesn’t, that’s incredibly powerful. Bringing It All Together These eight sage green palettes represent just the beginning of what’s possible with this incredible color. Whether you’re drawn to the monochromatic serenity of Garden Fresh or the unexpected sophistication of Industrial Zen, there’s a sage green palette that can elevate your next project. The secret to success with sage green is trusting its natural elegance. Don’t feel like you need to overstyling or complicate things – sage green’s beauty lies in its understated sophistication. Let it be the calm, confident foundation that allows other elements of your design to shine. So go ahead and embrace the sage green revolution. Your designs (and your stress levels) will thank you for it. After all, in a world full of visual noise, sometimes the most powerful statement you can make is a quiet one. Riley Morgan Riley Morgan is a globe-trotting graphic designer with a sharp eye for color, typography, and intuitive design. They are a color lover and blend creativity with culture, drawing inspiration from cities, landscapes, and stories around the world. When they’re not designing sleek visuals for clients, they’re blogging about trends, tools, and the art of making design feel like home—wherever that may be. 8 Stunning Sunset Color PalettesThere’s something absolutely magical about watching the sun dip below the horizon, painting the sky in breathtaking hues that seem...10 Warm Color Palettes That’ll Brighten Your DayThere’s nothing quite like the embracing quality of warm colors to make a design feel inviting and alive. As someone...10 Luxurious Jewel Tone Color PalettesAs a designer who’s always searching for color combinations that exude sophistication and richness, I find myself constantly returning to...
    0 Commentarii 0 Distribuiri
  • On this day: June 14

    June 14

    Killing of Sudbury and Hales

    1381 – During the Peasants' Revolt in England, rebels stormed the Tower of London, killing Simon Sudbury, Lord Chancellor, and Robert Hales, Lord High Treasurer.
    1644 – First English Civil War: Prince Maurice abandoned his siege of Lyme Regis in Dorset after learning of the approach of a Parliamentarian relief force.
    1934 – The landmark Australian Eastern Mission concluded after a three-month diplomatic tour of East and South-East Asia.
    2014 – War in Donbas: An Ilyushin Il-76 transport aircraft of the Ukrainian Air Force was shot down by forces of the self-proclaimed Luhansk People's Republic, killing all 49 people on board.
    QalaherriaqEmmeline PankhurstHeike FriedrichMoon Tae-ilMore anniversaries:
    June 13
    June 14
    June 15

    Archive
    By email
    List of days of the year
    About
    #this #day #june
    On this day: June 14
    June 14 Killing of Sudbury and Hales 1381 – During the Peasants' Revolt in England, rebels stormed the Tower of London, killing Simon Sudbury, Lord Chancellor, and Robert Hales, Lord High Treasurer. 1644 – First English Civil War: Prince Maurice abandoned his siege of Lyme Regis in Dorset after learning of the approach of a Parliamentarian relief force. 1934 – The landmark Australian Eastern Mission concluded after a three-month diplomatic tour of East and South-East Asia. 2014 – War in Donbas: An Ilyushin Il-76 transport aircraft of the Ukrainian Air Force was shot down by forces of the self-proclaimed Luhansk People's Republic, killing all 49 people on board. QalaherriaqEmmeline PankhurstHeike FriedrichMoon Tae-ilMore anniversaries: June 13 June 14 June 15 Archive By email List of days of the year About #this #day #june
    EN.WIKIPEDIA.ORG
    On this day: June 14
    June 14 Killing of Sudbury and Hales 1381 – During the Peasants' Revolt in England, rebels stormed the Tower of London, killing Simon Sudbury, Lord Chancellor, and Robert Hales, Lord High Treasurer (both pictured). 1644 – First English Civil War: Prince Maurice abandoned his siege of Lyme Regis in Dorset after learning of the approach of a Parliamentarian relief force. 1934 – The landmark Australian Eastern Mission concluded after a three-month diplomatic tour of East and South-East Asia. 2014 – War in Donbas: An Ilyushin Il-76 transport aircraft of the Ukrainian Air Force was shot down by forces of the self-proclaimed Luhansk People's Republic, killing all 49 people on board. Qalaherriaq (d. 1856)Emmeline Pankhurst (d. 1928)Heike Friedrich (b. 1976)Moon Tae-il (b. 1994) More anniversaries: June 13 June 14 June 15 Archive By email List of days of the year About
    0 Commentarii 0 Distribuiri
  • CERT Director Greg Touhill: To Lead Is to Serve

    Greg Touhill, director of the Software Engineering’s Institute’sComputer Emergency Response Teamdivision is an atypical technology leader. For one thing, he’s been in tech and other leadership positions that span the US Air Force, the US government, the private sector and now SEI’s CERT. More importantly, he’s been a major force in the cybersecurity realm, making the world a safer place and even saving lives. Touhill earned a bachelor’s degree from the Pennsylvania State University, a master’s degree from the University of Southern California, a master’s degree from the Air War College, was a senior executive fellow at the Harvard University Kennedy School of Government and completed executive education studies at the University of North Carolina. “I was a student intern at Carnegie Mellon, but I was going to college at Penn State and studying chemical engineering. As an Air Force ROTC scholarship recipient, I knew I was going to become an Air Force officer but soon realized that I didn’t necessarily want to be a chemical engineer in the Air Force,” says Touhill. “Because I passed all the mathematics, physics, and engineering courses, I ended up becoming a communications, electronics, and computer systems officer in the Air Force. I spent 30 years, one month and three days on active duty in the United States Air Force, eventually retiring as a brigadier general and having done many different types of jobs that were available to me within and even beyond my career field.” Related:Specifically, he was an operational commander at the squadron, group, and wing levels. For example, as a colonel, Touhill served as director of command, control, communications and computersfor the United States Central Command Forces, then he was appointed chief information officer and director, communications and information at Air Mobility Command. Later, he served as commander, 81st Training Wing at Kessler Air Force Base where he was promoted to brigadier general and commanded over 12,500 personnel. After that, he served as the senior defense officer and US defense attaché at the US Embassy in Kuwait, before concluding his military career as the chief information officer and director, C4 systems at the US Transportation Command, one of 10 US combatant commands, where he and his team were awarded the NSA Rowlett Award for the best cybersecurity program in the government. While in the Air Force, Touhill received numerous awards and decorations including the Bronze Star medal and the Air Force Science and Engineering Award. He is the only three-time recipient of the USAF C4 Professionalism Award. Related:Greg Touhill“I got to serve at major combatant commands, work with coalition partners from many different countries and represented the US as part of a diplomatic mission to Kuwait for two years as the senior defense official at a time when America was withdrawing forces out of Iraq. I also led the negotiation of a new bilateral defense agreement with the Kuwaitis,” says Touhill. “Then I was recruited to continue my service and was asked to serve as the deputy assistant secretary of cybersecurity and communications at the Department of Homeland Security, where I ran the operations of what is now known as the Cybersecurity and Infrastructure Security Agency. I was there at a pivotal moment because we were building up the capacity of that organization and setting the stage for it to become its own agency.” While at DHS, there were many noteworthy breaches including the infamous US Office of People Managementbreach. Those events led to Obama’s visit to the National Cybersecurity and Communications Integration Center.  “I got to brief the president on the state of cybersecurity, what we had seen with the OPM breach and some other deficiencies,” says Touhill. “I was on the federal CIO council as the cybersecurity advisor to that since I’d been a federal CIO before and I got to conclude my federal career by being the first United States government chief information security officer. From there, I pivoted to industry, but I also got to return to Carnegie Mellon as a faculty member at Carnegie Mellon’s Heinz College, where I've been teaching since January 2017.” Related:Touhill has been involved in three startups, two of which were successfully acquired. He also served on three Fortune 100 advisory boards and on the Information Systems Audit and Control Association board, eventually becoming its chair for a term during the seven years he served there. Touhill just celebrated his fourth year at CERT, which he considers the pinnacle of the cybersecurity profession and everything he’s done to date. “Over my career I've led teams that have done major software builds in the national security space. I've also been the guy who's pulled cables and set up routers, hubs and switches, and I've been a system administrator. I've done everything that I could do from the keyboard up all the way up to the White House,” says Touhill. “For 40 years, the Software Engineering Institute has been leading the world in secure by design, cybersecurity, software engineering, artificial intelligence and engineering, pioneering best practices, and figuring out how to make the world a safer more secure and trustworthy place. I’ve had a hand in the making of today’s modern military and government information technology environment, beginning as a 22-year-old lieutenant, and hope to inspire the next generation to do even better.” What ‘Success’ Means Many people would be satisfied with their careers as a brigadier general, a tech leader, the White House’s first anything, or working at CERT, let alone running it. Touhill has spent his entire career making the world a safer place, so it’s not surprising that he considers his greatest achievement saving lives. “In the Middle East and Iraq, convoys were being attacked with improvised explosive devices. There were also ‘direct fire’ attacks where people are firing weapons at you and indirect fire attacks where you could be in the line of fire,” says Touhill. “The convoys were using SINCGARS line-of-site walkie-talkies for communications that are most effective when the ground is flat, and Iraq is not flat. As a result, our troops were at risk of not having reliable communications while under attack. As my team brainstormed options to remedy the situation, one of my guys found some technology, about the size of an iPhone, that could covert a radio signal, which is basically a waveform, into a digital pulse I could put on a dedicated network to support the convoy missions.” For million, Touhill and his team quickly architected, tested, and fielded the Radio over IP networkthat had a 99% reliability rate anywhere in Iraq. Better still, convoys could communicate over the network using any radios. That solution saved a minimum of six lives. In one case, the hospital doctor said if the patient had arrived five minutes later, he would have died. Sage Advice Anyone who has ever spent time in the military or in a military family knows that soldiers are very well disciplined, or they wash out. Other traits include being physically fit, mentally fit, and achieving balance in life, though that’s difficult to achieve in combat. Still, it’s a necessity. “I served three and a half years down range in combat operations. My experience taught me you could be doing 20-hour days for a year or two on end. If you haven’t built a good foundation of being disciplined and fit, it impacts your ability to maintain presence in times of stress, and CISOs work in stressful situations,” says Touhill. “Staying fit also fortifies you for the long haul, so you don’t get burned out as fast.” Another necessary skill is the ability to work well with others.  “Cybersecurity is an interdisciplinary practice. One of the great joys I have as CERT director is the wide range of experts in many different fields that include software engineers, computer engineers, computer scientists, data scientists, mathematicians and physicists,” says Touhill. “I have folks who have business degrees and others who have philosophy degrees. It's really a rich community of interests all coming together towards that common goal of making the world a safer, more secure and more trusted place in the cyber domain. We’re are kind of like the cyber neighborhood watch for the whole world.” He also says that money isn’t everything, having taken a pay cut to go from being an Air Force brigadier general to the deputy assistant secretary of the Department of Homeland Security . “You’ll always do well if you pick the job that matters most. That’s what I did, and I’ve been rewarded every step,” says Touhill.  The biggest challenge he sees is the complexity of cyber systems and software, which can have second, third, and fourth order effects.  “Complexity raises the cost of the attack surface, increases the attack surface, raises the number of vulnerabilities and exploits human weaknesses,” says Touhill. “The No. 1 thing we need to be paying attention to is privacy when it comes to AI because AI can unearth and discover knowledge from data we already have. While it gives us greater insights at greater velocities, we need to be careful that we take precautions to better protect our privacy, civil rights and civil liberties.” 
    #cert #director #greg #touhill #lead
    CERT Director Greg Touhill: To Lead Is to Serve
    Greg Touhill, director of the Software Engineering’s Institute’sComputer Emergency Response Teamdivision is an atypical technology leader. For one thing, he’s been in tech and other leadership positions that span the US Air Force, the US government, the private sector and now SEI’s CERT. More importantly, he’s been a major force in the cybersecurity realm, making the world a safer place and even saving lives. Touhill earned a bachelor’s degree from the Pennsylvania State University, a master’s degree from the University of Southern California, a master’s degree from the Air War College, was a senior executive fellow at the Harvard University Kennedy School of Government and completed executive education studies at the University of North Carolina. “I was a student intern at Carnegie Mellon, but I was going to college at Penn State and studying chemical engineering. As an Air Force ROTC scholarship recipient, I knew I was going to become an Air Force officer but soon realized that I didn’t necessarily want to be a chemical engineer in the Air Force,” says Touhill. “Because I passed all the mathematics, physics, and engineering courses, I ended up becoming a communications, electronics, and computer systems officer in the Air Force. I spent 30 years, one month and three days on active duty in the United States Air Force, eventually retiring as a brigadier general and having done many different types of jobs that were available to me within and even beyond my career field.” Related:Specifically, he was an operational commander at the squadron, group, and wing levels. For example, as a colonel, Touhill served as director of command, control, communications and computersfor the United States Central Command Forces, then he was appointed chief information officer and director, communications and information at Air Mobility Command. Later, he served as commander, 81st Training Wing at Kessler Air Force Base where he was promoted to brigadier general and commanded over 12,500 personnel. After that, he served as the senior defense officer and US defense attaché at the US Embassy in Kuwait, before concluding his military career as the chief information officer and director, C4 systems at the US Transportation Command, one of 10 US combatant commands, where he and his team were awarded the NSA Rowlett Award for the best cybersecurity program in the government. While in the Air Force, Touhill received numerous awards and decorations including the Bronze Star medal and the Air Force Science and Engineering Award. He is the only three-time recipient of the USAF C4 Professionalism Award. Related:Greg Touhill“I got to serve at major combatant commands, work with coalition partners from many different countries and represented the US as part of a diplomatic mission to Kuwait for two years as the senior defense official at a time when America was withdrawing forces out of Iraq. I also led the negotiation of a new bilateral defense agreement with the Kuwaitis,” says Touhill. “Then I was recruited to continue my service and was asked to serve as the deputy assistant secretary of cybersecurity and communications at the Department of Homeland Security, where I ran the operations of what is now known as the Cybersecurity and Infrastructure Security Agency. I was there at a pivotal moment because we were building up the capacity of that organization and setting the stage for it to become its own agency.” While at DHS, there were many noteworthy breaches including the infamous US Office of People Managementbreach. Those events led to Obama’s visit to the National Cybersecurity and Communications Integration Center.  “I got to brief the president on the state of cybersecurity, what we had seen with the OPM breach and some other deficiencies,” says Touhill. “I was on the federal CIO council as the cybersecurity advisor to that since I’d been a federal CIO before and I got to conclude my federal career by being the first United States government chief information security officer. From there, I pivoted to industry, but I also got to return to Carnegie Mellon as a faculty member at Carnegie Mellon’s Heinz College, where I've been teaching since January 2017.” Related:Touhill has been involved in three startups, two of which were successfully acquired. He also served on three Fortune 100 advisory boards and on the Information Systems Audit and Control Association board, eventually becoming its chair for a term during the seven years he served there. Touhill just celebrated his fourth year at CERT, which he considers the pinnacle of the cybersecurity profession and everything he’s done to date. “Over my career I've led teams that have done major software builds in the national security space. I've also been the guy who's pulled cables and set up routers, hubs and switches, and I've been a system administrator. I've done everything that I could do from the keyboard up all the way up to the White House,” says Touhill. “For 40 years, the Software Engineering Institute has been leading the world in secure by design, cybersecurity, software engineering, artificial intelligence and engineering, pioneering best practices, and figuring out how to make the world a safer more secure and trustworthy place. I’ve had a hand in the making of today’s modern military and government information technology environment, beginning as a 22-year-old lieutenant, and hope to inspire the next generation to do even better.” What ‘Success’ Means Many people would be satisfied with their careers as a brigadier general, a tech leader, the White House’s first anything, or working at CERT, let alone running it. Touhill has spent his entire career making the world a safer place, so it’s not surprising that he considers his greatest achievement saving lives. “In the Middle East and Iraq, convoys were being attacked with improvised explosive devices. There were also ‘direct fire’ attacks where people are firing weapons at you and indirect fire attacks where you could be in the line of fire,” says Touhill. “The convoys were using SINCGARS line-of-site walkie-talkies for communications that are most effective when the ground is flat, and Iraq is not flat. As a result, our troops were at risk of not having reliable communications while under attack. As my team brainstormed options to remedy the situation, one of my guys found some technology, about the size of an iPhone, that could covert a radio signal, which is basically a waveform, into a digital pulse I could put on a dedicated network to support the convoy missions.” For million, Touhill and his team quickly architected, tested, and fielded the Radio over IP networkthat had a 99% reliability rate anywhere in Iraq. Better still, convoys could communicate over the network using any radios. That solution saved a minimum of six lives. In one case, the hospital doctor said if the patient had arrived five minutes later, he would have died. Sage Advice Anyone who has ever spent time in the military or in a military family knows that soldiers are very well disciplined, or they wash out. Other traits include being physically fit, mentally fit, and achieving balance in life, though that’s difficult to achieve in combat. Still, it’s a necessity. “I served three and a half years down range in combat operations. My experience taught me you could be doing 20-hour days for a year or two on end. If you haven’t built a good foundation of being disciplined and fit, it impacts your ability to maintain presence in times of stress, and CISOs work in stressful situations,” says Touhill. “Staying fit also fortifies you for the long haul, so you don’t get burned out as fast.” Another necessary skill is the ability to work well with others.  “Cybersecurity is an interdisciplinary practice. One of the great joys I have as CERT director is the wide range of experts in many different fields that include software engineers, computer engineers, computer scientists, data scientists, mathematicians and physicists,” says Touhill. “I have folks who have business degrees and others who have philosophy degrees. It's really a rich community of interests all coming together towards that common goal of making the world a safer, more secure and more trusted place in the cyber domain. We’re are kind of like the cyber neighborhood watch for the whole world.” He also says that money isn’t everything, having taken a pay cut to go from being an Air Force brigadier general to the deputy assistant secretary of the Department of Homeland Security . “You’ll always do well if you pick the job that matters most. That’s what I did, and I’ve been rewarded every step,” says Touhill.  The biggest challenge he sees is the complexity of cyber systems and software, which can have second, third, and fourth order effects.  “Complexity raises the cost of the attack surface, increases the attack surface, raises the number of vulnerabilities and exploits human weaknesses,” says Touhill. “The No. 1 thing we need to be paying attention to is privacy when it comes to AI because AI can unearth and discover knowledge from data we already have. While it gives us greater insights at greater velocities, we need to be careful that we take precautions to better protect our privacy, civil rights and civil liberties.”  #cert #director #greg #touhill #lead
    WWW.INFORMATIONWEEK.COM
    CERT Director Greg Touhill: To Lead Is to Serve
    Greg Touhill, director of the Software Engineering’s Institute’s (SEI’s) Computer Emergency Response Team (CERT) division is an atypical technology leader. For one thing, he’s been in tech and other leadership positions that span the US Air Force, the US government, the private sector and now SEI’s CERT. More importantly, he’s been a major force in the cybersecurity realm, making the world a safer place and even saving lives. Touhill earned a bachelor’s degree from the Pennsylvania State University, a master’s degree from the University of Southern California, a master’s degree from the Air War College, was a senior executive fellow at the Harvard University Kennedy School of Government and completed executive education studies at the University of North Carolina. “I was a student intern at Carnegie Mellon, but I was going to college at Penn State and studying chemical engineering. As an Air Force ROTC scholarship recipient, I knew I was going to become an Air Force officer but soon realized that I didn’t necessarily want to be a chemical engineer in the Air Force,” says Touhill. “Because I passed all the mathematics, physics, and engineering courses, I ended up becoming a communications, electronics, and computer systems officer in the Air Force. I spent 30 years, one month and three days on active duty in the United States Air Force, eventually retiring as a brigadier general and having done many different types of jobs that were available to me within and even beyond my career field.” Related:Specifically, he was an operational commander at the squadron, group, and wing levels. For example, as a colonel, Touhill served as director of command, control, communications and computers (C4) for the United States Central Command Forces, then he was appointed chief information officer and director, communications and information at Air Mobility Command. Later, he served as commander, 81st Training Wing at Kessler Air Force Base where he was promoted to brigadier general and commanded over 12,500 personnel. After that, he served as the senior defense officer and US defense attaché at the US Embassy in Kuwait, before concluding his military career as the chief information officer and director, C4 systems at the US Transportation Command, one of 10 US combatant commands, where he and his team were awarded the NSA Rowlett Award for the best cybersecurity program in the government. While in the Air Force, Touhill received numerous awards and decorations including the Bronze Star medal and the Air Force Science and Engineering Award. He is the only three-time recipient of the USAF C4 Professionalism Award. Related:Greg Touhill“I got to serve at major combatant commands, work with coalition partners from many different countries and represented the US as part of a diplomatic mission to Kuwait for two years as the senior defense official at a time when America was withdrawing forces out of Iraq. I also led the negotiation of a new bilateral defense agreement with the Kuwaitis,” says Touhill. “Then I was recruited to continue my service and was asked to serve as the deputy assistant secretary of cybersecurity and communications at the Department of Homeland Security, where I ran the operations of what is now known as the Cybersecurity and Infrastructure Security Agency. I was there at a pivotal moment because we were building up the capacity of that organization and setting the stage for it to become its own agency.” While at DHS, there were many noteworthy breaches including the infamous US Office of People Management (OPM) breach. Those events led to Obama’s visit to the National Cybersecurity and Communications Integration Center.  “I got to brief the president on the state of cybersecurity, what we had seen with the OPM breach and some other deficiencies,” says Touhill. “I was on the federal CIO council as the cybersecurity advisor to that since I’d been a federal CIO before and I got to conclude my federal career by being the first United States government chief information security officer. From there, I pivoted to industry, but I also got to return to Carnegie Mellon as a faculty member at Carnegie Mellon’s Heinz College, where I've been teaching since January 2017.” Related:Touhill has been involved in three startups, two of which were successfully acquired. He also served on three Fortune 100 advisory boards and on the Information Systems Audit and Control Association board, eventually becoming its chair for a term during the seven years he served there. Touhill just celebrated his fourth year at CERT, which he considers the pinnacle of the cybersecurity profession and everything he’s done to date. “Over my career I've led teams that have done major software builds in the national security space. I've also been the guy who's pulled cables and set up routers, hubs and switches, and I've been a system administrator. I've done everything that I could do from the keyboard up all the way up to the White House,” says Touhill. “For 40 years, the Software Engineering Institute has been leading the world in secure by design, cybersecurity, software engineering, artificial intelligence and engineering, pioneering best practices, and figuring out how to make the world a safer more secure and trustworthy place. I’ve had a hand in the making of today’s modern military and government information technology environment, beginning as a 22-year-old lieutenant, and hope to inspire the next generation to do even better.” What ‘Success’ Means Many people would be satisfied with their careers as a brigadier general, a tech leader, the White House’s first anything, or working at CERT, let alone running it. Touhill has spent his entire career making the world a safer place, so it’s not surprising that he considers his greatest achievement saving lives. “In the Middle East and Iraq, convoys were being attacked with improvised explosive devices. There were also ‘direct fire’ attacks where people are firing weapons at you and indirect fire attacks where you could be in the line of fire,” says Touhill. “The convoys were using SINCGARS line-of-site walkie-talkies for communications that are most effective when the ground is flat, and Iraq is not flat. As a result, our troops were at risk of not having reliable communications while under attack. As my team brainstormed options to remedy the situation, one of my guys found some technology, about the size of an iPhone, that could covert a radio signal, which is basically a waveform, into a digital pulse I could put on a dedicated network to support the convoy missions.” For $11 million, Touhill and his team quickly architected, tested, and fielded the Radio over IP network (aka “Ripper Net”) that had a 99% reliability rate anywhere in Iraq. Better still, convoys could communicate over the network using any radios. That solution saved a minimum of six lives. In one case, the hospital doctor said if the patient had arrived five minutes later, he would have died. Sage Advice Anyone who has ever spent time in the military or in a military family knows that soldiers are very well disciplined, or they wash out. Other traits include being physically fit, mentally fit, and achieving balance in life, though that’s difficult to achieve in combat. Still, it’s a necessity. “I served three and a half years down range in combat operations. My experience taught me you could be doing 20-hour days for a year or two on end. If you haven’t built a good foundation of being disciplined and fit, it impacts your ability to maintain presence in times of stress, and CISOs work in stressful situations,” says Touhill. “Staying fit also fortifies you for the long haul, so you don’t get burned out as fast.” Another necessary skill is the ability to work well with others.  “Cybersecurity is an interdisciplinary practice. One of the great joys I have as CERT director is the wide range of experts in many different fields that include software engineers, computer engineers, computer scientists, data scientists, mathematicians and physicists,” says Touhill. “I have folks who have business degrees and others who have philosophy degrees. It's really a rich community of interests all coming together towards that common goal of making the world a safer, more secure and more trusted place in the cyber domain. We’re are kind of like the cyber neighborhood watch for the whole world.” He also says that money isn’t everything, having taken a pay cut to go from being an Air Force brigadier general to the deputy assistant secretary of the Department of Homeland Security . “You’ll always do well if you pick the job that matters most. That’s what I did, and I’ve been rewarded every step,” says Touhill.  The biggest challenge he sees is the complexity of cyber systems and software, which can have second, third, and fourth order effects.  “Complexity raises the cost of the attack surface, increases the attack surface, raises the number of vulnerabilities and exploits human weaknesses,” says Touhill. “The No. 1 thing we need to be paying attention to is privacy when it comes to AI because AI can unearth and discover knowledge from data we already have. While it gives us greater insights at greater velocities, we need to be careful that we take precautions to better protect our privacy, civil rights and civil liberties.” 
    0 Commentarii 0 Distribuiri
  • Meta's chief AI scientist says all countries should contribute data to a shared open-source AI model

    Yann LeCun, Meta's chief AI scientist, talks about AI regulation.

    FABRICE COFFRINI / AFP via Getty Images

    2025-05-31T21:40:40Z

    d

    Read in app

    This story is available exclusively to Business Insider
    subscribers. Become an Insider
    and start reading now.
    Have an account?

    Yann LeCun, Meta's chief AI scientist, has some ideas on open-source regulation.
    LeCun thinks open-source AI should be an international resource.
    Countries must ensure they are not "impeding open source platforms," he said.

    AI has surged to the top of the diplomatic agenda in the past couple of years.And one of the leading topics of discussion among researchers, tech executives, and policymakers is how open-source models — which are free for anyone to use and modify — should be governed.At the AI Action Summit in Paris earlier this year, Meta's chief AI scientist, Yann LeCun, said he'd like to see a world in which "we'll train our open-source platforms in a distributed fashion with data centers spread across the world." Each will have access to its own data sources, which they may keep confidential, but "they will contribute to a common model that will essentially constitute a repository of all human knowledge," he said.This repository will be larger than what any one entity, whether a country or company, can handle. India, for example, may not give away a body of knowledge comprising all the languages and dialects spoken there to a tech company. However, "they would be happy to contribute to training a big model, if they can, that is open source," he said.To achieve that vision, though, "countries have to be really careful with regulations and legislation." He said countries shouldn't impede open-source, but favor it.Even for closed-loop systems, OpenAI CEO Sam Altman has said international regulation is critical."I think there will come a time in the not-so-distant future, like we're not talking decades and decades from now, where frontier AI systems are capable of causing significant global harm," Altman said on the All-In podcast last year.Altman believes those systems will have a "negative impact way beyond the realm of one country" and said he wanted to see them regulated by "an international agency looking at the most powerful systems and ensuring reasonable safety testing."

    Recommended video
    #meta039s #chief #scientist #says #all
    Meta's chief AI scientist says all countries should contribute data to a shared open-source AI model
    Yann LeCun, Meta's chief AI scientist, talks about AI regulation. FABRICE COFFRINI / AFP via Getty Images 2025-05-31T21:40:40Z d Read in app This story is available exclusively to Business Insider subscribers. Become an Insider and start reading now. Have an account? Yann LeCun, Meta's chief AI scientist, has some ideas on open-source regulation. LeCun thinks open-source AI should be an international resource. Countries must ensure they are not "impeding open source platforms," he said. AI has surged to the top of the diplomatic agenda in the past couple of years.And one of the leading topics of discussion among researchers, tech executives, and policymakers is how open-source models — which are free for anyone to use and modify — should be governed.At the AI Action Summit in Paris earlier this year, Meta's chief AI scientist, Yann LeCun, said he'd like to see a world in which "we'll train our open-source platforms in a distributed fashion with data centers spread across the world." Each will have access to its own data sources, which they may keep confidential, but "they will contribute to a common model that will essentially constitute a repository of all human knowledge," he said.This repository will be larger than what any one entity, whether a country or company, can handle. India, for example, may not give away a body of knowledge comprising all the languages and dialects spoken there to a tech company. However, "they would be happy to contribute to training a big model, if they can, that is open source," he said.To achieve that vision, though, "countries have to be really careful with regulations and legislation." He said countries shouldn't impede open-source, but favor it.Even for closed-loop systems, OpenAI CEO Sam Altman has said international regulation is critical."I think there will come a time in the not-so-distant future, like we're not talking decades and decades from now, where frontier AI systems are capable of causing significant global harm," Altman said on the All-In podcast last year.Altman believes those systems will have a "negative impact way beyond the realm of one country" and said he wanted to see them regulated by "an international agency looking at the most powerful systems and ensuring reasonable safety testing." Recommended video #meta039s #chief #scientist #says #all
    WWW.BUSINESSINSIDER.COM
    Meta's chief AI scientist says all countries should contribute data to a shared open-source AI model
    Yann LeCun, Meta's chief AI scientist, talks about AI regulation. FABRICE COFFRINI / AFP via Getty Images 2025-05-31T21:40:40Z Save Saved Read in app This story is available exclusively to Business Insider subscribers. Become an Insider and start reading now. Have an account? Yann LeCun, Meta's chief AI scientist, has some ideas on open-source regulation. LeCun thinks open-source AI should be an international resource. Countries must ensure they are not "impeding open source platforms," he said. AI has surged to the top of the diplomatic agenda in the past couple of years.And one of the leading topics of discussion among researchers, tech executives, and policymakers is how open-source models — which are free for anyone to use and modify — should be governed.At the AI Action Summit in Paris earlier this year, Meta's chief AI scientist, Yann LeCun, said he'd like to see a world in which "we'll train our open-source platforms in a distributed fashion with data centers spread across the world." Each will have access to its own data sources, which they may keep confidential, but "they will contribute to a common model that will essentially constitute a repository of all human knowledge," he said.This repository will be larger than what any one entity, whether a country or company, can handle. India, for example, may not give away a body of knowledge comprising all the languages and dialects spoken there to a tech company. However, "they would be happy to contribute to training a big model, if they can, that is open source," he said.To achieve that vision, though, "countries have to be really careful with regulations and legislation." He said countries shouldn't impede open-source, but favor it.Even for closed-loop systems, OpenAI CEO Sam Altman has said international regulation is critical."I think there will come a time in the not-so-distant future, like we're not talking decades and decades from now, where frontier AI systems are capable of causing significant global harm," Altman said on the All-In podcast last year.Altman believes those systems will have a "negative impact way beyond the realm of one country" and said he wanted to see them regulated by "an international agency looking at the most powerful systems and ensuring reasonable safety testing." Recommended video
    0 Commentarii 0 Distribuiri
  • OpenAI wants ChatGPT to be a ‘super assistant’ for every part of your life

    Thanks to the legal discovery process, Google’s antitrust trial with the Department of Justice has provided a fascinating glimpse into the future of ChatGPT.An internal OpenAI strategy document titled “ChatGPT: H1 2025 Strategy” describes the company’s aspiration to build an “AI super assistant that deeply understands you and is your interface to the internet.” Although the document is heavily redacted in parts, it reveals that OpenAI aims for ChatGPT to soon develop into much more than a chatbot. “In the first half of next year, we’ll start evolving ChatGPT into a super-assistant: one that knows you, understands what you care about, and helps with any task that a smart, trustworthy, emotionally intelligent person with a computer could do,” reads the document from late 2024. “The timing is right. Models like 02 and 03 are finally smart enough to reliably perform agentic tasks, tools like computer use can boost ChatGPT’s ability to take action, and interaction paradigms like multimodality and generative UI allow both ChatGPT and users to express themselves in the best way for the task.”The document goes on to describe a “super assistant” as “an intelligent entity with T-shaped skills” for both widely applicable and niche tasks. “The broad part is all about making life easier: answering a question, finding a home, contacting a lawyer, joining a gym, planning vacations, buying gifts, managing calendars, keeping track of todos, sending emails.” It mentions coding as an early example of a more niche task.Even when reading around the redactions, it’s clear that OpenAI sees hardware as essential to its future, and that it wants people to think of ChatGPT as not just a tool, but a companion. This tracks with Sam Altman recently saying that young people are using ChatGPT like a “ life advisor.”“Today, ChatGPT is in our lives through existing form factors — our website, phone, and desktop apps,” another part of the strategy document reads. “But our vision for ChatGPT is to help you with all of your life, no matter where you are. At home, it should help answer questions, play music, and suggest recipes. On the go, it should help you get to places, find the best restaurants, or catch up with friends. At work, it should help you take meeting notes, or prepare for the big presentation. And on solo walks, it should help you reflect and wind down.” At the same time, OpenAI finds itself in a wobbly position. Its infrastructure isn’t able to handle ChatGPT’s rising usage, which explains Altman’s focus on building data centers. In a section of the document describing AI chatbot competition, the company writes that “we are leading here, but we can’t rest,” and that “growth and revenue won’t line up forever.” It acknowledges that there are “powerful incumbents who will leverage their distribution to advantage their own products,” and states that OpenAI will advocate for regulation that requires other platforms to allow people to set ChatGPT as the default assistant.“We have what we need to win: one of the fastest-growing products of all time, a category-defining brand, a research lead, a compute lead, a world-class research team, and an increasing number of effective people with agency who are motivated to ship,” the OpenAI document states. “We don’t rely on ads, giving us flexibility on what to build. Our culture values speed, bold moves, and self-disruption. Maintaining these advantages is hard work but, if we do, they will last for a while.”ElsewhereApple chickens out: For the first time in a decade, Apple won’t have its execs participate in John Gruber’s annual post-WWDC live podcast. Gruber recently wrote the viral “something is rotten in the state of Cupertino” essay, which was widely discussed in Apple circles. Although he hasn’t publicly connected that critical piece to the company backing out of his podcast, it’s easy to see the throughline. It says a lot about the state of Apple when its leaders don’t even want to participate in what has historically been a friendly forum.Elon was high: As Elon Musk attempts to reframe the public’s view of him by doing interviews about SpaceX, The New York Times reports that last year, he was taking so much ketamine that it “was affecting his bladder.” He also reportedly “traveled with a daily medication box that held about 20 pills, including ones with the markings of the stimulant Adderall.” Both Musk and the White House have had multiple opportunities to directly refute this report, and they have not. Now, Musk is at least partially stepping away from DOGE along with key lieutenants like Steve Davis. DOGE may be a failure based on Musk’s own stated hopes for spending cuts, but his closeness to Trump has certainly helped rescue X from financial ruin and grown SpaceX’s business. Now, the more difficult work begins: saving Tesla. Overheard“The way we do ranking is sacrosanct to us.” - Google CEO Sundar Pichai on Decoder, explaining why the company’s search results won’t be changed for President Trump or anyone else. “Compared to previous technology changes, I’m a little bit more worried about the labor impact… Yes, people will adapt, but they may not adapt fast enough.” - Anthropic CEO Dario Amodei on CNN raising the alarm about the technology he is developing. “Meta is a very different company than it was nine years ago when they fired me.” - Anduril founder Palmer Luckey telling Ashlee Vance why he is linking up with Mark Zuckerberg to make headsets for the military. Personnel logThe flattening of Meta’s AI organization has taken effect, with VP Ahmad Al-Dahle no longer overseeing the entire group. Now, he co-leads “AGI Foundations” with Amir Frenkel, VP of engineering, while Connor Hayes runs all AI products. All three men now report to Meta CPO Chris Cox, who has diplomatically framed the changes as a way to “give each org more ownership.”Xbox co-founder J Allard is leading a new ‘breakthrough’ devices group called ZeroOne. One of the devices will be smart home-related, according to job listings.C.J. Mahoney, a former Trump administration official, is being promoted to general counsel at Microsoft, which has also hired Lisa Monaco from the last Biden administration to lead global policy. Reed Hastings is joining the board of Anthropic “because I believe in their approach to AI development, and to help humanity progress.”Sebastian Barrios, previously SVP at Mercado Libre, is joining Roblox as SVP of engineering for several areas, including ads, game discovery, and the company’s virtual currency work.Fidji Simo’s replacement at Instacart will be chief business officer Chris Rogers, who will become the company’s next CEO on August 15th after she officially joins OpenAI.Link listMore to click on:If you haven’t already, don’t forget to subscribe to The Verge, which includes unlimited access to Command Line and all of our reporting.As always, I welcome your feedback, especially if you have thoughts on this issue or a story idea to share. You can respond here or ping me securely on Signal.Thanks for subscribing.See More:
    #openai #wants #chatgpt #super #assistant
    OpenAI wants ChatGPT to be a ‘super assistant’ for every part of your life
    Thanks to the legal discovery process, Google’s antitrust trial with the Department of Justice has provided a fascinating glimpse into the future of ChatGPT.An internal OpenAI strategy document titled “ChatGPT: H1 2025 Strategy” describes the company’s aspiration to build an “AI super assistant that deeply understands you and is your interface to the internet.” Although the document is heavily redacted in parts, it reveals that OpenAI aims for ChatGPT to soon develop into much more than a chatbot. “In the first half of next year, we’ll start evolving ChatGPT into a super-assistant: one that knows you, understands what you care about, and helps with any task that a smart, trustworthy, emotionally intelligent person with a computer could do,” reads the document from late 2024. “The timing is right. Models like 02 and 03 are finally smart enough to reliably perform agentic tasks, tools like computer use can boost ChatGPT’s ability to take action, and interaction paradigms like multimodality and generative UI allow both ChatGPT and users to express themselves in the best way for the task.”The document goes on to describe a “super assistant” as “an intelligent entity with T-shaped skills” for both widely applicable and niche tasks. “The broad part is all about making life easier: answering a question, finding a home, contacting a lawyer, joining a gym, planning vacations, buying gifts, managing calendars, keeping track of todos, sending emails.” It mentions coding as an early example of a more niche task.Even when reading around the redactions, it’s clear that OpenAI sees hardware as essential to its future, and that it wants people to think of ChatGPT as not just a tool, but a companion. This tracks with Sam Altman recently saying that young people are using ChatGPT like a “ life advisor.”“Today, ChatGPT is in our lives through existing form factors — our website, phone, and desktop apps,” another part of the strategy document reads. “But our vision for ChatGPT is to help you with all of your life, no matter where you are. At home, it should help answer questions, play music, and suggest recipes. On the go, it should help you get to places, find the best restaurants, or catch up with friends. At work, it should help you take meeting notes, or prepare for the big presentation. And on solo walks, it should help you reflect and wind down.” At the same time, OpenAI finds itself in a wobbly position. Its infrastructure isn’t able to handle ChatGPT’s rising usage, which explains Altman’s focus on building data centers. In a section of the document describing AI chatbot competition, the company writes that “we are leading here, but we can’t rest,” and that “growth and revenue won’t line up forever.” It acknowledges that there are “powerful incumbents who will leverage their distribution to advantage their own products,” and states that OpenAI will advocate for regulation that requires other platforms to allow people to set ChatGPT as the default assistant.“We have what we need to win: one of the fastest-growing products of all time, a category-defining brand, a research lead, a compute lead, a world-class research team, and an increasing number of effective people with agency who are motivated to ship,” the OpenAI document states. “We don’t rely on ads, giving us flexibility on what to build. Our culture values speed, bold moves, and self-disruption. Maintaining these advantages is hard work but, if we do, they will last for a while.”ElsewhereApple chickens out: For the first time in a decade, Apple won’t have its execs participate in John Gruber’s annual post-WWDC live podcast. Gruber recently wrote the viral “something is rotten in the state of Cupertino” essay, which was widely discussed in Apple circles. Although he hasn’t publicly connected that critical piece to the company backing out of his podcast, it’s easy to see the throughline. It says a lot about the state of Apple when its leaders don’t even want to participate in what has historically been a friendly forum.Elon was high: As Elon Musk attempts to reframe the public’s view of him by doing interviews about SpaceX, The New York Times reports that last year, he was taking so much ketamine that it “was affecting his bladder.” He also reportedly “traveled with a daily medication box that held about 20 pills, including ones with the markings of the stimulant Adderall.” Both Musk and the White House have had multiple opportunities to directly refute this report, and they have not. Now, Musk is at least partially stepping away from DOGE along with key lieutenants like Steve Davis. DOGE may be a failure based on Musk’s own stated hopes for spending cuts, but his closeness to Trump has certainly helped rescue X from financial ruin and grown SpaceX’s business. Now, the more difficult work begins: saving Tesla. Overheard“The way we do ranking is sacrosanct to us.” - Google CEO Sundar Pichai on Decoder, explaining why the company’s search results won’t be changed for President Trump or anyone else. “Compared to previous technology changes, I’m a little bit more worried about the labor impact… Yes, people will adapt, but they may not adapt fast enough.” - Anthropic CEO Dario Amodei on CNN raising the alarm about the technology he is developing. “Meta is a very different company than it was nine years ago when they fired me.” - Anduril founder Palmer Luckey telling Ashlee Vance why he is linking up with Mark Zuckerberg to make headsets for the military. Personnel logThe flattening of Meta’s AI organization has taken effect, with VP Ahmad Al-Dahle no longer overseeing the entire group. Now, he co-leads “AGI Foundations” with Amir Frenkel, VP of engineering, while Connor Hayes runs all AI products. All three men now report to Meta CPO Chris Cox, who has diplomatically framed the changes as a way to “give each org more ownership.”Xbox co-founder J Allard is leading a new ‘breakthrough’ devices group called ZeroOne. One of the devices will be smart home-related, according to job listings.C.J. Mahoney, a former Trump administration official, is being promoted to general counsel at Microsoft, which has also hired Lisa Monaco from the last Biden administration to lead global policy. Reed Hastings is joining the board of Anthropic “because I believe in their approach to AI development, and to help humanity progress.”Sebastian Barrios, previously SVP at Mercado Libre, is joining Roblox as SVP of engineering for several areas, including ads, game discovery, and the company’s virtual currency work.Fidji Simo’s replacement at Instacart will be chief business officer Chris Rogers, who will become the company’s next CEO on August 15th after she officially joins OpenAI.Link listMore to click on:If you haven’t already, don’t forget to subscribe to The Verge, which includes unlimited access to Command Line and all of our reporting.As always, I welcome your feedback, especially if you have thoughts on this issue or a story idea to share. You can respond here or ping me securely on Signal.Thanks for subscribing.See More: #openai #wants #chatgpt #super #assistant
    WWW.THEVERGE.COM
    OpenAI wants ChatGPT to be a ‘super assistant’ for every part of your life
    Thanks to the legal discovery process, Google’s antitrust trial with the Department of Justice has provided a fascinating glimpse into the future of ChatGPT.An internal OpenAI strategy document titled “ChatGPT: H1 2025 Strategy” describes the company’s aspiration to build an “AI super assistant that deeply understands you and is your interface to the internet.” Although the document is heavily redacted in parts, it reveals that OpenAI aims for ChatGPT to soon develop into much more than a chatbot. “In the first half of next year, we’ll start evolving ChatGPT into a super-assistant: one that knows you, understands what you care about, and helps with any task that a smart, trustworthy, emotionally intelligent person with a computer could do,” reads the document from late 2024. “The timing is right. Models like 02 and 03 are finally smart enough to reliably perform agentic tasks, tools like computer use can boost ChatGPT’s ability to take action, and interaction paradigms like multimodality and generative UI allow both ChatGPT and users to express themselves in the best way for the task.”The document goes on to describe a “super assistant” as “an intelligent entity with T-shaped skills” for both widely applicable and niche tasks. “The broad part is all about making life easier: answering a question, finding a home, contacting a lawyer, joining a gym, planning vacations, buying gifts, managing calendars, keeping track of todos, sending emails.” It mentions coding as an early example of a more niche task.Even when reading around the redactions, it’s clear that OpenAI sees hardware as essential to its future, and that it wants people to think of ChatGPT as not just a tool, but a companion. This tracks with Sam Altman recently saying that young people are using ChatGPT like a “ life advisor.”“Today, ChatGPT is in our lives through existing form factors — our website, phone, and desktop apps,” another part of the strategy document reads. “But our vision for ChatGPT is to help you with all of your life, no matter where you are. At home, it should help answer questions, play music, and suggest recipes. On the go, it should help you get to places, find the best restaurants, or catch up with friends. At work, it should help you take meeting notes, or prepare for the big presentation. And on solo walks, it should help you reflect and wind down.” At the same time, OpenAI finds itself in a wobbly position. Its infrastructure isn’t able to handle ChatGPT’s rising usage, which explains Altman’s focus on building data centers. In a section of the document describing AI chatbot competition, the company writes that “we are leading here, but we can’t rest,” and that “growth and revenue won’t line up forever.” It acknowledges that there are “powerful incumbents who will leverage their distribution to advantage their own products,” and states that OpenAI will advocate for regulation that requires other platforms to allow people to set ChatGPT as the default assistant. (Coincidentally, Apple is rumored to soon let iOS users also select Google’s Gemini for Siri queries. Meta AI just hit one billion users as well, thanks mostly to its many hooks in Instagram, WhatsApp, and Facebook.) “We have what we need to win: one of the fastest-growing products of all time, a category-defining brand, a research lead (reasoning, multimodal), a compute lead, a world-class research team, and an increasing number of effective people with agency who are motivated to ship,” the OpenAI document states. “We don’t rely on ads, giving us flexibility on what to build. Our culture values speed, bold moves, and self-disruption. Maintaining these advantages is hard work but, if we do, they will last for a while.”ElsewhereApple chickens out: For the first time in a decade, Apple won’t have its execs participate in John Gruber’s annual post-WWDC live podcast. Gruber recently wrote the viral “something is rotten in the state of Cupertino” essay, which was widely discussed in Apple circles. Although he hasn’t publicly connected that critical piece to the company backing out of his podcast, it’s easy to see the throughline. It says a lot about the state of Apple when its leaders don’t even want to participate in what has historically been a friendly forum.Elon was high: As Elon Musk attempts to reframe the public’s view of him by doing interviews about SpaceX, The New York Times reports that last year, he was taking so much ketamine that it “was affecting his bladder.” He also reportedly “traveled with a daily medication box that held about 20 pills, including ones with the markings of the stimulant Adderall.” Both Musk and the White House have had multiple opportunities to directly refute this report, and they have not. Now, Musk is at least partially stepping away from DOGE along with key lieutenants like Steve Davis. DOGE may be a failure based on Musk’s own stated hopes for spending cuts, but his closeness to Trump has certainly helped rescue X from financial ruin and grown SpaceX’s business. Now, the more difficult work begins: saving Tesla. Overheard“The way we do ranking is sacrosanct to us.” - Google CEO Sundar Pichai on Decoder, explaining why the company’s search results won’t be changed for President Trump or anyone else. “Compared to previous technology changes, I’m a little bit more worried about the labor impact… Yes, people will adapt, but they may not adapt fast enough.” - Anthropic CEO Dario Amodei on CNN raising the alarm about the technology he is developing. “Meta is a very different company than it was nine years ago when they fired me.” - Anduril founder Palmer Luckey telling Ashlee Vance why he is linking up with Mark Zuckerberg to make headsets for the military. Personnel logThe flattening of Meta’s AI organization has taken effect, with VP Ahmad Al-Dahle no longer overseeing the entire group. Now, he co-leads “AGI Foundations” with Amir Frenkel, VP of engineering, while Connor Hayes runs all AI products. All three men now report to Meta CPO Chris Cox, who has diplomatically framed the changes as a way to “give each org more ownership.”Xbox co-founder J Allard is leading a new ‘breakthrough’ devices group at Amazon called ZeroOne. One of the devices will be smart home-related, according to job listings.C.J. Mahoney, a former Trump administration official, is being promoted to general counsel at Microsoft, which has also hired Lisa Monaco from the last Biden administration to lead global policy. Reed Hastings is joining the board of Anthropic “because I believe in their approach to AI development, and to help humanity progress.” (He’s joining Anthropic’s corporate board, not the supervising board of its public benefit trust that can hire and fire corporate directors.)Sebastian Barrios, previously SVP at Mercado Libre, is joining Roblox as SVP of engineering for several areas, including ads, game discovery, and the company’s virtual currency work.Fidji Simo’s replacement at Instacart will be chief business officer Chris Rogers, who will become the company’s next CEO on August 15th after she officially joins OpenAI.Link listMore to click on:If you haven’t already, don’t forget to subscribe to The Verge, which includes unlimited access to Command Line and all of our reporting.As always, I welcome your feedback, especially if you have thoughts on this issue or a story idea to share. You can respond here or ping me securely on Signal.Thanks for subscribing.See More:
    0 Commentarii 0 Distribuiri
  • On Designing National Pavilions: Power and Identity at Universal Exhibitions

    On Designing National Pavilions: Power and Identity at Universal ExhibitionsSave this picture!Czech Pavilion Expo 2025 Osaka / Apropos Architects Image © boysplayniceWhat can a pavilion’s architecture reveal about its country? At major World Expos, national pavilions are designed to answer this question, transforming into spaces laden with symbolism. Though temporary, these structures are rich in meaning, functioning as architectural expressions of political identity. Their forms and materials encapsulate national ambitions. Expo Osaka 2025, the latest chapter in this ongoing narrative, showcases how nations increasingly use built space to construct global images of themselves—sustainable, technological, culturally distinct, and geopolitically relevant.
    this picture!Over the decades, these pavilions have evolved into meticulously curated narratives where architecture, politics, and culture intersect to shape national identity. At Osaka 2025, this symbolic and diplomatic function becomes even more pronounced. Pavilions communicate not only who a nation is, but who it aspires to be. The environmental agenda, for example, has become a compelling vector of soft power. Japan’s pavilion exemplifies this shift, employing local wood, parametric design, and natural ventilation not just for function, but as metaphors of circularity and harmony with nature.this picture!Meanwhile, countries like Saudi Arabia and the United Arab Emirates are embracing immersive technologies—augmented reality, responsive facades, and AI—to reframe their narratives. No longer defined solely by oil economies, they seek to position themselves as innovation-driven futurescapes. In this context, national identity is staged like a multisensory installation. Materials, sounds, aromas, lighting, and spatial choreography become tools for storytelling—none of them neutral, all of them charged with intent. Related Article Are World's Fairs a Thing of the Past? The Role that Architecture Played on One of History's Biggest Stages Architecture as a Political StatementPavilions transcend cultural or technological display to become instruments of political messaging. Architectural choices convey nuanced—or at times overt—signals about values, ambitions, and worldviews. Denmark’s Expo 2020 Dubai pavilion, with open ramps and fluid circulation, subtly suggests democratic transparency and inclusion, while Russia’s monumental spiral structure evokes nationalism and technological command. Here, architecture becomes a codified discourse: every curve, void, and surface reads like a political sign.this picture!This language continues at Osaka 2025. Israel’s pavilion, inspired by the ecological resilience of deserts, presents a narrative of innovation and perseverance amid adversity—an architectural response to both climate challenges and regional geopolitics. Bahrain’s contribution, by Lina Ghotmeh Architecture, focuses on the adaptability of maritime cultures. South Korea’s high-tech, futuristic pavilion reinforces its position as a rising digital powerhouse.In some instances, however, absence speaks just as loudly. In previous editions, countries like North Korea and Syria have boycotted the Expo as a form of political protest. These silent gestures are part of the same strategic vocabulary, where presence, form, and even withdrawal shape the geopolitical stage set by architecture.this picture!Sustainability on DisplayAmid the global climate crisis, national pavilions have also become key arenas for environmental diplomacy. Sustainability—once a peripheral concern—is now central to the architectural narrative of Expos. It’s no longer only about meeting green standards, but about crafting a spatial language that embodies ecological responsibility. This shift also challenges the very notion of ephemerality: where temporariness once defined these structures, reuse, intelligent disassembly, and material reintegration now drive their conception.This ecological turn is particularly evident at Expo Osaka 2025. With the theme “Designing Future Society for Our Lives,” the event encourages models of regenerative, cooperative, and resilient living. Sweden’s and Germany’s pavilions are designed for a second life, to be repurposed as schools or community centers. The U.S. pavilion, designed by Trahan Architects, incorporates steel, fabric, and HVAC components repurposed from Tokyo 2020 Olympics structures—materials slated for further reuse across Japan. In this framework, the Expo becomes a laboratory of environmental geopolitics, where sustainability itself is a form of soft power.this picture!Technological Spectacle as a National StrategyIn contemporary Universal Exhibitions, technology is no longer displayed as an end in itself but has become a narrative and experiential medium. Immersive installations, sensory interfaces, and AI-driven storytelling transform pavilions into interactive ecosystems, where visitors are both spectators and agents. This shift signals a significant change: it is no longer just about showcasing innovation, but about embedding technology into the dramaturgy of space. Architecture, in this context, ceases to be a static backdrop and merges with experience design, dissolving the boundaries between the built and the digital. Moreover, the way each country orchestrates these elements reveals its ability to envision desirable futures—and to position itself as a protagonist in the global technological transformation.this picture!At Expo Osaka 2025, this race for technological affirmation takes clear shape in pavilions such as that of the United Arab Emirates, which offers an interactive journey through environments responsive to human presence, narrative artificial intelligence, and real-time sensors that react to visitors’ actions—demonstrating a sophisticated technical mastery with implications across multiple spheres. In a similar vein, the Uzbekistan Pavilion stands out with an exhibition focused on empowerment, highlighting the country’s openness to innovation and its commitment to preparing for the future.Yet this immersion presents a growing tension: how to balance technological spectacle with architectural integrity. In some cases, architecture risks being overshadowed by its digital overlay, losing spatial coherence. The most compelling pavilions are those that fuse form, function, and innovation into a seamless whole, where technology becomes not an add-on, but an intrinsic architectural language.this picture!Intercultural Collaborations: The True LegacyWhile Universal Exhibitions are organized around national representation, they have also emerged as vital platforms for cultural exchange. Increasingly, national pavilions are designed by multicultural teams, resulting in more nuanced, inclusive, and inventive expressions of identity, not as a fixed essence, but as something fluid and co-constructed.this picture!At Osaka 2025, this collaborative ethos is exemplified by pavilions such as Switzerland’s, designed by an international team, and Indonesia’s, which brings together local architects and foreign consultants. These collaborations offer more than design efficiency—they signal gestures of quiet diplomacy. In a climate of resurgent nationalism, such exchanges underscore that innovation thrives through openness and dialogue. Each pavilion becomes a space of mutual learning, expanding the very meaning of global belonging.this picture!Ultimately, the lasting value of Expos may not lie in reinforcing national brands, but in fostering encounters—shared spaces where ideas, technologies, and cultures converge to respond to urgent global challenges. As architect Manuel Herz, designer of the Swiss Pavilion, puts it: “In a moment of global tension, every possibility for us to physically meet in a shared space and celebrate something that can still be described as a cosmopolitan spirit needs to be valued and utilized.” Amid so many crises, pavilions remind us that architecture is more than shelter or style—it is a vessel for connection, a space for learning, and a rehearsal for futures we must build together.We invite you to check out ArchDaily's comprehensive coverage of the Expo Osaka 2025.

    Image gallerySee allShow less
    About this authorCamilla GhisleniAuthor•••
    Cite: Ghisleni, Camilla. "On Designing National Pavilions: Power and Identity at Universal Exhibitions"30 May 2025. ArchDaily.Accessed . < ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否
    You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    #designing #national #pavilions #power #identity
    On Designing National Pavilions: Power and Identity at Universal Exhibitions
    On Designing National Pavilions: Power and Identity at Universal ExhibitionsSave this picture!Czech Pavilion Expo 2025 Osaka / Apropos Architects Image © boysplayniceWhat can a pavilion’s architecture reveal about its country? At major World Expos, national pavilions are designed to answer this question, transforming into spaces laden with symbolism. Though temporary, these structures are rich in meaning, functioning as architectural expressions of political identity. Their forms and materials encapsulate national ambitions. Expo Osaka 2025, the latest chapter in this ongoing narrative, showcases how nations increasingly use built space to construct global images of themselves—sustainable, technological, culturally distinct, and geopolitically relevant. this picture!Over the decades, these pavilions have evolved into meticulously curated narratives where architecture, politics, and culture intersect to shape national identity. At Osaka 2025, this symbolic and diplomatic function becomes even more pronounced. Pavilions communicate not only who a nation is, but who it aspires to be. The environmental agenda, for example, has become a compelling vector of soft power. Japan’s pavilion exemplifies this shift, employing local wood, parametric design, and natural ventilation not just for function, but as metaphors of circularity and harmony with nature.this picture!Meanwhile, countries like Saudi Arabia and the United Arab Emirates are embracing immersive technologies—augmented reality, responsive facades, and AI—to reframe their narratives. No longer defined solely by oil economies, they seek to position themselves as innovation-driven futurescapes. In this context, national identity is staged like a multisensory installation. Materials, sounds, aromas, lighting, and spatial choreography become tools for storytelling—none of them neutral, all of them charged with intent. Related Article Are World's Fairs a Thing of the Past? The Role that Architecture Played on One of History's Biggest Stages Architecture as a Political StatementPavilions transcend cultural or technological display to become instruments of political messaging. Architectural choices convey nuanced—or at times overt—signals about values, ambitions, and worldviews. Denmark’s Expo 2020 Dubai pavilion, with open ramps and fluid circulation, subtly suggests democratic transparency and inclusion, while Russia’s monumental spiral structure evokes nationalism and technological command. Here, architecture becomes a codified discourse: every curve, void, and surface reads like a political sign.this picture!This language continues at Osaka 2025. Israel’s pavilion, inspired by the ecological resilience of deserts, presents a narrative of innovation and perseverance amid adversity—an architectural response to both climate challenges and regional geopolitics. Bahrain’s contribution, by Lina Ghotmeh Architecture, focuses on the adaptability of maritime cultures. South Korea’s high-tech, futuristic pavilion reinforces its position as a rising digital powerhouse.In some instances, however, absence speaks just as loudly. In previous editions, countries like North Korea and Syria have boycotted the Expo as a form of political protest. These silent gestures are part of the same strategic vocabulary, where presence, form, and even withdrawal shape the geopolitical stage set by architecture.this picture!Sustainability on DisplayAmid the global climate crisis, national pavilions have also become key arenas for environmental diplomacy. Sustainability—once a peripheral concern—is now central to the architectural narrative of Expos. It’s no longer only about meeting green standards, but about crafting a spatial language that embodies ecological responsibility. This shift also challenges the very notion of ephemerality: where temporariness once defined these structures, reuse, intelligent disassembly, and material reintegration now drive their conception.This ecological turn is particularly evident at Expo Osaka 2025. With the theme “Designing Future Society for Our Lives,” the event encourages models of regenerative, cooperative, and resilient living. Sweden’s and Germany’s pavilions are designed for a second life, to be repurposed as schools or community centers. The U.S. pavilion, designed by Trahan Architects, incorporates steel, fabric, and HVAC components repurposed from Tokyo 2020 Olympics structures—materials slated for further reuse across Japan. In this framework, the Expo becomes a laboratory of environmental geopolitics, where sustainability itself is a form of soft power.this picture!Technological Spectacle as a National StrategyIn contemporary Universal Exhibitions, technology is no longer displayed as an end in itself but has become a narrative and experiential medium. Immersive installations, sensory interfaces, and AI-driven storytelling transform pavilions into interactive ecosystems, where visitors are both spectators and agents. This shift signals a significant change: it is no longer just about showcasing innovation, but about embedding technology into the dramaturgy of space. Architecture, in this context, ceases to be a static backdrop and merges with experience design, dissolving the boundaries between the built and the digital. Moreover, the way each country orchestrates these elements reveals its ability to envision desirable futures—and to position itself as a protagonist in the global technological transformation.this picture!At Expo Osaka 2025, this race for technological affirmation takes clear shape in pavilions such as that of the United Arab Emirates, which offers an interactive journey through environments responsive to human presence, narrative artificial intelligence, and real-time sensors that react to visitors’ actions—demonstrating a sophisticated technical mastery with implications across multiple spheres. In a similar vein, the Uzbekistan Pavilion stands out with an exhibition focused on empowerment, highlighting the country’s openness to innovation and its commitment to preparing for the future.Yet this immersion presents a growing tension: how to balance technological spectacle with architectural integrity. In some cases, architecture risks being overshadowed by its digital overlay, losing spatial coherence. The most compelling pavilions are those that fuse form, function, and innovation into a seamless whole, where technology becomes not an add-on, but an intrinsic architectural language.this picture!Intercultural Collaborations: The True LegacyWhile Universal Exhibitions are organized around national representation, they have also emerged as vital platforms for cultural exchange. Increasingly, national pavilions are designed by multicultural teams, resulting in more nuanced, inclusive, and inventive expressions of identity, not as a fixed essence, but as something fluid and co-constructed.this picture!At Osaka 2025, this collaborative ethos is exemplified by pavilions such as Switzerland’s, designed by an international team, and Indonesia’s, which brings together local architects and foreign consultants. These collaborations offer more than design efficiency—they signal gestures of quiet diplomacy. In a climate of resurgent nationalism, such exchanges underscore that innovation thrives through openness and dialogue. Each pavilion becomes a space of mutual learning, expanding the very meaning of global belonging.this picture!Ultimately, the lasting value of Expos may not lie in reinforcing national brands, but in fostering encounters—shared spaces where ideas, technologies, and cultures converge to respond to urgent global challenges. As architect Manuel Herz, designer of the Swiss Pavilion, puts it: “In a moment of global tension, every possibility for us to physically meet in a shared space and celebrate something that can still be described as a cosmopolitan spirit needs to be valued and utilized.” Amid so many crises, pavilions remind us that architecture is more than shelter or style—it is a vessel for connection, a space for learning, and a rehearsal for futures we must build together.We invite you to check out ArchDaily's comprehensive coverage of the Expo Osaka 2025. Image gallerySee allShow less About this authorCamilla GhisleniAuthor••• Cite: Ghisleni, Camilla. "On Designing National Pavilions: Power and Identity at Universal Exhibitions"30 May 2025. ArchDaily.Accessed . < ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否 You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream #designing #national #pavilions #power #identity
    WWW.ARCHDAILY.COM
    On Designing National Pavilions: Power and Identity at Universal Exhibitions
    On Designing National Pavilions: Power and Identity at Universal ExhibitionsSave this picture!Czech Pavilion Expo 2025 Osaka / Apropos Architects Image © boysplayniceWhat can a pavilion’s architecture reveal about its country? At major World Expos, national pavilions are designed to answer this question, transforming into spaces laden with symbolism. Though temporary, these structures are rich in meaning, functioning as architectural expressions of political identity. Their forms and materials encapsulate national ambitions. Expo Osaka 2025, the latest chapter in this ongoing narrative, showcases how nations increasingly use built space to construct global images of themselves—sustainable, technological, culturally distinct, and geopolitically relevant. Save this picture!Over the decades, these pavilions have evolved into meticulously curated narratives where architecture, politics, and culture intersect to shape national identity. At Osaka 2025, this symbolic and diplomatic function becomes even more pronounced. Pavilions communicate not only who a nation is, but who it aspires to be. The environmental agenda, for example, has become a compelling vector of soft power. Japan’s pavilion exemplifies this shift, employing local wood, parametric design, and natural ventilation not just for function, but as metaphors of circularity and harmony with nature.Save this picture!Meanwhile, countries like Saudi Arabia and the United Arab Emirates are embracing immersive technologies—augmented reality, responsive facades, and AI—to reframe their narratives. No longer defined solely by oil economies, they seek to position themselves as innovation-driven futurescapes. In this context, national identity is staged like a multisensory installation. Materials, sounds, aromas, lighting, and spatial choreography become tools for storytelling—none of them neutral, all of them charged with intent. Related Article Are World's Fairs a Thing of the Past? The Role that Architecture Played on One of History's Biggest Stages Architecture as a Political StatementPavilions transcend cultural or technological display to become instruments of political messaging. Architectural choices convey nuanced—or at times overt—signals about values, ambitions, and worldviews. Denmark’s Expo 2020 Dubai pavilion, with open ramps and fluid circulation, subtly suggests democratic transparency and inclusion, while Russia’s monumental spiral structure evokes nationalism and technological command. Here, architecture becomes a codified discourse: every curve, void, and surface reads like a political sign.Save this picture!This language continues at Osaka 2025. Israel’s pavilion, inspired by the ecological resilience of deserts, presents a narrative of innovation and perseverance amid adversity—an architectural response to both climate challenges and regional geopolitics. Bahrain’s contribution, by Lina Ghotmeh Architecture, focuses on the adaptability of maritime cultures. South Korea’s high-tech, futuristic pavilion reinforces its position as a rising digital powerhouse.In some instances, however, absence speaks just as loudly. In previous editions, countries like North Korea and Syria have boycotted the Expo as a form of political protest. These silent gestures are part of the same strategic vocabulary, where presence, form, and even withdrawal shape the geopolitical stage set by architecture.Save this picture!Sustainability on DisplayAmid the global climate crisis, national pavilions have also become key arenas for environmental diplomacy. Sustainability—once a peripheral concern—is now central to the architectural narrative of Expos. It’s no longer only about meeting green standards, but about crafting a spatial language that embodies ecological responsibility. This shift also challenges the very notion of ephemerality: where temporariness once defined these structures, reuse, intelligent disassembly, and material reintegration now drive their conception.This ecological turn is particularly evident at Expo Osaka 2025. With the theme “Designing Future Society for Our Lives,” the event encourages models of regenerative, cooperative, and resilient living. Sweden’s and Germany’s pavilions are designed for a second life, to be repurposed as schools or community centers. The U.S. pavilion, designed by Trahan Architects, incorporates steel, fabric, and HVAC components repurposed from Tokyo 2020 Olympics structures—materials slated for further reuse across Japan. In this framework, the Expo becomes a laboratory of environmental geopolitics, where sustainability itself is a form of soft power.Save this picture!Technological Spectacle as a National StrategyIn contemporary Universal Exhibitions, technology is no longer displayed as an end in itself but has become a narrative and experiential medium. Immersive installations, sensory interfaces, and AI-driven storytelling transform pavilions into interactive ecosystems, where visitors are both spectators and agents. This shift signals a significant change: it is no longer just about showcasing innovation, but about embedding technology into the dramaturgy of space. Architecture, in this context, ceases to be a static backdrop and merges with experience design, dissolving the boundaries between the built and the digital. Moreover, the way each country orchestrates these elements reveals its ability to envision desirable futures—and to position itself as a protagonist in the global technological transformation.Save this picture!At Expo Osaka 2025, this race for technological affirmation takes clear shape in pavilions such as that of the United Arab Emirates, which offers an interactive journey through environments responsive to human presence, narrative artificial intelligence, and real-time sensors that react to visitors’ actions—demonstrating a sophisticated technical mastery with implications across multiple spheres. In a similar vein, the Uzbekistan Pavilion stands out with an exhibition focused on empowerment, highlighting the country’s openness to innovation and its commitment to preparing for the future.Yet this immersion presents a growing tension: how to balance technological spectacle with architectural integrity. In some cases, architecture risks being overshadowed by its digital overlay, losing spatial coherence. The most compelling pavilions are those that fuse form, function, and innovation into a seamless whole, where technology becomes not an add-on, but an intrinsic architectural language.Save this picture!Intercultural Collaborations: The True LegacyWhile Universal Exhibitions are organized around national representation, they have also emerged as vital platforms for cultural exchange. Increasingly, national pavilions are designed by multicultural teams, resulting in more nuanced, inclusive, and inventive expressions of identity, not as a fixed essence, but as something fluid and co-constructed.Save this picture!At Osaka 2025, this collaborative ethos is exemplified by pavilions such as Switzerland’s, designed by an international team, and Indonesia’s, which brings together local architects and foreign consultants. These collaborations offer more than design efficiency—they signal gestures of quiet diplomacy. In a climate of resurgent nationalism, such exchanges underscore that innovation thrives through openness and dialogue. Each pavilion becomes a space of mutual learning, expanding the very meaning of global belonging.Save this picture!Ultimately, the lasting value of Expos may not lie in reinforcing national brands, but in fostering encounters—shared spaces where ideas, technologies, and cultures converge to respond to urgent global challenges. As architect Manuel Herz, designer of the Swiss Pavilion, puts it: “In a moment of global tension, every possibility for us to physically meet in a shared space and celebrate something that can still be described as a cosmopolitan spirit needs to be valued and utilized.” Amid so many crises, pavilions remind us that architecture is more than shelter or style—it is a vessel for connection, a space for learning, and a rehearsal for futures we must build together.We invite you to check out ArchDaily's comprehensive coverage of the Expo Osaka 2025. Image gallerySee allShow less About this authorCamilla GhisleniAuthor••• Cite: Ghisleni, Camilla. "On Designing National Pavilions: Power and Identity at Universal Exhibitions" [Projetando Pavilhões Nacionais: Poder e Identidade nas Exposições Universais] 30 May 2025. ArchDaily. (Trans. Simões, Diogo) Accessed . <https://www.archdaily.com/1030539/on-designing-national-pavilions-power-and-identity-at-universal-exhibitions&gt ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否 You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    0 Commentarii 0 Distribuiri
  • US to block China’s access to essential semiconductor design software

    The US has ordered companies that make software used to design semiconductors to stop selling to China without first obtaining export licenses.

    The restrictions go beyond software alone, covering chemicals for semiconductors, butane and ethane, machine tools, and aviation equipment, Reuters reported, citing two people familiar with the development.

    “On May 23, the US Government informed the Electronic Design Automationindustry about new export controls on EDA software to China and Chinese military end users globally,” said a Siemens EDA spokesperson. “Siemens has supported customers in China for more than 150 years and will continue to work with our customers globally to mitigate the impact of these new restrictions while operating in compliance with applicable national export control regimes. The company continues to support our employees and customers around the world who are using our technology to transform the everyday.”

    This represents the latest chapter in a tech war that began with restrictions on selling actual semiconductors to China. Now, the US is targeting the tools needed to design those chips — a potentially more damaging approach.

    Strategic shift to upstream controls

    Electronic design automation software makers — including industry leaders Cadence, Synopsys, and Siemens EDA — were sent notifications by the Commerce Department last Friday to cease supplying their technology to Chinese customers, the report said. The department will review license requests on a case-by-case basis, it added.

    The financial implications are substantial. Synopsys and Cadence earn annual revenue of about 16% and 12% from their China business.

    “With Cadence and Synopsys being US-based companies and Siemens contributing to more than 90% share of the EDA tools globally, this move further tightens EDA software sales in China,” said Neil Shah, VP for research and partner at Counterpoint Research. “EDA tools cannot be substituted and are the foundation to chip design and manufacturing.”

    What makes this strategically different is its upstream focus. Manish Rawat, semiconductor analyst at TechInsights, explained that, unlike previous hardware restrictions, “the new focus on EDA software targets the critical tools essential for designing advanced chips. This upstream control aims to block innovation before chips are manufactured, making it a more preemptive and disruptive tactic.”

    Why now?

    The timing reflects broader strategic recalibration. Rawat noted that “the US has shifted its strategy, now seeing China’s push for tech self-sufficiency — especially in AI and semiconductors — as a growing national security threat.” Since the 2020 CHIPS Act, coordinated export controls with allies like Japan and the Netherlands have strengthened US resolve.

    Sanchit Vir Gogia, chief analyst and CEO at Greyhound Research, observed that targeting design-phase technologies “seeks to constrain the conceptual stage of advanced chip development — not merely production.”

    The timing may also serve as “a strategic bargaining tool amid paused tariffs and ongoing diplomacy,” Rawat suggested, signaling US willingness to escalate tech restrictions to strengthen its negotiating position.

    The EDA software packages from companies like Synopsys and Cadence are central to modeling, simulation, and verification of complex semiconductor architectures. “The software lifecycle of these tools is super important with updates, patches, and support to be at the forefront of leading edge, which will stop with the restrictions on licensing,” Shah pointed out.

    This ongoing dependency means even alternative tools would struggle to keep pace with rapidly evolving chip design requirements without continuous vendor support.

    China’s long road to independence

    For China, developing viable alternatives presents enormous challenges. While Chinese companies like Empyrean, Primarius, and Entasys have emerged as domestic providers, they remain far behind.

    “Developing advanced EDA software on par with Synopsys or Cadence is highly complex, requiring decades of R&D,” Rawat explained. “Fully closing the gap — especially for cutting-edge sub-7nm chip design — could take 5 to 10 years or more.”

    Gogia added that “while notable progress has been made in selected areas of analog and layout tooling, full-stack integration across simulation, IP compatibility, and foundry certification continues to lag.”

    The gap is widening. Shah noted that Cadence recently announced M2000 Supercomputers, integrating advanced AI into EDA workflows. “This widens the gap between what China can build with an indigenous toolchain, as these US companies are miles ahead.”

    However, China may have breathing room. “China has been relegated to access to advanced process nodes, so in the near to mid-term, they might not need an advanced toolchain as they won’t be able to design or manufacture advanced chips,” Shah observed.

    Beijing’s likely response

    China’s response will likely be multifaceted. “Beijing is likely to accelerate funding through increased subsidies and incentives for domestic EDA startups,” Rawat said. “It will also aggressively recruit global experts and repatriate Chinese talent with semiconductor software expertise.”

    Beyond domestic development, “China may build alternative chip design ecosystems less reliant on US intellectual property, though these will initially lag in sophistication,” Rawat added. Diplomatic measures may include reciprocal restrictions on US firms or supply chains involving Chinese technology.

    Toward a bifurcated design world

    The restrictions are accelerating what analysts see as an inevitable split. Gogia described emerging “parallel EDA stacks” where “global design ecosystems may begin to diverge, with export controls catalyzing separate compliance frameworks and IP governance models.”

    “This is accelerating a split into two spheres: a US-led system using Western tools and IP protections, and a China-led system focused on domestic tools and foundries,” Rawat added.

    This separation isn’t just technical — it’s institutional. “Engineering workflows, legal oversight, cloud infrastructure, and partner ecosystems are all being restructured to manage compliance in a fractured regulatory environment,” Gogia said.

    Global industry implications

    For multinational companies, this fragmentation creates significant challenges. “Multinational firms may need to adopt dual design workflows and navigate stricter compliance, affecting partnerships and operational efficiency,” Rawat said.

    Organizations face maintaining duplicate systems and complex compliance across jurisdictions. Smaller firms may find duplication costs force market exits or a narrowed geographic focus.

    To mitigate risks, companies “are likely to diversify supply chains and expand in neutral regions like India, Vietnam, and Singapore, emerging as new semiconductor design hubs,” Rawat pointed out.

    The EDA software restrictions represent the latest evolution in US-China tech competition, moving from end-product controls to fundamental design capabilities.

    “US continues to find stranglehold on China with critical software and hardware to cut off access to critical and advanced tools,” Shah said.

    For enterprise technology leaders, this signals an era where geopolitical considerations increasingly shape technology architecture decisions, requiring strategic planning for an increasingly fragmented world. Cadence and Synopsys did not respond to requests for comment by publication time.
    #block #chinas #access #essential #semiconductor
    US to block China’s access to essential semiconductor design software
    The US has ordered companies that make software used to design semiconductors to stop selling to China without first obtaining export licenses. The restrictions go beyond software alone, covering chemicals for semiconductors, butane and ethane, machine tools, and aviation equipment, Reuters reported, citing two people familiar with the development. “On May 23, the US Government informed the Electronic Design Automationindustry about new export controls on EDA software to China and Chinese military end users globally,” said a Siemens EDA spokesperson. “Siemens has supported customers in China for more than 150 years and will continue to work with our customers globally to mitigate the impact of these new restrictions while operating in compliance with applicable national export control regimes. The company continues to support our employees and customers around the world who are using our technology to transform the everyday.” This represents the latest chapter in a tech war that began with restrictions on selling actual semiconductors to China. Now, the US is targeting the tools needed to design those chips — a potentially more damaging approach. Strategic shift to upstream controls Electronic design automation software makers — including industry leaders Cadence, Synopsys, and Siemens EDA — were sent notifications by the Commerce Department last Friday to cease supplying their technology to Chinese customers, the report said. The department will review license requests on a case-by-case basis, it added. The financial implications are substantial. Synopsys and Cadence earn annual revenue of about 16% and 12% from their China business. “With Cadence and Synopsys being US-based companies and Siemens contributing to more than 90% share of the EDA tools globally, this move further tightens EDA software sales in China,” said Neil Shah, VP for research and partner at Counterpoint Research. “EDA tools cannot be substituted and are the foundation to chip design and manufacturing.” What makes this strategically different is its upstream focus. Manish Rawat, semiconductor analyst at TechInsights, explained that, unlike previous hardware restrictions, “the new focus on EDA software targets the critical tools essential for designing advanced chips. This upstream control aims to block innovation before chips are manufactured, making it a more preemptive and disruptive tactic.” Why now? The timing reflects broader strategic recalibration. Rawat noted that “the US has shifted its strategy, now seeing China’s push for tech self-sufficiency — especially in AI and semiconductors — as a growing national security threat.” Since the 2020 CHIPS Act, coordinated export controls with allies like Japan and the Netherlands have strengthened US resolve. Sanchit Vir Gogia, chief analyst and CEO at Greyhound Research, observed that targeting design-phase technologies “seeks to constrain the conceptual stage of advanced chip development — not merely production.” The timing may also serve as “a strategic bargaining tool amid paused tariffs and ongoing diplomacy,” Rawat suggested, signaling US willingness to escalate tech restrictions to strengthen its negotiating position. The EDA software packages from companies like Synopsys and Cadence are central to modeling, simulation, and verification of complex semiconductor architectures. “The software lifecycle of these tools is super important with updates, patches, and support to be at the forefront of leading edge, which will stop with the restrictions on licensing,” Shah pointed out. This ongoing dependency means even alternative tools would struggle to keep pace with rapidly evolving chip design requirements without continuous vendor support. China’s long road to independence For China, developing viable alternatives presents enormous challenges. While Chinese companies like Empyrean, Primarius, and Entasys have emerged as domestic providers, they remain far behind. “Developing advanced EDA software on par with Synopsys or Cadence is highly complex, requiring decades of R&D,” Rawat explained. “Fully closing the gap — especially for cutting-edge sub-7nm chip design — could take 5 to 10 years or more.” Gogia added that “while notable progress has been made in selected areas of analog and layout tooling, full-stack integration across simulation, IP compatibility, and foundry certification continues to lag.” The gap is widening. Shah noted that Cadence recently announced M2000 Supercomputers, integrating advanced AI into EDA workflows. “This widens the gap between what China can build with an indigenous toolchain, as these US companies are miles ahead.” However, China may have breathing room. “China has been relegated to access to advanced process nodes, so in the near to mid-term, they might not need an advanced toolchain as they won’t be able to design or manufacture advanced chips,” Shah observed. Beijing’s likely response China’s response will likely be multifaceted. “Beijing is likely to accelerate funding through increased subsidies and incentives for domestic EDA startups,” Rawat said. “It will also aggressively recruit global experts and repatriate Chinese talent with semiconductor software expertise.” Beyond domestic development, “China may build alternative chip design ecosystems less reliant on US intellectual property, though these will initially lag in sophistication,” Rawat added. Diplomatic measures may include reciprocal restrictions on US firms or supply chains involving Chinese technology. Toward a bifurcated design world The restrictions are accelerating what analysts see as an inevitable split. Gogia described emerging “parallel EDA stacks” where “global design ecosystems may begin to diverge, with export controls catalyzing separate compliance frameworks and IP governance models.” “This is accelerating a split into two spheres: a US-led system using Western tools and IP protections, and a China-led system focused on domestic tools and foundries,” Rawat added. This separation isn’t just technical — it’s institutional. “Engineering workflows, legal oversight, cloud infrastructure, and partner ecosystems are all being restructured to manage compliance in a fractured regulatory environment,” Gogia said. Global industry implications For multinational companies, this fragmentation creates significant challenges. “Multinational firms may need to adopt dual design workflows and navigate stricter compliance, affecting partnerships and operational efficiency,” Rawat said. Organizations face maintaining duplicate systems and complex compliance across jurisdictions. Smaller firms may find duplication costs force market exits or a narrowed geographic focus. To mitigate risks, companies “are likely to diversify supply chains and expand in neutral regions like India, Vietnam, and Singapore, emerging as new semiconductor design hubs,” Rawat pointed out. The EDA software restrictions represent the latest evolution in US-China tech competition, moving from end-product controls to fundamental design capabilities. “US continues to find stranglehold on China with critical software and hardware to cut off access to critical and advanced tools,” Shah said. For enterprise technology leaders, this signals an era where geopolitical considerations increasingly shape technology architecture decisions, requiring strategic planning for an increasingly fragmented world. Cadence and Synopsys did not respond to requests for comment by publication time. #block #chinas #access #essential #semiconductor
    WWW.COMPUTERWORLD.COM
    US to block China’s access to essential semiconductor design software
    The US has ordered companies that make software used to design semiconductors to stop selling to China without first obtaining export licenses. The restrictions go beyond software alone, covering chemicals for semiconductors, butane and ethane, machine tools, and aviation equipment, Reuters reported, citing two people familiar with the development. “On May 23, the US Government informed the Electronic Design Automation (EDA) industry about new export controls on EDA software to China and Chinese military end users globally,” said a Siemens EDA spokesperson. “Siemens has supported customers in China for more than 150 years and will continue to work with our customers globally to mitigate the impact of these new restrictions while operating in compliance with applicable national export control regimes. The company continues to support our employees and customers around the world who are using our technology to transform the everyday.” This represents the latest chapter in a tech war that began with restrictions on selling actual semiconductors to China. Now, the US is targeting the tools needed to design those chips — a potentially more damaging approach. Strategic shift to upstream controls Electronic design automation software makers — including industry leaders Cadence, Synopsys, and Siemens EDA — were sent notifications by the Commerce Department last Friday to cease supplying their technology to Chinese customers, the report said. The department will review license requests on a case-by-case basis, it added. The financial implications are substantial. Synopsys and Cadence earn annual revenue of about 16% and 12% from their China business. “With Cadence and Synopsys being US-based companies and Siemens contributing to more than 90% share of the EDA tools globally, this move further tightens EDA software sales in China,” said Neil Shah, VP for research and partner at Counterpoint Research. “EDA tools cannot be substituted and are the foundation to chip design and manufacturing.” What makes this strategically different is its upstream focus. Manish Rawat, semiconductor analyst at TechInsights, explained that, unlike previous hardware restrictions, “the new focus on EDA software targets the critical tools essential for designing advanced chips (5nm and below). This upstream control aims to block innovation before chips are manufactured, making it a more preemptive and disruptive tactic.” Why now? The timing reflects broader strategic recalibration. Rawat noted that “the US has shifted its strategy, now seeing China’s push for tech self-sufficiency — especially in AI and semiconductors — as a growing national security threat.” Since the 2020 CHIPS Act, coordinated export controls with allies like Japan and the Netherlands have strengthened US resolve. Sanchit Vir Gogia, chief analyst and CEO at Greyhound Research, observed that targeting design-phase technologies “seeks to constrain the conceptual stage of advanced chip development — not merely production.” The timing may also serve as “a strategic bargaining tool amid paused tariffs and ongoing diplomacy,” Rawat suggested, signaling US willingness to escalate tech restrictions to strengthen its negotiating position. The EDA software packages from companies like Synopsys and Cadence are central to modeling, simulation, and verification of complex semiconductor architectures. “The software lifecycle of these tools is super important with updates, patches, and support to be at the forefront of leading edge, which will stop with the restrictions on licensing,” Shah pointed out. This ongoing dependency means even alternative tools would struggle to keep pace with rapidly evolving chip design requirements without continuous vendor support. China’s long road to independence For China, developing viable alternatives presents enormous challenges. While Chinese companies like Empyrean, Primarius, and Entasys have emerged as domestic providers, they remain far behind. “Developing advanced EDA software on par with Synopsys or Cadence is highly complex, requiring decades of R&D,” Rawat explained. “Fully closing the gap — especially for cutting-edge sub-7nm chip design — could take 5 to 10 years or more.” Gogia added that “while notable progress has been made in selected areas of analog and layout tooling, full-stack integration across simulation, IP compatibility, and foundry certification continues to lag.” The gap is widening. Shah noted that Cadence recently announced M2000 Supercomputers, integrating advanced AI into EDA workflows. “This widens the gap between what China can build with an indigenous toolchain, as these US companies are miles ahead.” However, China may have breathing room. “China has been relegated to access to advanced process nodes, so in the near to mid-term, they might not need an advanced toolchain as they won’t be able to design or manufacture advanced chips,” Shah observed. Beijing’s likely response China’s response will likely be multifaceted. “Beijing is likely to accelerate funding through increased subsidies and incentives for domestic EDA startups,” Rawat said. “It will also aggressively recruit global experts and repatriate Chinese talent with semiconductor software expertise.” Beyond domestic development, “China may build alternative chip design ecosystems less reliant on US intellectual property, though these will initially lag in sophistication,” Rawat added. Diplomatic measures may include reciprocal restrictions on US firms or supply chains involving Chinese technology. Toward a bifurcated design world The restrictions are accelerating what analysts see as an inevitable split. Gogia described emerging “parallel EDA stacks” where “global design ecosystems may begin to diverge, with export controls catalyzing separate compliance frameworks and IP governance models.” “This is accelerating a split into two spheres: a US-led system using Western tools and IP protections, and a China-led system focused on domestic tools and foundries,” Rawat added. This separation isn’t just technical — it’s institutional. “Engineering workflows, legal oversight, cloud infrastructure, and partner ecosystems are all being restructured to manage compliance in a fractured regulatory environment,” Gogia said. Global industry implications For multinational companies, this fragmentation creates significant challenges. “Multinational firms may need to adopt dual design workflows and navigate stricter compliance, affecting partnerships and operational efficiency,” Rawat said. Organizations face maintaining duplicate systems and complex compliance across jurisdictions. Smaller firms may find duplication costs force market exits or a narrowed geographic focus. To mitigate risks, companies “are likely to diversify supply chains and expand in neutral regions like India, Vietnam, and Singapore, emerging as new semiconductor design hubs,” Rawat pointed out. The EDA software restrictions represent the latest evolution in US-China tech competition, moving from end-product controls to fundamental design capabilities. “US continues to find stranglehold on China with critical software and hardware to cut off access to critical and advanced tools,” Shah said. For enterprise technology leaders, this signals an era where geopolitical considerations increasingly shape technology architecture decisions, requiring strategic planning for an increasingly fragmented world. Cadence and Synopsys did not respond to requests for comment by publication time.
    10 Commentarii 0 Distribuiri
  • Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs

    Cyber threats don't show up one at a time anymore. They're layered, planned, and often stay hidden until it's too late.
    For cybersecurity teams, the key isn't just reacting to alerts—it's spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With today's complex systems, we need focused analysis—not noise.
    What you'll see here isn't just a list of incidents, but a clear look at where control is being gained, lost, or quietly tested.
    Threat of the Week
    Lumma Stealer, DanaBot Operations Disrupted — A coalition of private sector companies and law enforcement agencies have taken down the infrastructure associated with Lumma Stealer and DanaBot. Charges have also been unsealed against 16 individuals for their alleged involvement in the development and deployment of DanaBot. The malware is equipped to siphon data from victim computers, hijack banking sessions, and steal device information. More uniquely, though, DanaBot has also been used for hacking campaigns that appear to be linked to Russian state-sponsored interests. All of that makes DanaBot a particularly clear example of how commodity malware has been repurposed by Russian state hackers for their own goals. In tandem, about 2,300 domains that acted as the command-and-controlbackbone for the Lumma information stealer have been seized, alongside taking down 300 servers and neutralizing 650 domains that were used to launch ransomware attacks. The actions against international cybercrime in the past few days constituted the latest phase of Operation Endgame.

    Get the Guide ➝

    Top News

    Threat Actors Use TikTok Videos to Distribute Stealers — While ClickFix has become a popular social engineering tactic to deliver malware, threat actors have been observed using artificial intelligence-generated videos uploaded to TikTok to deceive users into running malicious commands on their systems and deploy malware like Vidar and StealC under the guise of activating pirated version of Windows, Microsoft Office, CapCut, and Spotify. "This campaign highlights how attackers are ready to weaponize whichever social media platforms are currently popular to distribute malware," Trend Micro said.
    APT28 Hackers Target Western Logistics and Tech Firms — Several cybersecurity and intelligence agencies from Australia, Europe, and the United States issued a joint alert warning of a state-sponsored campaign orchestrated by the Russian state-sponsored threat actor APT28 targeting Western logistics entities and technology companies since 2022. "This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors' wide scale targeting of IP cameras in Ukraine and bordering NATO nations," the agencies said. The attacks are designed to steal sensitive information and maintain long-term persistence on compromised hosts.
    Chinese Threat Actors Exploit Ivanti EPMM Flaws — The China-nexus cyber espionage group tracked as UNC5221 has been attributed to the exploitation of a pair of security flaws affecting Ivanti Endpoint Manager Mobilesoftwareto target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The intrusions leverage the vulnerabilities to obtain a reverse shell and drop malicious payloads like KrustyLoader, which is known to deliver the Sliver command-and-controlframework. "UNC5221 demonstrates a deep understanding of EPMM's internal architecture, repurposing legitimate system components for covert data exfiltration," EclecticIQ said. "Given EPMM's role in managing and pushing configurations to enterprise mobile devices, a successful exploitation could allow threat actors to remotely access, manipulate, or compromise thousands of managed devices across an organization."
    Over 100 Google Chrome Extensions Mimic Popular Tools — An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities such as DeepSeek, Manus, DeBank, FortiVPN, and Site Stats but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. Links to these browser add-ons are hosted on specially crafted sites to which users are likely redirected to via phishing and social media posts. While the extensions appear to offer the advertised features, they also stealthily facilitate credential and cookie theft, session hijacking, ad injection, malicious redirects, traffic manipulation, and phishing via DOM manipulation. Several of these extensions have been taken down by Google.
    CISA Warns of SaaS Providers of Attacks Targeting Cloud Environments — The U.S. Cybersecurity and Infrastructure Security Agencywarned that SaaS companies are under threat from bad actors who are on the prowl for cloud applications with default configurations and elevated permissions. While the agency did not attribute the activity to a specific group, the advisory said enterprise backup platform Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. "Threat actors may have accessed client secrets for Commvault'sMicrosoft 365backup software-as-a-servicesolution, hosted in Azure," CISA said. "This provided the threat actors with unauthorized access to Commvault's customers' M365 environments that have application secrets stored by Commvault."
    GitLab AI Coding Assistant Flaws Could Be Used to Inject Malicious Code — Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligenceassistant Duo that could have allowed attackers to steal source code and inject untrusted HTML into its responses, which could then be used to direct victims to malicious websites. The attack could also leak confidential issue data, such as zero-day vulnerability details. All that's required is for the attacker to instruct the chatbot to interact with a merge requestby taking advantage of the fact that GitLab Duo has extensive access to the platform. "By embedding hidden instructions in seemingly harmless project content, we were able to manipulate Duo's behavior, exfiltrate private source code, and demonstrate how AI responses can be leveraged for unintended and harmful outcomes," Legit Security said. One variation of the attack involved hiding a malicious instruction in an otherwise legitimate piece of source code, while another exploited Duo's parsing of markdown responses in real-time asynchronously. An attacker could leverage this behavior – that Duo begins rendering the output line by line rather than waiting until the entire response is generated and sending it all at once – to introduce malicious HTML code that can access sensitive data and exfiltrate the information to a remote server. The issues have been patched by GitLab following responsible disclosure.

    ‎️‍ Trending CVEs
    Software vulnerabilities remain one of the simplest—and most effective—entry points for attackers. Each week uncovers new flaws, and even small delays in patching can escalate into serious security incidents. Staying ahead means acting fast. Below is this week's list of high-risk vulnerabilities that demand attention. Review them carefully, apply updates without delay, and close the doors before they're forced open.
    This week's list includes — CVE-2025-34025, CVE-2025-34026, CVE-2025-34027, CVE-2025-30911, CVE-2024-57273, CVE-2024-54780, and CVE-2024-54779, CVE-2025-41229, CVE-2025-4322, CVE-2025-47934, CVE-2025-30193, CVE-2025-0993, CVE-2025-36535, CVE-2025-47949, CVE-2025-40775, CVE-2025-20152, CVE-2025-4123, CVE-2025-5063, CVE-2025-37899, CVE-2025-26817, CVE-2025-47947, CVE-2025-3078, CVE-2025-3079, and CVE-2025-4978.
    Around the Cyber World

    Sandworm Drops New Wiper in Ukraine — The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named ZEROLOT. "The infamous Sandworm group concentrated heavily on compromising Ukrainian energy infrastructure. In recent cases, it deployed the ZEROLOT wiper in Ukraine. For this, the attackers abused Active Directory Group Policy in the affected organizations," ESET Director of Threat Research, Jean-Ian Boutin, said. Another Russian hacking group, Gamaredon, remained the most prolific actor targeting the East European nation, enhancing malware obfuscation and introducing PteroBox, a file stealer leveraging Dropbox.
    Signal Says No to Recall — Signal has released a new version of its messaging app for Windows that, by default, blocks the ability of Windows to use Recall to periodically take screenshots of the app. "Although Microsoft made several adjustments over the past twelve months in response to critical feedback, the revamped version of Recall still places any content that's displayed within privacy-preserving apps like Signal at risk," Signal said. "As a result, we are enabling an extra layer of protection by default on Windows 11 in order to help maintain the security of Signal Desktop on that platform even though it introduces some usability trade-offs. Microsoft has simply given us no other option." Microsoft began officially rolling out Recall last month.
    Russia Introduces New Law to Track Foreigners Using Their Smartphones — The Russian government has introduced a new law that makes installing a tracking app mandatory for all foreign nationals in the Moscow region. This includes gathering their real-time locations, fingerprint, face photograph, and residential information. "The adopted mechanism will allow, using modern technologies, to strengthen control in the field of migration and will also contribute to reducing the number of violations and crimes in this area," Vyacheslav Volodin, chairman of the State Duma, said. "If migrants change their actual place of residence, they will be required to inform the Ministry of Internal Affairswithin three working days." A proposed four-year trial period begins on September 1, 2025, and runs until September 1, 2029.
    Dutch Government Passes Law to Criminalize Cyber Espionage — The Dutch government has approved a law criminalizing a wide range of espionage activities, including digital espionage, in an effort to protect national security, critical infrastructure, and high-quality technologies. Under the amended law, leaking sensitive information that is not classified as a state secret or engaging in activities on behalf of a foreign government that harm Dutch interests can also result in criminal charges. "Foreign governments are also interested in non-state-secret, sensitive information about a particular economic sector or about political decision-making," the government said. "Such information can be used to influence political processes, weaken the Dutch economy or play allies against each other. Espionage can also involve actions other than sharing information."
    Microsoft Announces Availability of Quantum-Resistant Algorithms to SymCrypt — Microsoft has revealed that it's making post-quantum cryptographycapabilities, including ML-KEM and ML-DSA, available for Windows Insiders, Canary Channel Build 27852 and higher, and Linux, SymCrypt-OpenSSL version 1.9.0. "This advancement will enable customers to commence their exploration and experimentation of PQC within their operational environments," Microsoft said. "By obtaining early access to PQC capabilities, organizations can proactively assess the compatibility, performance, and integration of these novel algorithms alongside their existing security infrastructure."
    New Malware DOUBLELOADER Uses ALCATRAZ for Obfuscation — The open-source obfuscator ALCATRAZ has been seen within a new generic loader dubbed DOUBLELOADER, which has been deployed alongside Rhadamanthys Stealer infections starting December 2024. The malware collects host information, requests an updated version of itself, and starts beaconing to a hardcoded IP addressstored within the binary. "Obfuscators such as ALCATRAZ end up increasing the complexity when triaging malware," Elastic Security Labs said. "Its main goal is to hinder binary analysis tools and increase the time of the reverse engineering process through different techniques; such as hiding the control flow or making decompilation hard to follow."
    New Formjacking Campaign Targets WooCommerce Sites — Cybersecurity researchers have detected a sophisticated formjacking campaign targeting WooCommerce sites. The malware, per Wordfence, injects a fake but professional-looking payment form into legitimate checkout processes and exfiltrates sensitive customer data to an external server. Further analysis has revealed that the infection likely originated from a compromised WordPress admin account, which was used to inject malicious JavaScript via a Simple Custom CSS and JS pluginthat allows administrators to add custom code. "Unlike traditional card skimmers that simply overlay existing forms, this variant carefully integrates with the WooCommerce site's design and payment workflow, making it particularly difficult for site owners and users to detect," the WordPress security company said. "The malware author repurposed the browser's localStorage mechanism – typically used by websites to remember user preferences – to silently store stolen data and maintain access even after page reloads or when navigating away from the checkout page."

    E.U. Sanctions Stark Industries — The European Unionhas announced sanctions against 21 individuals and six entities in Russia over its "destabilising actions" in the region. One of the sanctioned entities is Stark Industries, a bulletproof hosting provider that has been accused of acting as "enablers of various Russian state-sponsored and affiliated actors to conduct destabilising activities including, information manipulation interference and cyber attacks against the Union and third countries." The sanctions also target its CEO Iurie Neculiti and owner Ivan Neculiti. Stark Industries was previously spotlighted by independent cybersecurity journalist Brian Krebs, detailing its use in DDoS attacks in Ukraine and across Europe. In August 2024, Team Cymru said it discovered 25 Stark-assigned IP addresses used to host domains associated with FIN7 activities and that it had been working with Stark Industries for several months to identify and reduce abuse of their systems. The sanctions have also targeted Kremlin-backed manufacturers of drones and radio communication equipment used by the Russian military, as well as those involved in GPS signal jamming in Baltic states and disrupting civil aviation.
    The Mask APT Unmasked as Tied to the Spanish Government — The mysterious threat actor known as The Maskhas been identified as run by the Spanish government, according to a report published by TechCrunch, citing people who worked at Kaspersky at the time and had knowledge of the investigation. The Russian cybersecurity company first exposed the hacking group in 2014, linking it to highly sophisticated attacks since at least 2007 targeting high-profile organizations, such as governments, diplomatic entities, and research institutions. A majority of the group's attacks have targeted Cuba, followed by hundreds of victims in Brazil, Morocco, Spain, and Gibraltar. While Kaspersky has not publicly attributed it to a specific country, the latest revelation makes The Mask one of the few Western government hacking groups that has ever been discussed in public. This includes the Equation Group, the Lamberts, and Animal Farm.
    Social Engineering Scams Target Coinbase Users — Earlier this month, cryptocurrency exchange Coinbase revealed that it was the victim of a malicious attack perpetrated by unknown threat actors to breach its systems by bribing customer support agents in India and siphon funds from nearly 70,000 customers. According to Blockchain security firm SlowMist, Coinbase users have been the target of social engineering scams since the start of the year, bombarding with SMS messages claiming to be fake withdrawal requests and seeking their confirmation as part of a "sustained and organized scam campaign." The goal is to induce a false sense of urgency and trick them into calling a number, eventually convincing them to transfer the funds to a secure wallet with a seed phrase pre-generated by the attackers and ultimately drain the assets. It's assessed that the activities are primarily carried out by two groups: low-level skid attackers from the Com community and organized cybercrime groups based in India. "Using spoofed PBX phone systems, scammers impersonate Coinbase support and claim there's been 'unauthorized access' or 'suspicious withdrawals' on the user's account," SlowMist said. "They create a sense of urgency, then follow up with phishing emails or texts containing fake ticket numbers or 'recovery links.'"
    Delta Can Sue CrowdStrike Over July 2024 Mega Outage — Delta Air Lines, which had its systems crippled and almost 7,000 flights canceled in the wake of a massive outage caused by a faulty update issued by CrowdStrike in mid-July 2024, has been given the green light to pursue to its lawsuit against the cybersecurity company. A judge in the U.S. state of Georgia stating Delta can try to prove that CrowdStrike was grossly negligent by pushing a defective update to its Falcon software to customers. The update crashed 8.5 million Windows devices across the world. Crowdstrike previously claimed that the airline had rejected technical support offers both from itself and Microsoft. In a statement shared with Reuters, lawyers representing CrowdStrike said they were "confident the judge will find Delta's case has no merit, or will limit damages to the 'single-digit millions of dollars' under Georgia law." The development comes months after MGM Resorts International agreed to pay million to settle multiple class-action lawsuits related to a data breach in 2019 and a ransomware attack the company experienced in 2023.
    Storm-1516 Uses AI-Generated Media to Spread Disinformation — The Russian influence operation known as Storm-1516sought to spread narratives that undermined the European support for Ukraine by amplifying fabricated stories on X about European leaders using drugs while traveling by train to Kyiv for peace talks. One of the posts was subsequently shared by Russian state media and Maria Zakharova, a senior official in Russia's foreign ministry, as part of what has been described as a coordinated disinformation campaign by EclecticIQ. The activity is also notable for the use of synthetic content depicting French President Emmanuel Macron, U.K. Labour Party leader Keir Starmer, and German chancellor Friedrich Merz of drug possession during their return from Ukraine. "By attacking the reputation of these leaders, the campaign likely aimed to turn their own voters against them, using influence operationsto reduce public support for Ukraine by discrediting the politicians who back it," the Dutch threat intelligence firm said.
    Turkish Users Targeted by DBatLoader — AhnLab has disclosed details of a malware campaign that's distributing a malware loader called DBatLoadervia banking-themed banking emails, which then acts as a conduit to deliver SnakeKeylogger, an information stealer developed in .NET. "The DBatLoader malware distributed through phishing emails has the cunning behavior of exploiting normal processesthrough techniques such as DLL side-loading and injection for most of its behaviors, and it also utilizes normal processesfor behaviors such as file copying and changing policies," the company said.
    SEC SIM-Swapper Sentenced to 14 Months for SEC X Account Hack — A 26-year-old Alabama man, Eric Council Jr., has been sentenced to 14 months in prison and three years of supervised release for using SIM swapping attacks to breach the U.S. Securities and Exchange Commission'sofficial X account in January 2024 and falsely announced that the SEC approved BitcoinExchange Traded Funds. Council Jr.was arrested in October 2024 and pleaded guilty to the crime earlier this February. He has also been ordered to forfeit According to court documents, Council used his personal computer to search incriminating phrases such as "SECGOV hack," "telegram sim swap," "how can I know for sure if I am being investigated by the FBI," "What are the signs that you are under investigation by law enforcement or the FBI even if you have not been contacted by them," "what are some signs that the FBI is after you," "Verizon store list," "federal identity theft statute," and "how long does it take to delete telegram account."
    FBI Warns of Malicious Campaign Impersonating Government Officials — The U.S. Federal Bureau of Investigationis warning of a new campaign that involves malicious actors impersonating senior U.S. federal or state government officials and their contacts to target individuals since April 2025. "The malicious actors have sent text messages and AI-generated voice messages — techniques known as smishing and vishing, respectively — that claim to come from a senior US official in an effort to establish rapport before gaining access to personal accounts," the FBI said. "One way the actors gain such access is by sending targeted individuals a malicious link under the guise of transitioning to a separate messaging platform." From there, the actor may present malware or introduce hyperlinks that lead intended targets to an actor-controlled site that steals login information.
    DICOM Flaw Enables Attackers to Embed Malicious Code Within Medical Image Files — Praetorian has released a proof-of-conceptfor a high-severity security flaw in Digital Imaging and Communications in Medicine, predominant file format for medical images, that enables attackers to embed malicious code within legitimate medical image files. CVE-2019-11687, originally disclosed in 2019 by Markel Picado Ortiz, stems from a design decision that allows arbitrary content at the start of the file, otherwise called the Preamble, which enables the creation of malicious polyglots. Codenamed ELFDICOM, the PoC extends the attack surface to Linux environments, making it a much more potent threat. As mitigations, it's advised to implement a DICOM preamble whitelist. "DICOM's file structure inherently allows arbitrary bytes at the beginning of the file, where Linux and most operating systems will look for magic bytes," Praetorian researcher Ryan Hennessee said. "would check a DICOM file's preamble before it is imported into the system. This would allow known good patterns, such as 'TIFF' magic bytes, or '\x00' null bytes, while files with the ELF magic bytes would be blocked."
    Cookie-Bite Attack Uses Chrome Extension to Steal Session Tokens — Cybersecurity researchers have demonstrated a new attack technique called Cookie-Bite that employs custom-made malicious browser extensions to steal "ESTAUTH" and "ESTSAUTHPERSISTNT" cookies in Microsoft Azure Entra ID and bypass multi-factor authentication. The attack has multiple moving parts to it: A custom Chrome extension that monitors authentication events and captures cookies; a PowerShell script that automates the extension deployment and ensures persistence; an exfiltration mechanism to send the cookies to a remote collection point; and a complementary extension to inject the captured cookies into the attacker's browser. "Threat actors often use infostealers to extract authentication tokens directly from a victim's machine or buy them directly through darkness markets, allowing adversaries to hijack active cloud sessions without triggering MFA," Varonis said. "By injecting these cookies while mimicking the victim's OS, browser, and network, attackers can evade Conditional Access Policiesand maintain persistent access." Authentication cookies can also be stolen using adversary-in-the-middlephishing kits in real-time, or using rogue browser extensions that request excessive permissions to interact with web sessions, modify page content, and extract stored authentication data. Once installed, the extension can access the browser's storage API, intercept network requests, or inject malicious JavaScript into active sessions to harvest real-time session cookies. "By leveraging stolen session cookies, an adversary can bypass authentication mechanisms, gaining seamless entry into cloud environments without requiring user credentials," Varonis said. "Beyond initial access, session hijacking can facilitate lateral movement across the tenant, allowing attackers to explore additional resources, access sensitive data, and escalate privileges by abusing existing permissions or misconfigured roles."

    Cybersecurity Webinars

    Non-Human Identities: The AI Backdoor You're Not Watching → AI agents rely on Non-Human Identitiesto function—but these are often left untracked and unsecured. As attackers shift focus to this hidden layer, the risk is growing fast. In this session, you'll learn how to find, secure, and monitor these identities before they're exploited. Join the webinar to understand the real risks behind AI adoption—and how to stay ahead.
    Inside the LOTS Playbook: How Hackers Stay Undetected → Attackers are using trusted sites to stay hidden. In this webinar, Zscaler experts share how they detect these stealthy LOTS attacks using insights from the world's largest security cloud. Join to learn how to spot hidden threats and improve your defense.

    Cybersecurity Tools

    ScriptSentry → It is a free tool that scans your environment for dangerous logon script misconfigurations—like plaintext credentials, insecure file/share permissions, and references to non-existent servers. These overlooked issues can enable lateral movement, privilege escalation, or even credential theft. ScriptSentry helps you quickly identify and fix them across large Active Directory environments.
    Aftermath → It is a Swift-based, open-source tool for macOS incident response. It collects forensic data—like logs, browser activity, and process info—from compromised systems, then analyzes it to build timelines and track infection paths. Deploy via MDM or run manually. Fast, lightweight, and ideal for post-incident investigation.
    AI Red Teaming Playground Labs → It is an open-source training suite with hands-on challenges designed to teach security professionals how to red team AI systems. Originally developed for Black Hat USA 2024, the labs cover prompt injections, safety bypasses, indirect attacks, and Responsible AI failures. Built on Chat Copilot and deployable via Docker, it's a practical resource for testing and understanding real-world AI vulnerabilities.

    Tip of the Week
    Review and Revoke Old OAuth App Permissions — They're Silent Backdoor → You've likely logged into apps using "Continue with Google," "Sign in with Microsoft," or GitHub/Twitter/Facebook logins. That's OAuth. But did you know many of those apps still have access to your data long after you stop using them?
    Why it matters:
    Even if you delete the app or forget it existed, it might still have ongoing access to your calendar, email, cloud files, or contact list — no password needed. If that third-party gets breached, your data is at risk.
    What to do:

    Go through your connected apps here:
    Google: myaccount.google.com/permissions
    Microsoft: account.live.com/consent/Manage
    GitHub: github.com/settings/applications
    Facebook: facebook.com/settings?tab=applications

    Revoke anything you don't actively use. It's a fast, silent cleanup — and it closes doors you didn't know were open.
    Conclusion
    Looking ahead, it's not just about tracking threats—it's about understanding what they reveal. Every tactic used, every system tested, points to deeper issues in how trust, access, and visibility are managed. As attackers adapt quickly, defenders need sharper awareness and faster response loops.
    The takeaways from this week aren't just technical—they speak to how teams prioritize risk, design safeguards, and make choices under pressure. Use these insights not just to react, but to rethink what "secure" really needs to mean in today's environment.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    #weekly #recap #apt #campaigns #browser
    ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
    Cyber threats don't show up one at a time anymore. They're layered, planned, and often stay hidden until it's too late. For cybersecurity teams, the key isn't just reacting to alerts—it's spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With today's complex systems, we need focused analysis—not noise. What you'll see here isn't just a list of incidents, but a clear look at where control is being gained, lost, or quietly tested. ⚡ Threat of the Week Lumma Stealer, DanaBot Operations Disrupted — A coalition of private sector companies and law enforcement agencies have taken down the infrastructure associated with Lumma Stealer and DanaBot. Charges have also been unsealed against 16 individuals for their alleged involvement in the development and deployment of DanaBot. The malware is equipped to siphon data from victim computers, hijack banking sessions, and steal device information. More uniquely, though, DanaBot has also been used for hacking campaigns that appear to be linked to Russian state-sponsored interests. All of that makes DanaBot a particularly clear example of how commodity malware has been repurposed by Russian state hackers for their own goals. In tandem, about 2,300 domains that acted as the command-and-controlbackbone for the Lumma information stealer have been seized, alongside taking down 300 servers and neutralizing 650 domains that were used to launch ransomware attacks. The actions against international cybercrime in the past few days constituted the latest phase of Operation Endgame. Get the Guide ➝ 🔔 Top News Threat Actors Use TikTok Videos to Distribute Stealers — While ClickFix has become a popular social engineering tactic to deliver malware, threat actors have been observed using artificial intelligence-generated videos uploaded to TikTok to deceive users into running malicious commands on their systems and deploy malware like Vidar and StealC under the guise of activating pirated version of Windows, Microsoft Office, CapCut, and Spotify. "This campaign highlights how attackers are ready to weaponize whichever social media platforms are currently popular to distribute malware," Trend Micro said. APT28 Hackers Target Western Logistics and Tech Firms — Several cybersecurity and intelligence agencies from Australia, Europe, and the United States issued a joint alert warning of a state-sponsored campaign orchestrated by the Russian state-sponsored threat actor APT28 targeting Western logistics entities and technology companies since 2022. "This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors' wide scale targeting of IP cameras in Ukraine and bordering NATO nations," the agencies said. The attacks are designed to steal sensitive information and maintain long-term persistence on compromised hosts. Chinese Threat Actors Exploit Ivanti EPMM Flaws — The China-nexus cyber espionage group tracked as UNC5221 has been attributed to the exploitation of a pair of security flaws affecting Ivanti Endpoint Manager Mobilesoftwareto target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The intrusions leverage the vulnerabilities to obtain a reverse shell and drop malicious payloads like KrustyLoader, which is known to deliver the Sliver command-and-controlframework. "UNC5221 demonstrates a deep understanding of EPMM's internal architecture, repurposing legitimate system components for covert data exfiltration," EclecticIQ said. "Given EPMM's role in managing and pushing configurations to enterprise mobile devices, a successful exploitation could allow threat actors to remotely access, manipulate, or compromise thousands of managed devices across an organization." Over 100 Google Chrome Extensions Mimic Popular Tools — An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities such as DeepSeek, Manus, DeBank, FortiVPN, and Site Stats but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. Links to these browser add-ons are hosted on specially crafted sites to which users are likely redirected to via phishing and social media posts. While the extensions appear to offer the advertised features, they also stealthily facilitate credential and cookie theft, session hijacking, ad injection, malicious redirects, traffic manipulation, and phishing via DOM manipulation. Several of these extensions have been taken down by Google. CISA Warns of SaaS Providers of Attacks Targeting Cloud Environments — The U.S. Cybersecurity and Infrastructure Security Agencywarned that SaaS companies are under threat from bad actors who are on the prowl for cloud applications with default configurations and elevated permissions. While the agency did not attribute the activity to a specific group, the advisory said enterprise backup platform Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. "Threat actors may have accessed client secrets for Commvault'sMicrosoft 365backup software-as-a-servicesolution, hosted in Azure," CISA said. "This provided the threat actors with unauthorized access to Commvault's customers' M365 environments that have application secrets stored by Commvault." GitLab AI Coding Assistant Flaws Could Be Used to Inject Malicious Code — Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligenceassistant Duo that could have allowed attackers to steal source code and inject untrusted HTML into its responses, which could then be used to direct victims to malicious websites. The attack could also leak confidential issue data, such as zero-day vulnerability details. All that's required is for the attacker to instruct the chatbot to interact with a merge requestby taking advantage of the fact that GitLab Duo has extensive access to the platform. "By embedding hidden instructions in seemingly harmless project content, we were able to manipulate Duo's behavior, exfiltrate private source code, and demonstrate how AI responses can be leveraged for unintended and harmful outcomes," Legit Security said. One variation of the attack involved hiding a malicious instruction in an otherwise legitimate piece of source code, while another exploited Duo's parsing of markdown responses in real-time asynchronously. An attacker could leverage this behavior – that Duo begins rendering the output line by line rather than waiting until the entire response is generated and sending it all at once – to introduce malicious HTML code that can access sensitive data and exfiltrate the information to a remote server. The issues have been patched by GitLab following responsible disclosure. ‎️‍🔥 Trending CVEs Software vulnerabilities remain one of the simplest—and most effective—entry points for attackers. Each week uncovers new flaws, and even small delays in patching can escalate into serious security incidents. Staying ahead means acting fast. Below is this week's list of high-risk vulnerabilities that demand attention. Review them carefully, apply updates without delay, and close the doors before they're forced open. This week's list includes — CVE-2025-34025, CVE-2025-34026, CVE-2025-34027, CVE-2025-30911, CVE-2024-57273, CVE-2024-54780, and CVE-2024-54779, CVE-2025-41229, CVE-2025-4322, CVE-2025-47934, CVE-2025-30193, CVE-2025-0993, CVE-2025-36535, CVE-2025-47949, CVE-2025-40775, CVE-2025-20152, CVE-2025-4123, CVE-2025-5063, CVE-2025-37899, CVE-2025-26817, CVE-2025-47947, CVE-2025-3078, CVE-2025-3079, and CVE-2025-4978. 📰 Around the Cyber World Sandworm Drops New Wiper in Ukraine — The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named ZEROLOT. "The infamous Sandworm group concentrated heavily on compromising Ukrainian energy infrastructure. In recent cases, it deployed the ZEROLOT wiper in Ukraine. For this, the attackers abused Active Directory Group Policy in the affected organizations," ESET Director of Threat Research, Jean-Ian Boutin, said. Another Russian hacking group, Gamaredon, remained the most prolific actor targeting the East European nation, enhancing malware obfuscation and introducing PteroBox, a file stealer leveraging Dropbox. Signal Says No to Recall — Signal has released a new version of its messaging app for Windows that, by default, blocks the ability of Windows to use Recall to periodically take screenshots of the app. "Although Microsoft made several adjustments over the past twelve months in response to critical feedback, the revamped version of Recall still places any content that's displayed within privacy-preserving apps like Signal at risk," Signal said. "As a result, we are enabling an extra layer of protection by default on Windows 11 in order to help maintain the security of Signal Desktop on that platform even though it introduces some usability trade-offs. Microsoft has simply given us no other option." Microsoft began officially rolling out Recall last month. Russia Introduces New Law to Track Foreigners Using Their Smartphones — The Russian government has introduced a new law that makes installing a tracking app mandatory for all foreign nationals in the Moscow region. This includes gathering their real-time locations, fingerprint, face photograph, and residential information. "The adopted mechanism will allow, using modern technologies, to strengthen control in the field of migration and will also contribute to reducing the number of violations and crimes in this area," Vyacheslav Volodin, chairman of the State Duma, said. "If migrants change their actual place of residence, they will be required to inform the Ministry of Internal Affairswithin three working days." A proposed four-year trial period begins on September 1, 2025, and runs until September 1, 2029. Dutch Government Passes Law to Criminalize Cyber Espionage — The Dutch government has approved a law criminalizing a wide range of espionage activities, including digital espionage, in an effort to protect national security, critical infrastructure, and high-quality technologies. Under the amended law, leaking sensitive information that is not classified as a state secret or engaging in activities on behalf of a foreign government that harm Dutch interests can also result in criminal charges. "Foreign governments are also interested in non-state-secret, sensitive information about a particular economic sector or about political decision-making," the government said. "Such information can be used to influence political processes, weaken the Dutch economy or play allies against each other. Espionage can also involve actions other than sharing information." Microsoft Announces Availability of Quantum-Resistant Algorithms to SymCrypt — Microsoft has revealed that it's making post-quantum cryptographycapabilities, including ML-KEM and ML-DSA, available for Windows Insiders, Canary Channel Build 27852 and higher, and Linux, SymCrypt-OpenSSL version 1.9.0. "This advancement will enable customers to commence their exploration and experimentation of PQC within their operational environments," Microsoft said. "By obtaining early access to PQC capabilities, organizations can proactively assess the compatibility, performance, and integration of these novel algorithms alongside their existing security infrastructure." New Malware DOUBLELOADER Uses ALCATRAZ for Obfuscation — The open-source obfuscator ALCATRAZ has been seen within a new generic loader dubbed DOUBLELOADER, which has been deployed alongside Rhadamanthys Stealer infections starting December 2024. The malware collects host information, requests an updated version of itself, and starts beaconing to a hardcoded IP addressstored within the binary. "Obfuscators such as ALCATRAZ end up increasing the complexity when triaging malware," Elastic Security Labs said. "Its main goal is to hinder binary analysis tools and increase the time of the reverse engineering process through different techniques; such as hiding the control flow or making decompilation hard to follow." New Formjacking Campaign Targets WooCommerce Sites — Cybersecurity researchers have detected a sophisticated formjacking campaign targeting WooCommerce sites. The malware, per Wordfence, injects a fake but professional-looking payment form into legitimate checkout processes and exfiltrates sensitive customer data to an external server. Further analysis has revealed that the infection likely originated from a compromised WordPress admin account, which was used to inject malicious JavaScript via a Simple Custom CSS and JS pluginthat allows administrators to add custom code. "Unlike traditional card skimmers that simply overlay existing forms, this variant carefully integrates with the WooCommerce site's design and payment workflow, making it particularly difficult for site owners and users to detect," the WordPress security company said. "The malware author repurposed the browser's localStorage mechanism – typically used by websites to remember user preferences – to silently store stolen data and maintain access even after page reloads or when navigating away from the checkout page." E.U. Sanctions Stark Industries — The European Unionhas announced sanctions against 21 individuals and six entities in Russia over its "destabilising actions" in the region. One of the sanctioned entities is Stark Industries, a bulletproof hosting provider that has been accused of acting as "enablers of various Russian state-sponsored and affiliated actors to conduct destabilising activities including, information manipulation interference and cyber attacks against the Union and third countries." The sanctions also target its CEO Iurie Neculiti and owner Ivan Neculiti. Stark Industries was previously spotlighted by independent cybersecurity journalist Brian Krebs, detailing its use in DDoS attacks in Ukraine and across Europe. In August 2024, Team Cymru said it discovered 25 Stark-assigned IP addresses used to host domains associated with FIN7 activities and that it had been working with Stark Industries for several months to identify and reduce abuse of their systems. The sanctions have also targeted Kremlin-backed manufacturers of drones and radio communication equipment used by the Russian military, as well as those involved in GPS signal jamming in Baltic states and disrupting civil aviation. The Mask APT Unmasked as Tied to the Spanish Government — The mysterious threat actor known as The Maskhas been identified as run by the Spanish government, according to a report published by TechCrunch, citing people who worked at Kaspersky at the time and had knowledge of the investigation. The Russian cybersecurity company first exposed the hacking group in 2014, linking it to highly sophisticated attacks since at least 2007 targeting high-profile organizations, such as governments, diplomatic entities, and research institutions. A majority of the group's attacks have targeted Cuba, followed by hundreds of victims in Brazil, Morocco, Spain, and Gibraltar. While Kaspersky has not publicly attributed it to a specific country, the latest revelation makes The Mask one of the few Western government hacking groups that has ever been discussed in public. This includes the Equation Group, the Lamberts, and Animal Farm. Social Engineering Scams Target Coinbase Users — Earlier this month, cryptocurrency exchange Coinbase revealed that it was the victim of a malicious attack perpetrated by unknown threat actors to breach its systems by bribing customer support agents in India and siphon funds from nearly 70,000 customers. According to Blockchain security firm SlowMist, Coinbase users have been the target of social engineering scams since the start of the year, bombarding with SMS messages claiming to be fake withdrawal requests and seeking their confirmation as part of a "sustained and organized scam campaign." The goal is to induce a false sense of urgency and trick them into calling a number, eventually convincing them to transfer the funds to a secure wallet with a seed phrase pre-generated by the attackers and ultimately drain the assets. It's assessed that the activities are primarily carried out by two groups: low-level skid attackers from the Com community and organized cybercrime groups based in India. "Using spoofed PBX phone systems, scammers impersonate Coinbase support and claim there's been 'unauthorized access' or 'suspicious withdrawals' on the user's account," SlowMist said. "They create a sense of urgency, then follow up with phishing emails or texts containing fake ticket numbers or 'recovery links.'" Delta Can Sue CrowdStrike Over July 2024 Mega Outage — Delta Air Lines, which had its systems crippled and almost 7,000 flights canceled in the wake of a massive outage caused by a faulty update issued by CrowdStrike in mid-July 2024, has been given the green light to pursue to its lawsuit against the cybersecurity company. A judge in the U.S. state of Georgia stating Delta can try to prove that CrowdStrike was grossly negligent by pushing a defective update to its Falcon software to customers. The update crashed 8.5 million Windows devices across the world. Crowdstrike previously claimed that the airline had rejected technical support offers both from itself and Microsoft. In a statement shared with Reuters, lawyers representing CrowdStrike said they were "confident the judge will find Delta's case has no merit, or will limit damages to the 'single-digit millions of dollars' under Georgia law." The development comes months after MGM Resorts International agreed to pay million to settle multiple class-action lawsuits related to a data breach in 2019 and a ransomware attack the company experienced in 2023. Storm-1516 Uses AI-Generated Media to Spread Disinformation — The Russian influence operation known as Storm-1516sought to spread narratives that undermined the European support for Ukraine by amplifying fabricated stories on X about European leaders using drugs while traveling by train to Kyiv for peace talks. One of the posts was subsequently shared by Russian state media and Maria Zakharova, a senior official in Russia's foreign ministry, as part of what has been described as a coordinated disinformation campaign by EclecticIQ. The activity is also notable for the use of synthetic content depicting French President Emmanuel Macron, U.K. Labour Party leader Keir Starmer, and German chancellor Friedrich Merz of drug possession during their return from Ukraine. "By attacking the reputation of these leaders, the campaign likely aimed to turn their own voters against them, using influence operationsto reduce public support for Ukraine by discrediting the politicians who back it," the Dutch threat intelligence firm said. Turkish Users Targeted by DBatLoader — AhnLab has disclosed details of a malware campaign that's distributing a malware loader called DBatLoadervia banking-themed banking emails, which then acts as a conduit to deliver SnakeKeylogger, an information stealer developed in .NET. "The DBatLoader malware distributed through phishing emails has the cunning behavior of exploiting normal processesthrough techniques such as DLL side-loading and injection for most of its behaviors, and it also utilizes normal processesfor behaviors such as file copying and changing policies," the company said. SEC SIM-Swapper Sentenced to 14 Months for SEC X Account Hack — A 26-year-old Alabama man, Eric Council Jr., has been sentenced to 14 months in prison and three years of supervised release for using SIM swapping attacks to breach the U.S. Securities and Exchange Commission'sofficial X account in January 2024 and falsely announced that the SEC approved BitcoinExchange Traded Funds. Council Jr.was arrested in October 2024 and pleaded guilty to the crime earlier this February. He has also been ordered to forfeit According to court documents, Council used his personal computer to search incriminating phrases such as "SECGOV hack," "telegram sim swap," "how can I know for sure if I am being investigated by the FBI," "What are the signs that you are under investigation by law enforcement or the FBI even if you have not been contacted by them," "what are some signs that the FBI is after you," "Verizon store list," "federal identity theft statute," and "how long does it take to delete telegram account." FBI Warns of Malicious Campaign Impersonating Government Officials — The U.S. Federal Bureau of Investigationis warning of a new campaign that involves malicious actors impersonating senior U.S. federal or state government officials and their contacts to target individuals since April 2025. "The malicious actors have sent text messages and AI-generated voice messages — techniques known as smishing and vishing, respectively — that claim to come from a senior US official in an effort to establish rapport before gaining access to personal accounts," the FBI said. "One way the actors gain such access is by sending targeted individuals a malicious link under the guise of transitioning to a separate messaging platform." From there, the actor may present malware or introduce hyperlinks that lead intended targets to an actor-controlled site that steals login information. DICOM Flaw Enables Attackers to Embed Malicious Code Within Medical Image Files — Praetorian has released a proof-of-conceptfor a high-severity security flaw in Digital Imaging and Communications in Medicine, predominant file format for medical images, that enables attackers to embed malicious code within legitimate medical image files. CVE-2019-11687, originally disclosed in 2019 by Markel Picado Ortiz, stems from a design decision that allows arbitrary content at the start of the file, otherwise called the Preamble, which enables the creation of malicious polyglots. Codenamed ELFDICOM, the PoC extends the attack surface to Linux environments, making it a much more potent threat. As mitigations, it's advised to implement a DICOM preamble whitelist. "DICOM's file structure inherently allows arbitrary bytes at the beginning of the file, where Linux and most operating systems will look for magic bytes," Praetorian researcher Ryan Hennessee said. "would check a DICOM file's preamble before it is imported into the system. This would allow known good patterns, such as 'TIFF' magic bytes, or '\x00' null bytes, while files with the ELF magic bytes would be blocked." Cookie-Bite Attack Uses Chrome Extension to Steal Session Tokens — Cybersecurity researchers have demonstrated a new attack technique called Cookie-Bite that employs custom-made malicious browser extensions to steal "ESTAUTH" and "ESTSAUTHPERSISTNT" cookies in Microsoft Azure Entra ID and bypass multi-factor authentication. The attack has multiple moving parts to it: A custom Chrome extension that monitors authentication events and captures cookies; a PowerShell script that automates the extension deployment and ensures persistence; an exfiltration mechanism to send the cookies to a remote collection point; and a complementary extension to inject the captured cookies into the attacker's browser. "Threat actors often use infostealers to extract authentication tokens directly from a victim's machine or buy them directly through darkness markets, allowing adversaries to hijack active cloud sessions without triggering MFA," Varonis said. "By injecting these cookies while mimicking the victim's OS, browser, and network, attackers can evade Conditional Access Policiesand maintain persistent access." Authentication cookies can also be stolen using adversary-in-the-middlephishing kits in real-time, or using rogue browser extensions that request excessive permissions to interact with web sessions, modify page content, and extract stored authentication data. Once installed, the extension can access the browser's storage API, intercept network requests, or inject malicious JavaScript into active sessions to harvest real-time session cookies. "By leveraging stolen session cookies, an adversary can bypass authentication mechanisms, gaining seamless entry into cloud environments without requiring user credentials," Varonis said. "Beyond initial access, session hijacking can facilitate lateral movement across the tenant, allowing attackers to explore additional resources, access sensitive data, and escalate privileges by abusing existing permissions or misconfigured roles." 🎥 Cybersecurity Webinars Non-Human Identities: The AI Backdoor You're Not Watching → AI agents rely on Non-Human Identitiesto function—but these are often left untracked and unsecured. As attackers shift focus to this hidden layer, the risk is growing fast. In this session, you'll learn how to find, secure, and monitor these identities before they're exploited. Join the webinar to understand the real risks behind AI adoption—and how to stay ahead. Inside the LOTS Playbook: How Hackers Stay Undetected → Attackers are using trusted sites to stay hidden. In this webinar, Zscaler experts share how they detect these stealthy LOTS attacks using insights from the world's largest security cloud. Join to learn how to spot hidden threats and improve your defense. 🔧 Cybersecurity Tools ScriptSentry → It is a free tool that scans your environment for dangerous logon script misconfigurations—like plaintext credentials, insecure file/share permissions, and references to non-existent servers. These overlooked issues can enable lateral movement, privilege escalation, or even credential theft. ScriptSentry helps you quickly identify and fix them across large Active Directory environments. Aftermath → It is a Swift-based, open-source tool for macOS incident response. It collects forensic data—like logs, browser activity, and process info—from compromised systems, then analyzes it to build timelines and track infection paths. Deploy via MDM or run manually. Fast, lightweight, and ideal for post-incident investigation. AI Red Teaming Playground Labs → It is an open-source training suite with hands-on challenges designed to teach security professionals how to red team AI systems. Originally developed for Black Hat USA 2024, the labs cover prompt injections, safety bypasses, indirect attacks, and Responsible AI failures. Built on Chat Copilot and deployable via Docker, it's a practical resource for testing and understanding real-world AI vulnerabilities. 🔒 Tip of the Week Review and Revoke Old OAuth App Permissions — They're Silent Backdoor → You've likely logged into apps using "Continue with Google," "Sign in with Microsoft," or GitHub/Twitter/Facebook logins. That's OAuth. But did you know many of those apps still have access to your data long after you stop using them? Why it matters: Even if you delete the app or forget it existed, it might still have ongoing access to your calendar, email, cloud files, or contact list — no password needed. If that third-party gets breached, your data is at risk. What to do: Go through your connected apps here: Google: myaccount.google.com/permissions Microsoft: account.live.com/consent/Manage GitHub: github.com/settings/applications Facebook: facebook.com/settings?tab=applications Revoke anything you don't actively use. It's a fast, silent cleanup — and it closes doors you didn't know were open. Conclusion Looking ahead, it's not just about tracking threats—it's about understanding what they reveal. Every tactic used, every system tested, points to deeper issues in how trust, access, and visibility are managed. As attackers adapt quickly, defenders need sharper awareness and faster response loops. The takeaways from this week aren't just technical—they speak to how teams prioritize risk, design safeguards, and make choices under pressure. Use these insights not just to react, but to rethink what "secure" really needs to mean in today's environment. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. #weekly #recap #apt #campaigns #browser
    THEHACKERNEWS.COM
    ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
    Cyber threats don't show up one at a time anymore. They're layered, planned, and often stay hidden until it's too late. For cybersecurity teams, the key isn't just reacting to alerts—it's spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With today's complex systems, we need focused analysis—not noise. What you'll see here isn't just a list of incidents, but a clear look at where control is being gained, lost, or quietly tested. ⚡ Threat of the Week Lumma Stealer, DanaBot Operations Disrupted — A coalition of private sector companies and law enforcement agencies have taken down the infrastructure associated with Lumma Stealer and DanaBot. Charges have also been unsealed against 16 individuals for their alleged involvement in the development and deployment of DanaBot. The malware is equipped to siphon data from victim computers, hijack banking sessions, and steal device information. More uniquely, though, DanaBot has also been used for hacking campaigns that appear to be linked to Russian state-sponsored interests. All of that makes DanaBot a particularly clear example of how commodity malware has been repurposed by Russian state hackers for their own goals. In tandem, about 2,300 domains that acted as the command-and-control (C2) backbone for the Lumma information stealer have been seized, alongside taking down 300 servers and neutralizing 650 domains that were used to launch ransomware attacks. The actions against international cybercrime in the past few days constituted the latest phase of Operation Endgame. Get the Guide ➝ 🔔 Top News Threat Actors Use TikTok Videos to Distribute Stealers — While ClickFix has become a popular social engineering tactic to deliver malware, threat actors have been observed using artificial intelligence (AI)-generated videos uploaded to TikTok to deceive users into running malicious commands on their systems and deploy malware like Vidar and StealC under the guise of activating pirated version of Windows, Microsoft Office, CapCut, and Spotify. "This campaign highlights how attackers are ready to weaponize whichever social media platforms are currently popular to distribute malware," Trend Micro said. APT28 Hackers Target Western Logistics and Tech Firms — Several cybersecurity and intelligence agencies from Australia, Europe, and the United States issued a joint alert warning of a state-sponsored campaign orchestrated by the Russian state-sponsored threat actor APT28 targeting Western logistics entities and technology companies since 2022. "This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors' wide scale targeting of IP cameras in Ukraine and bordering NATO nations," the agencies said. The attacks are designed to steal sensitive information and maintain long-term persistence on compromised hosts. Chinese Threat Actors Exploit Ivanti EPMM Flaws — The China-nexus cyber espionage group tracked as UNC5221 has been attributed to the exploitation of a pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software (CVE-2025-4427 and CVE-2025-4428) to target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The intrusions leverage the vulnerabilities to obtain a reverse shell and drop malicious payloads like KrustyLoader, which is known to deliver the Sliver command-and-control (C2) framework. "UNC5221 demonstrates a deep understanding of EPMM's internal architecture, repurposing legitimate system components for covert data exfiltration," EclecticIQ said. "Given EPMM's role in managing and pushing configurations to enterprise mobile devices, a successful exploitation could allow threat actors to remotely access, manipulate, or compromise thousands of managed devices across an organization." Over 100 Google Chrome Extensions Mimic Popular Tools — An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities such as DeepSeek, Manus, DeBank, FortiVPN, and Site Stats but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code. Links to these browser add-ons are hosted on specially crafted sites to which users are likely redirected to via phishing and social media posts. While the extensions appear to offer the advertised features, they also stealthily facilitate credential and cookie theft, session hijacking, ad injection, malicious redirects, traffic manipulation, and phishing via DOM manipulation. Several of these extensions have been taken down by Google. CISA Warns of SaaS Providers of Attacks Targeting Cloud Environments — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that SaaS companies are under threat from bad actors who are on the prowl for cloud applications with default configurations and elevated permissions. While the agency did not attribute the activity to a specific group, the advisory said enterprise backup platform Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. "Threat actors may have accessed client secrets for Commvault's (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure," CISA said. "This provided the threat actors with unauthorized access to Commvault's customers' M365 environments that have application secrets stored by Commvault." GitLab AI Coding Assistant Flaws Could Be Used to Inject Malicious Code — Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligence (AI) assistant Duo that could have allowed attackers to steal source code and inject untrusted HTML into its responses, which could then be used to direct victims to malicious websites. The attack could also leak confidential issue data, such as zero-day vulnerability details. All that's required is for the attacker to instruct the chatbot to interact with a merge request (or commit, issue, or source code) by taking advantage of the fact that GitLab Duo has extensive access to the platform. "By embedding hidden instructions in seemingly harmless project content, we were able to manipulate Duo's behavior, exfiltrate private source code, and demonstrate how AI responses can be leveraged for unintended and harmful outcomes," Legit Security said. One variation of the attack involved hiding a malicious instruction in an otherwise legitimate piece of source code, while another exploited Duo's parsing of markdown responses in real-time asynchronously. An attacker could leverage this behavior – that Duo begins rendering the output line by line rather than waiting until the entire response is generated and sending it all at once – to introduce malicious HTML code that can access sensitive data and exfiltrate the information to a remote server. The issues have been patched by GitLab following responsible disclosure. ‎️‍🔥 Trending CVEs Software vulnerabilities remain one of the simplest—and most effective—entry points for attackers. Each week uncovers new flaws, and even small delays in patching can escalate into serious security incidents. Staying ahead means acting fast. Below is this week's list of high-risk vulnerabilities that demand attention. Review them carefully, apply updates without delay, and close the doors before they're forced open. This week's list includes — CVE-2025-34025, CVE-2025-34026, CVE-2025-34027 (Versa Concerto), CVE-2025-30911 (RomethemeKit For Elementor WordPress plugin), CVE-2024-57273, CVE-2024-54780, and CVE-2024-54779 (pfSense), CVE-2025-41229 (VMware Cloud Foundation), CVE-2025-4322 (Motors WordPress theme), CVE-2025-47934 (OpenPGP.js), CVE-2025-30193 (PowerDNS), CVE-2025-0993 (GitLab), CVE-2025-36535 (AutomationDirect MB-Gateway), CVE-2025-47949 (Samlify), CVE-2025-40775 (BIND DNS), CVE-2025-20152 (Cisco Identity Services Engine), CVE-2025-4123 (Grafana), CVE-2025-5063 (Google Chrome), CVE-2025-37899 (Linux Kernel), CVE-2025-26817 (Netwrix Password Secure), CVE-2025-47947 (ModSecurity), CVE-2025-3078, CVE-2025-3079 (Canon Printers), and CVE-2025-4978 (NETGEAR). 📰 Around the Cyber World Sandworm Drops New Wiper in Ukraine — The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named ZEROLOT. "The infamous Sandworm group concentrated heavily on compromising Ukrainian energy infrastructure. In recent cases, it deployed the ZEROLOT wiper in Ukraine. For this, the attackers abused Active Directory Group Policy in the affected organizations," ESET Director of Threat Research, Jean-Ian Boutin, said. Another Russian hacking group, Gamaredon, remained the most prolific actor targeting the East European nation, enhancing malware obfuscation and introducing PteroBox, a file stealer leveraging Dropbox. Signal Says No to Recall — Signal has released a new version of its messaging app for Windows that, by default, blocks the ability of Windows to use Recall to periodically take screenshots of the app. "Although Microsoft made several adjustments over the past twelve months in response to critical feedback, the revamped version of Recall still places any content that's displayed within privacy-preserving apps like Signal at risk," Signal said. "As a result, we are enabling an extra layer of protection by default on Windows 11 in order to help maintain the security of Signal Desktop on that platform even though it introduces some usability trade-offs. Microsoft has simply given us no other option." Microsoft began officially rolling out Recall last month. Russia Introduces New Law to Track Foreigners Using Their Smartphones — The Russian government has introduced a new law that makes installing a tracking app mandatory for all foreign nationals in the Moscow region. This includes gathering their real-time locations, fingerprint, face photograph, and residential information. "The adopted mechanism will allow, using modern technologies, to strengthen control in the field of migration and will also contribute to reducing the number of violations and crimes in this area," Vyacheslav Volodin, chairman of the State Duma, said. "If migrants change their actual place of residence, they will be required to inform the Ministry of Internal Affairs (MVD) within three working days." A proposed four-year trial period begins on September 1, 2025, and runs until September 1, 2029. Dutch Government Passes Law to Criminalize Cyber Espionage — The Dutch government has approved a law criminalizing a wide range of espionage activities, including digital espionage, in an effort to protect national security, critical infrastructure, and high-quality technologies. Under the amended law, leaking sensitive information that is not classified as a state secret or engaging in activities on behalf of a foreign government that harm Dutch interests can also result in criminal charges. "Foreign governments are also interested in non-state-secret, sensitive information about a particular economic sector or about political decision-making," the government said. "Such information can be used to influence political processes, weaken the Dutch economy or play allies against each other. Espionage can also involve actions other than sharing information." Microsoft Announces Availability of Quantum-Resistant Algorithms to SymCrypt — Microsoft has revealed that it's making post-quantum cryptography (PQC) capabilities, including ML-KEM and ML-DSA, available for Windows Insiders, Canary Channel Build 27852 and higher, and Linux, SymCrypt-OpenSSL version 1.9.0. "This advancement will enable customers to commence their exploration and experimentation of PQC within their operational environments," Microsoft said. "By obtaining early access to PQC capabilities, organizations can proactively assess the compatibility, performance, and integration of these novel algorithms alongside their existing security infrastructure." New Malware DOUBLELOADER Uses ALCATRAZ for Obfuscation — The open-source obfuscator ALCATRAZ has been seen within a new generic loader dubbed DOUBLELOADER, which has been deployed alongside Rhadamanthys Stealer infections starting December 2024. The malware collects host information, requests an updated version of itself, and starts beaconing to a hardcoded IP address (185.147.125[.]81) stored within the binary. "Obfuscators such as ALCATRAZ end up increasing the complexity when triaging malware," Elastic Security Labs said. "Its main goal is to hinder binary analysis tools and increase the time of the reverse engineering process through different techniques; such as hiding the control flow or making decompilation hard to follow." New Formjacking Campaign Targets WooCommerce Sites — Cybersecurity researchers have detected a sophisticated formjacking campaign targeting WooCommerce sites. The malware, per Wordfence, injects a fake but professional-looking payment form into legitimate checkout processes and exfiltrates sensitive customer data to an external server. Further analysis has revealed that the infection likely originated from a compromised WordPress admin account, which was used to inject malicious JavaScript via a Simple Custom CSS and JS plugin (or something similar) that allows administrators to add custom code. "Unlike traditional card skimmers that simply overlay existing forms, this variant carefully integrates with the WooCommerce site's design and payment workflow, making it particularly difficult for site owners and users to detect," the WordPress security company said. "The malware author repurposed the browser's localStorage mechanism – typically used by websites to remember user preferences – to silently store stolen data and maintain access even after page reloads or when navigating away from the checkout page." E.U. Sanctions Stark Industries — The European Union (E.U.) has announced sanctions against 21 individuals and six entities in Russia over its "destabilising actions" in the region. One of the sanctioned entities is Stark Industries, a bulletproof hosting provider that has been accused of acting as "enablers of various Russian state-sponsored and affiliated actors to conduct destabilising activities including, information manipulation interference and cyber attacks against the Union and third countries." The sanctions also target its CEO Iurie Neculiti and owner Ivan Neculiti. Stark Industries was previously spotlighted by independent cybersecurity journalist Brian Krebs, detailing its use in DDoS attacks in Ukraine and across Europe. In August 2024, Team Cymru said it discovered 25 Stark-assigned IP addresses used to host domains associated with FIN7 activities and that it had been working with Stark Industries for several months to identify and reduce abuse of their systems. The sanctions have also targeted Kremlin-backed manufacturers of drones and radio communication equipment used by the Russian military, as well as those involved in GPS signal jamming in Baltic states and disrupting civil aviation. The Mask APT Unmasked as Tied to the Spanish Government — The mysterious threat actor known as The Mask (aka Careto) has been identified as run by the Spanish government, according to a report published by TechCrunch, citing people who worked at Kaspersky at the time and had knowledge of the investigation. The Russian cybersecurity company first exposed the hacking group in 2014, linking it to highly sophisticated attacks since at least 2007 targeting high-profile organizations, such as governments, diplomatic entities, and research institutions. A majority of the group's attacks have targeted Cuba, followed by hundreds of victims in Brazil, Morocco, Spain, and Gibraltar. While Kaspersky has not publicly attributed it to a specific country, the latest revelation makes The Mask one of the few Western government hacking groups that has ever been discussed in public. This includes the Equation Group, the Lamberts (the U.S.), and Animal Farm (France). Social Engineering Scams Target Coinbase Users — Earlier this month, cryptocurrency exchange Coinbase revealed that it was the victim of a malicious attack perpetrated by unknown threat actors to breach its systems by bribing customer support agents in India and siphon funds from nearly 70,000 customers. According to Blockchain security firm SlowMist, Coinbase users have been the target of social engineering scams since the start of the year, bombarding with SMS messages claiming to be fake withdrawal requests and seeking their confirmation as part of a "sustained and organized scam campaign." The goal is to induce a false sense of urgency and trick them into calling a number, eventually convincing them to transfer the funds to a secure wallet with a seed phrase pre-generated by the attackers and ultimately drain the assets. It's assessed that the activities are primarily carried out by two groups: low-level skid attackers from the Com community and organized cybercrime groups based in India. "Using spoofed PBX phone systems, scammers impersonate Coinbase support and claim there's been 'unauthorized access' or 'suspicious withdrawals' on the user's account," SlowMist said. "They create a sense of urgency, then follow up with phishing emails or texts containing fake ticket numbers or 'recovery links.'" Delta Can Sue CrowdStrike Over July 2024 Mega Outage — Delta Air Lines, which had its systems crippled and almost 7,000 flights canceled in the wake of a massive outage caused by a faulty update issued by CrowdStrike in mid-July 2024, has been given the green light to pursue to its lawsuit against the cybersecurity company. A judge in the U.S. state of Georgia stating Delta can try to prove that CrowdStrike was grossly negligent by pushing a defective update to its Falcon software to customers. The update crashed 8.5 million Windows devices across the world. Crowdstrike previously claimed that the airline had rejected technical support offers both from itself and Microsoft. In a statement shared with Reuters, lawyers representing CrowdStrike said they were "confident the judge will find Delta's case has no merit, or will limit damages to the 'single-digit millions of dollars' under Georgia law." The development comes months after MGM Resorts International agreed to pay $45 million to settle multiple class-action lawsuits related to a data breach in 2019 and a ransomware attack the company experienced in 2023. Storm-1516 Uses AI-Generated Media to Spread Disinformation — The Russian influence operation known as Storm-1516 (aka CopyCop) sought to spread narratives that undermined the European support for Ukraine by amplifying fabricated stories on X about European leaders using drugs while traveling by train to Kyiv for peace talks. One of the posts was subsequently shared by Russian state media and Maria Zakharova, a senior official in Russia's foreign ministry, as part of what has been described as a coordinated disinformation campaign by EclecticIQ. The activity is also notable for the use of synthetic content depicting French President Emmanuel Macron, U.K. Labour Party leader Keir Starmer, and German chancellor Friedrich Merz of drug possession during their return from Ukraine. "By attacking the reputation of these leaders, the campaign likely aimed to turn their own voters against them, using influence operations (IO) to reduce public support for Ukraine by discrediting the politicians who back it," the Dutch threat intelligence firm said. Turkish Users Targeted by DBatLoader — AhnLab has disclosed details of a malware campaign that's distributing a malware loader called DBatLoader (aka ModiLoader) via banking-themed banking emails, which then acts as a conduit to deliver SnakeKeylogger, an information stealer developed in .NET. "The DBatLoader malware distributed through phishing emails has the cunning behavior of exploiting normal processes (easinvoker.exe, loader.exe) through techniques such as DLL side-loading and injection for most of its behaviors, and it also utilizes normal processes (cmd.exe, powershell.exe, esentutl.exe, extrac32.exe) for behaviors such as file copying and changing policies," the company said. SEC SIM-Swapper Sentenced to 14 Months for SEC X Account Hack — A 26-year-old Alabama man, Eric Council Jr., has been sentenced to 14 months in prison and three years of supervised release for using SIM swapping attacks to breach the U.S. Securities and Exchange Commission's (SEC) official X account in January 2024 and falsely announced that the SEC approved Bitcoin (BTC) Exchange Traded Funds (ETFs). Council Jr. (aka Ronin, Agiantschnauzer, and @EasyMunny) was arrested in October 2024 and pleaded guilty to the crime earlier this February. He has also been ordered to forfeit $50,000. According to court documents, Council used his personal computer to search incriminating phrases such as "SECGOV hack," "telegram sim swap," "how can I know for sure if I am being investigated by the FBI," "What are the signs that you are under investigation by law enforcement or the FBI even if you have not been contacted by them," "what are some signs that the FBI is after you," "Verizon store list," "federal identity theft statute," and "how long does it take to delete telegram account." FBI Warns of Malicious Campaign Impersonating Government Officials — The U.S. Federal Bureau of Investigation (FBI) is warning of a new campaign that involves malicious actors impersonating senior U.S. federal or state government officials and their contacts to target individuals since April 2025. "The malicious actors have sent text messages and AI-generated voice messages — techniques known as smishing and vishing, respectively — that claim to come from a senior US official in an effort to establish rapport before gaining access to personal accounts," the FBI said. "One way the actors gain such access is by sending targeted individuals a malicious link under the guise of transitioning to a separate messaging platform." From there, the actor may present malware or introduce hyperlinks that lead intended targets to an actor-controlled site that steals login information. DICOM Flaw Enables Attackers to Embed Malicious Code Within Medical Image Files — Praetorian has released a proof-of-concept (PoC) for a high-severity security flaw in Digital Imaging and Communications in Medicine (DICOM), predominant file format for medical images, that enables attackers to embed malicious code within legitimate medical image files. CVE-2019-11687 (CVSS score: 7.8), originally disclosed in 2019 by Markel Picado Ortiz, stems from a design decision that allows arbitrary content at the start of the file, otherwise called the Preamble, which enables the creation of malicious polyglots. Codenamed ELFDICOM, the PoC extends the attack surface to Linux environments, making it a much more potent threat. As mitigations, it's advised to implement a DICOM preamble whitelist. "DICOM's file structure inherently allows arbitrary bytes at the beginning of the file, where Linux and most operating systems will look for magic bytes," Praetorian researcher Ryan Hennessee said. "[The whitelist] would check a DICOM file's preamble before it is imported into the system. This would allow known good patterns, such as 'TIFF' magic bytes, or '\x00' null bytes, while files with the ELF magic bytes would be blocked." Cookie-Bite Attack Uses Chrome Extension to Steal Session Tokens — Cybersecurity researchers have demonstrated a new attack technique called Cookie-Bite that employs custom-made malicious browser extensions to steal "ESTAUTH" and "ESTSAUTHPERSISTNT" cookies in Microsoft Azure Entra ID and bypass multi-factor authentication (MFA). The attack has multiple moving parts to it: A custom Chrome extension that monitors authentication events and captures cookies; a PowerShell script that automates the extension deployment and ensures persistence; an exfiltration mechanism to send the cookies to a remote collection point; and a complementary extension to inject the captured cookies into the attacker's browser. "Threat actors often use infostealers to extract authentication tokens directly from a victim's machine or buy them directly through darkness markets, allowing adversaries to hijack active cloud sessions without triggering MFA," Varonis said. "By injecting these cookies while mimicking the victim's OS, browser, and network, attackers can evade Conditional Access Policies (CAPs) and maintain persistent access." Authentication cookies can also be stolen using adversary-in-the-middle (AitM) phishing kits in real-time, or using rogue browser extensions that request excessive permissions to interact with web sessions, modify page content, and extract stored authentication data. Once installed, the extension can access the browser's storage API, intercept network requests, or inject malicious JavaScript into active sessions to harvest real-time session cookies. "By leveraging stolen session cookies, an adversary can bypass authentication mechanisms, gaining seamless entry into cloud environments without requiring user credentials," Varonis said. "Beyond initial access, session hijacking can facilitate lateral movement across the tenant, allowing attackers to explore additional resources, access sensitive data, and escalate privileges by abusing existing permissions or misconfigured roles." 🎥 Cybersecurity Webinars Non-Human Identities: The AI Backdoor You're Not Watching → AI agents rely on Non-Human Identities (like service accounts and API keys) to function—but these are often left untracked and unsecured. As attackers shift focus to this hidden layer, the risk is growing fast. In this session, you'll learn how to find, secure, and monitor these identities before they're exploited. Join the webinar to understand the real risks behind AI adoption—and how to stay ahead. Inside the LOTS Playbook: How Hackers Stay Undetected → Attackers are using trusted sites to stay hidden. In this webinar, Zscaler experts share how they detect these stealthy LOTS attacks using insights from the world's largest security cloud. Join to learn how to spot hidden threats and improve your defense. 🔧 Cybersecurity Tools ScriptSentry → It is a free tool that scans your environment for dangerous logon script misconfigurations—like plaintext credentials, insecure file/share permissions, and references to non-existent servers. These overlooked issues can enable lateral movement, privilege escalation, or even credential theft. ScriptSentry helps you quickly identify and fix them across large Active Directory environments. Aftermath → It is a Swift-based, open-source tool for macOS incident response. It collects forensic data—like logs, browser activity, and process info—from compromised systems, then analyzes it to build timelines and track infection paths. Deploy via MDM or run manually. Fast, lightweight, and ideal for post-incident investigation. AI Red Teaming Playground Labs → It is an open-source training suite with hands-on challenges designed to teach security professionals how to red team AI systems. Originally developed for Black Hat USA 2024, the labs cover prompt injections, safety bypasses, indirect attacks, and Responsible AI failures. Built on Chat Copilot and deployable via Docker, it's a practical resource for testing and understanding real-world AI vulnerabilities. 🔒 Tip of the Week Review and Revoke Old OAuth App Permissions — They're Silent Backdoor → You've likely logged into apps using "Continue with Google," "Sign in with Microsoft," or GitHub/Twitter/Facebook logins. That's OAuth. But did you know many of those apps still have access to your data long after you stop using them? Why it matters: Even if you delete the app or forget it existed, it might still have ongoing access to your calendar, email, cloud files, or contact list — no password needed. If that third-party gets breached, your data is at risk. What to do: Go through your connected apps here: Google: myaccount.google.com/permissions Microsoft: account.live.com/consent/Manage GitHub: github.com/settings/applications Facebook: facebook.com/settings?tab=applications Revoke anything you don't actively use. It's a fast, silent cleanup — and it closes doors you didn't know were open. Conclusion Looking ahead, it's not just about tracking threats—it's about understanding what they reveal. Every tactic used, every system tested, points to deeper issues in how trust, access, and visibility are managed. As attackers adapt quickly, defenders need sharper awareness and faster response loops. The takeaways from this week aren't just technical—they speak to how teams prioritize risk, design safeguards, and make choices under pressure. Use these insights not just to react, but to rethink what "secure" really needs to mean in today's environment. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    0 Commentarii 0 Distribuiri
  • Peace Garden at UNESCO by Isamu Noguchi

    Peace Garden at UNESCO | © INFGM
    Located within the headquarters of UNESCO in Paris, the Peace Garden by Isamu Noguchi emerges not merely as a landscape installation but as a profound meditation on postwar diplomacy and cultural synthesis. Commissioned in the mid-1950s, the garden symbolizes the United Nations’ commitment to peace through mutual understanding and cultural dialogue.

    Peace Garden at UNESCO Technical Information

    Artist1-2: Isamu Noguchi
    Location: 7 Place de Fontenoy, 75352 Paris, France
    Client: Marcel Breuer / UNESCO
    Area: 2,400 m2 | 25,800 Sq. Ft.
    Project Year: 1958
    Photographs: © INFGM and Flick Users, See Caption Details

    It should be a quiet, moving place.
    – Isamu Noguchi 3

    Peace Garden at UNESCO Photographs

    © INFGM

    © INFGM

    © INFGM

    © INFGM

    © INFGM

    © INFGM

    © bbonthebrink, Flickr User

    © Patrice Todisco

    © bbonthebrink, Flickr User

    © bbonthebrink, Flickr User

    © Dalbera, Flckr user

    © Dalbera, Flckr user

    Park View

    Park View
    Context and Commission
    Noguchi, a Japanese-American sculptor and designer, was a poignant choice for the task. His biography embodies a convergence of East and West, as well as a lifelong engagement with public space as a vehicle for social commentary. By the time of his UNESCO commission, Noguchi had already engaged with landscape-scale sculptures, memorials, and playgrounds. The Peace Garden offered an opportunity to distill these threads into a singular work situated at the crossroads of global diplomacy.
    His selection was shaped by the broader architectural ethos of the UNESCO campus, designed by an international team including Marcel Breuer, Pier Luigi Nervi, and Bernard Zehrfuss. The ensemble called for a complementary but ideologically rich intervention, a space that could resonate as much with symbolic gravitas as with formal clarity.
    This garden was Noguchi’s first realized landscape design, and its execution was made possible through a personal introduction from Marcel Breuer, the chief architect of the UNESCO headquarters. Breuer not only facilitated the commission but also supported Noguchi’s experimental vision, which would challenge prevailing notions of diplomatic landscaping. Notably, the garden was completed in 1958 and spans approximately 2,400 square meters. It was constructed by renowned Kyoto-based master gardener Sano Toemon, marking a cross-cultural collaboration between modernist sculpture and traditional Japanese craftsmanship.
    Design Philosophy and Symbolic Intent
    Noguchi approached the Peace Garden as both sculptor and spatial thinker. He resisted creating a traditional memorial or a didactic allegory of peace. Instead, he crafted a contemplative void, a space that, through its absence of overt narrative, invited personal reflection and multiple interpretations.
    Drawing on the vocabulary of Japanese rock gardens and Zen traditions, Noguchi created a space of abstract expression that nonetheless maintained universal accessibility. The garden is composed of roughly hewn granite stones, a central water basin, and minimal vegetation. Each element is carefully positioned, creating an orchestrated tension between natural materiality and deliberate composition. This spatial language evokes notions of impermanence, balance, and introspection.
    The garden does not dictate how peace should be understood; rather, it sets a stage for experiencing peace as a spatial and emotional condition. In Noguchi’s words, the garden was to be “a quiet, moving place” rather than a monument.
    While inspired by Japanese garden typologies, particularly the stroll garden, Noguchi chose not to replicate tradition. Instead, he abstracted and reinterpreted elements such as Mt. Horai rock formations, stepping stones, and a crouching basin. These forms subtly allude to symbolic motifs without prescribing a singular reading. Noguchi negotiated directly with the Japanese government to secure donations of ten tons of stone and plant materials including camellias, maples, cherry trees, and bamboo. This act itself underscored the garden’s role as a diplomatic gesture, embedding it with botanical references to Japanese identity while maintaining a universal design language.
    Material and Spatial Composition
    Set at the base of the UNESCO building, the Peace Garden establishes a counterpoint to the architectural massing surrounding it. Its recessed layout forms a kind of spatial cloister, shielding visitors from the city’s rhythm and inviting a slower, more inward pace.
    The materials, chiefly unpolished granite, gravel, and water, speak to both permanence and mutability. The granite stones, irregular yet intentional in placement, recall tectonic forms and ancient spiritual markers. The central water feature introduces subtle movement and sound, enhancing the sensory richness of the space.
    The garden’s compositional core is its sculptural use of stone, each placement a spatial decision echoing both tectonic memory and sculptural intentionality. Noguchi collaborated on-site with Sano Toemon, whose craftsmanship adapted in real-time to the artist’s rapidly evolving vision. According to Sano, it was only after intense on-site dialogue and shared experience that he could fully comprehend and execute Noguchi’s aesthetic strategy, a testament to the garden’s improvisational and relational genesis.
    Spatially, the garden is organized not around pathways but around moments. There is no linear procession or axial symmetry; instead, it offers a field of relationships. Voids and solids, shadows and reflections, horizontality and vertical interruptions all work together to create a space that must be experienced slowly and from multiple vantage points.
    The absence of overt hierarchy in the layout allows users to construct their own narratives. It is a non-prescriptive space in which silence, texture, and light become the principal mediums of meaning.
    Peace Garden at UNESCO Plans

    Floor Plan | © Isamu Noguchi

    Floor Plan | © Isamu Noguchi
    Peace Garden at UNESCO Image Gallery

    About Isamu Noguchi
    Isamu Noguchiwas a Japanese-American sculptor, landscape architect, and designer renowned for his fusion of Eastern and Western aesthetics. Trained under Constantin Brâncuși and deeply influenced by Japanese traditions, Noguchi’s work spanned sculpture, furniture, stage sets, and public spaces. His practice was rooted in a belief that art should be integrated into everyday life, often blurring the boundaries between art, architecture, and landscape. Notable for his minimal yet emotionally resonant forms, Noguchi’s legacy includes iconic works such as the Noguchi Table, the UNESCO Peace Garden in Paris, and the Isamu Noguchi Garden Museum in New York.
    Credits and Additional Notes

    Style: Stroll Garden, Contemporary Japanese Garden
    Main Contractor: Sano Toemon, in collaboration with Uetō Zōen
    Listening to Stone: The Art and Life of Isamu Noguchi by Hayden Herrera
    Torres, Ana Maria. Isamu Noguchi: Studies in Space. Tokyo: Marumo Publishing, 2000. pp. 96–109.
    Sasaki, Yōji. “What Isamu Noguchi Left Behind.” Japan Landscape, no. 16, Process Architecture, 1990, p. 87.
    Treib, Marc. Noguchi in Paris: The UNESCO Garden. San Francisco: William Stout Publishers and UNESCO Publishing, 2004.
    Overseas Japanese Gardens Database. “UNESCO Garden.” Accessed May 2025.
    #peace #garden #unesco #isamu #noguchi
    Peace Garden at UNESCO by Isamu Noguchi
    Peace Garden at UNESCO | © INFGM Located within the headquarters of UNESCO in Paris, the Peace Garden by Isamu Noguchi emerges not merely as a landscape installation but as a profound meditation on postwar diplomacy and cultural synthesis. Commissioned in the mid-1950s, the garden symbolizes the United Nations’ commitment to peace through mutual understanding and cultural dialogue. Peace Garden at UNESCO Technical Information Artist1-2: Isamu Noguchi Location: 7 Place de Fontenoy, 75352 Paris, France Client: Marcel Breuer / UNESCO Area: 2,400 m2 | 25,800 Sq. Ft. Project Year: 1958 Photographs: © INFGM and Flick Users, See Caption Details It should be a quiet, moving place. – Isamu Noguchi 3 Peace Garden at UNESCO Photographs © INFGM © INFGM © INFGM © INFGM © INFGM © INFGM © bbonthebrink, Flickr User © Patrice Todisco © bbonthebrink, Flickr User © bbonthebrink, Flickr User © Dalbera, Flckr user © Dalbera, Flckr user Park View Park View Context and Commission Noguchi, a Japanese-American sculptor and designer, was a poignant choice for the task. His biography embodies a convergence of East and West, as well as a lifelong engagement with public space as a vehicle for social commentary. By the time of his UNESCO commission, Noguchi had already engaged with landscape-scale sculptures, memorials, and playgrounds. The Peace Garden offered an opportunity to distill these threads into a singular work situated at the crossroads of global diplomacy. His selection was shaped by the broader architectural ethos of the UNESCO campus, designed by an international team including Marcel Breuer, Pier Luigi Nervi, and Bernard Zehrfuss. The ensemble called for a complementary but ideologically rich intervention, a space that could resonate as much with symbolic gravitas as with formal clarity. This garden was Noguchi’s first realized landscape design, and its execution was made possible through a personal introduction from Marcel Breuer, the chief architect of the UNESCO headquarters. Breuer not only facilitated the commission but also supported Noguchi’s experimental vision, which would challenge prevailing notions of diplomatic landscaping. Notably, the garden was completed in 1958 and spans approximately 2,400 square meters. It was constructed by renowned Kyoto-based master gardener Sano Toemon, marking a cross-cultural collaboration between modernist sculpture and traditional Japanese craftsmanship. Design Philosophy and Symbolic Intent Noguchi approached the Peace Garden as both sculptor and spatial thinker. He resisted creating a traditional memorial or a didactic allegory of peace. Instead, he crafted a contemplative void, a space that, through its absence of overt narrative, invited personal reflection and multiple interpretations. Drawing on the vocabulary of Japanese rock gardens and Zen traditions, Noguchi created a space of abstract expression that nonetheless maintained universal accessibility. The garden is composed of roughly hewn granite stones, a central water basin, and minimal vegetation. Each element is carefully positioned, creating an orchestrated tension between natural materiality and deliberate composition. This spatial language evokes notions of impermanence, balance, and introspection. The garden does not dictate how peace should be understood; rather, it sets a stage for experiencing peace as a spatial and emotional condition. In Noguchi’s words, the garden was to be “a quiet, moving place” rather than a monument. While inspired by Japanese garden typologies, particularly the stroll garden, Noguchi chose not to replicate tradition. Instead, he abstracted and reinterpreted elements such as Mt. Horai rock formations, stepping stones, and a crouching basin. These forms subtly allude to symbolic motifs without prescribing a singular reading. Noguchi negotiated directly with the Japanese government to secure donations of ten tons of stone and plant materials including camellias, maples, cherry trees, and bamboo. This act itself underscored the garden’s role as a diplomatic gesture, embedding it with botanical references to Japanese identity while maintaining a universal design language. Material and Spatial Composition Set at the base of the UNESCO building, the Peace Garden establishes a counterpoint to the architectural massing surrounding it. Its recessed layout forms a kind of spatial cloister, shielding visitors from the city’s rhythm and inviting a slower, more inward pace. The materials, chiefly unpolished granite, gravel, and water, speak to both permanence and mutability. The granite stones, irregular yet intentional in placement, recall tectonic forms and ancient spiritual markers. The central water feature introduces subtle movement and sound, enhancing the sensory richness of the space. The garden’s compositional core is its sculptural use of stone, each placement a spatial decision echoing both tectonic memory and sculptural intentionality. Noguchi collaborated on-site with Sano Toemon, whose craftsmanship adapted in real-time to the artist’s rapidly evolving vision. According to Sano, it was only after intense on-site dialogue and shared experience that he could fully comprehend and execute Noguchi’s aesthetic strategy, a testament to the garden’s improvisational and relational genesis. Spatially, the garden is organized not around pathways but around moments. There is no linear procession or axial symmetry; instead, it offers a field of relationships. Voids and solids, shadows and reflections, horizontality and vertical interruptions all work together to create a space that must be experienced slowly and from multiple vantage points. The absence of overt hierarchy in the layout allows users to construct their own narratives. It is a non-prescriptive space in which silence, texture, and light become the principal mediums of meaning. Peace Garden at UNESCO Plans Floor Plan | © Isamu Noguchi Floor Plan | © Isamu Noguchi Peace Garden at UNESCO Image Gallery About Isamu Noguchi Isamu Noguchiwas a Japanese-American sculptor, landscape architect, and designer renowned for his fusion of Eastern and Western aesthetics. Trained under Constantin Brâncuși and deeply influenced by Japanese traditions, Noguchi’s work spanned sculpture, furniture, stage sets, and public spaces. His practice was rooted in a belief that art should be integrated into everyday life, often blurring the boundaries between art, architecture, and landscape. Notable for his minimal yet emotionally resonant forms, Noguchi’s legacy includes iconic works such as the Noguchi Table, the UNESCO Peace Garden in Paris, and the Isamu Noguchi Garden Museum in New York. Credits and Additional Notes Style: Stroll Garden, Contemporary Japanese Garden Main Contractor: Sano Toemon, in collaboration with Uetō Zōen Listening to Stone: The Art and Life of Isamu Noguchi by Hayden Herrera Torres, Ana Maria. Isamu Noguchi: Studies in Space. Tokyo: Marumo Publishing, 2000. pp. 96–109. Sasaki, Yōji. “What Isamu Noguchi Left Behind.” Japan Landscape, no. 16, Process Architecture, 1990, p. 87. Treib, Marc. Noguchi in Paris: The UNESCO Garden. San Francisco: William Stout Publishers and UNESCO Publishing, 2004. Overseas Japanese Gardens Database. “UNESCO Garden.” Accessed May 2025. #peace #garden #unesco #isamu #noguchi
    ARCHEYES.COM
    Peace Garden at UNESCO by Isamu Noguchi
    Peace Garden at UNESCO | © INFGM Located within the headquarters of UNESCO in Paris, the Peace Garden by Isamu Noguchi emerges not merely as a landscape installation but as a profound meditation on postwar diplomacy and cultural synthesis. Commissioned in the mid-1950s, the garden symbolizes the United Nations’ commitment to peace through mutual understanding and cultural dialogue. Peace Garden at UNESCO Technical Information Artist1-2: Isamu Noguchi Location: 7 Place de Fontenoy, 75352 Paris, France Client: Marcel Breuer / UNESCO Area: 2,400 m2 | 25,800 Sq. Ft. Project Year: 1958 Photographs: © INFGM and Flick Users, See Caption Details It should be a quiet, moving place. – Isamu Noguchi 3 Peace Garden at UNESCO Photographs © INFGM © INFGM © INFGM © INFGM © INFGM © INFGM © bbonthebrink, Flickr User © Patrice Todisco © bbonthebrink, Flickr User © bbonthebrink, Flickr User © Dalbera, Flckr user © Dalbera, Flckr user Park View Park View Context and Commission Noguchi, a Japanese-American sculptor and designer, was a poignant choice for the task. His biography embodies a convergence of East and West, as well as a lifelong engagement with public space as a vehicle for social commentary. By the time of his UNESCO commission, Noguchi had already engaged with landscape-scale sculptures, memorials, and playgrounds. The Peace Garden offered an opportunity to distill these threads into a singular work situated at the crossroads of global diplomacy. His selection was shaped by the broader architectural ethos of the UNESCO campus, designed by an international team including Marcel Breuer, Pier Luigi Nervi, and Bernard Zehrfuss. The ensemble called for a complementary but ideologically rich intervention, a space that could resonate as much with symbolic gravitas as with formal clarity. This garden was Noguchi’s first realized landscape design, and its execution was made possible through a personal introduction from Marcel Breuer, the chief architect of the UNESCO headquarters. Breuer not only facilitated the commission but also supported Noguchi’s experimental vision, which would challenge prevailing notions of diplomatic landscaping. Notably, the garden was completed in 1958 and spans approximately 2,400 square meters. It was constructed by renowned Kyoto-based master gardener Sano Toemon, marking a cross-cultural collaboration between modernist sculpture and traditional Japanese craftsmanship. Design Philosophy and Symbolic Intent Noguchi approached the Peace Garden as both sculptor and spatial thinker. He resisted creating a traditional memorial or a didactic allegory of peace. Instead, he crafted a contemplative void, a space that, through its absence of overt narrative, invited personal reflection and multiple interpretations. Drawing on the vocabulary of Japanese rock gardens and Zen traditions, Noguchi created a space of abstract expression that nonetheless maintained universal accessibility. The garden is composed of roughly hewn granite stones, a central water basin, and minimal vegetation. Each element is carefully positioned, creating an orchestrated tension between natural materiality and deliberate composition. This spatial language evokes notions of impermanence, balance, and introspection. The garden does not dictate how peace should be understood; rather, it sets a stage for experiencing peace as a spatial and emotional condition. In Noguchi’s words, the garden was to be “a quiet, moving place” rather than a monument. While inspired by Japanese garden typologies, particularly the stroll garden (池泉回遊式), Noguchi chose not to replicate tradition. Instead, he abstracted and reinterpreted elements such as Mt. Horai rock formations, stepping stones, and a crouching basin. These forms subtly allude to symbolic motifs without prescribing a singular reading. Noguchi negotiated directly with the Japanese government to secure donations of ten tons of stone and plant materials including camellias, maples, cherry trees, and bamboo. This act itself underscored the garden’s role as a diplomatic gesture, embedding it with botanical references to Japanese identity while maintaining a universal design language. Material and Spatial Composition Set at the base of the UNESCO building, the Peace Garden establishes a counterpoint to the architectural massing surrounding it. Its recessed layout forms a kind of spatial cloister, shielding visitors from the city’s rhythm and inviting a slower, more inward pace. The materials, chiefly unpolished granite, gravel, and water, speak to both permanence and mutability. The granite stones, irregular yet intentional in placement, recall tectonic forms and ancient spiritual markers. The central water feature introduces subtle movement and sound, enhancing the sensory richness of the space. The garden’s compositional core is its sculptural use of stone, each placement a spatial decision echoing both tectonic memory and sculptural intentionality. Noguchi collaborated on-site with Sano Toemon, whose craftsmanship adapted in real-time to the artist’s rapidly evolving vision. According to Sano, it was only after intense on-site dialogue and shared experience that he could fully comprehend and execute Noguchi’s aesthetic strategy, a testament to the garden’s improvisational and relational genesis. Spatially, the garden is organized not around pathways but around moments. There is no linear procession or axial symmetry; instead, it offers a field of relationships. Voids and solids, shadows and reflections, horizontality and vertical interruptions all work together to create a space that must be experienced slowly and from multiple vantage points. The absence of overt hierarchy in the layout allows users to construct their own narratives. It is a non-prescriptive space in which silence, texture, and light become the principal mediums of meaning. Peace Garden at UNESCO Plans Floor Plan | © Isamu Noguchi Floor Plan | © Isamu Noguchi Peace Garden at UNESCO Image Gallery About Isamu Noguchi Isamu Noguchi (1904–1988) was a Japanese-American sculptor, landscape architect, and designer renowned for his fusion of Eastern and Western aesthetics. Trained under Constantin Brâncuși and deeply influenced by Japanese traditions, Noguchi’s work spanned sculpture, furniture, stage sets, and public spaces. His practice was rooted in a belief that art should be integrated into everyday life, often blurring the boundaries between art, architecture, and landscape. Notable for his minimal yet emotionally resonant forms, Noguchi’s legacy includes iconic works such as the Noguchi Table, the UNESCO Peace Garden in Paris, and the Isamu Noguchi Garden Museum in New York. Credits and Additional Notes Style: Stroll Garden, Contemporary Japanese Garden Main Contractor: Sano Toemon, in collaboration with Uetō Zōen Listening to Stone: The Art and Life of Isamu Noguchi by Hayden Herrera Torres, Ana Maria. Isamu Noguchi: Studies in Space. Tokyo: Marumo Publishing, 2000. pp. 96–109. Sasaki, Yōji. “What Isamu Noguchi Left Behind.” Japan Landscape, no. 16, Process Architecture, 1990, p. 87. Treib, Marc. Noguchi in Paris: The UNESCO Garden. San Francisco: William Stout Publishers and UNESCO Publishing, 2004. Overseas Japanese Gardens Database. “UNESCO Garden.” Accessed May 2025.
    0 Commentarii 0 Distribuiri
  • Growth Minded: Director of Lifecycle Marketing & Growth Strategy

    OverviewBacked by Craig Zingerline, Growth Minded is a boutique micro-agency focused on helping early stage through growth startups grow. We're looking for a Director of Lifecycle Marketing & Growth Strategy to help us increase our client engagement capacity, as well as work on internal projects. To learn more about Craig, please visit his Growth Mentor profile, or check him out on LinkedIn.What we doClients hire us to help them find, convert, and retain customers. We work from high level strategy down into channel level tactics, and every layer in-between. As a company and team we care deeply about solving the challenging problems our customers face, and typically own major components of the marketing side of their business. We focus first on growth strategy development, then deliver tactics through a thoughtful, experiment driven approach. Our customers trust us with their business - and we take our work seriously.The roleWe are looking for a talented growth marketing with deep experience running lifecycle marketing programs and building growth strategies. Our ideal candidate has a blend of in-house client-side experience plus agency experience, but candidates with strong lifecycle marketing and growth strategy chops will be considered regardless of exact background. We care deeply about partnering with hardworking, thoughtful, and intellectually curious individuals who are strong lifecycle marketing experts, have world class growth strategy chops, are talented at writing and content framework development, are strategic thinkers, and who have the ability to go deep into the weeds, helping execute campaigns for our clients.Strong client facing skills are a must - you must present well, be able to take feedback and think on the fly, and bring thoughtful, actionable work to the company each day.Job OverviewAs the Director of Lifecycle Marketing & Growth Strategy, you will own the growth strategy and execution of lifecycle marketing campaigns across various channels, focusing on customer acquisition, activation, retention, and monetization. You will work closely with client product, marketing, sales, and analytics teams to drive user growth, create scalable strategies, and optimize conversion pathways to help our clients achieve and exceed their growth goals.Key Responsibilities- Develop comprehensive lifecycle marketing strategies for clients- Lead client relationship management, serving as the primary strategic point of contact- Design and optimize multi-channel customer journeys to maximize engagement, conversion, and retention- Analyze customer data to identify segmentation opportunities and personalization strategies- Write, design and implement email marketing campaigns- Oversee push notification, SMS, and in-app messaging strategies- Implement automated flows with sophisticated triggers- Monitor campaign performance, conduct A/B testing, and provide data-driven recommendations- Set up reports and dashboard on performance- Monitor and identify deliverability issues, as well as implement both technical and content steps to improve deliverability- Build strategies around list cleaning and list hygiene- Ideate and implement ideas on list growth- Present campaign results and strategic insights to clients with clear ROI measurements- Stay current with industry trends and emerging technologies in lifecycle marketing- Develop client proposals and participate in new business pitchesData-Driven Decision Making:- Analyze data to understand the effectiveness of growth initiatives, measure KPIs, and make informed decisions.- Use customer segmentation and cohort analysis to uncover opportunities to increase user engagement and LTV.Nice to have's include:- Deep understanding and audit of the client’s current state of growth.- Design and execute growth strategies that cover the entire customer lifecycle, including acquisition, conversion, retention, and expansion.- Identify new growth opportunities for our clients through data analysis, customer insights, and market research.- Rank the opportunities and present evidence as to the order in which execution of the strategy should follow.- Lead A/B testing initiatives and growth experiments to improve customer acquisition and conversion rates.- Develop an experimentation framework to quickly validate ideas and scale winning initiatives.Collaboration and Leadership- Collaborate with both internal and client teams across marketing, product, and sales to ensure alignment in growth efforts.- Act as an owner within our small company, doing what it takes to help our clients succeed.-Ability to diplomatically assess tradeoffs between competing objectives.Requirements-Proven experience in a growth role, preferably at a startup or fast-paced environment within an agency.-Strong understanding of growth metrics and KPIs, including CAC, LTV, churn, and conversion rates.-Deep experience with lifecycle marketing-Deep experience with one or more of the following platforms: Kit, Hubspot, Salesforce, Klaviyo, Iterable, Customer.io, Google Tag Manager, Google Analytics, etc.- STRONG copywriting and content skills. Almost everything we do requires great content. We have an in-house editor that you can leverage but you'll need to be leading efforts on content for multiple clients. - Deep interest and/or experience in leveraging AI tools to boost your productivity. We are a high output company even though we're small in size. We prefer candidates who are already deeply leveraging AI, but at a minimum, you should have the desire to learn new tools to increase your productivity. -Strong ability to learn as you go.-Ability to manage multiple projects and priorities in a fast-paced environment.-Analytical mindset with strong experience using data to drive decision-making.-Hands-on experience with marketing tools and analytics platforms.-Excellent communication skills and the ability to work cross-functionally.-Passionate about user experience, data-driven decision making, and continual learning.-Hardworking, thoughtful, and intellectually curious—a self-starter who values continuous improvement and collaboration.Why Join Us?-Be a part of an exciting growth journey at a dynamic company that is in growth mode ourselves.-Work with a talented, passionate, and collaborative team.-Enjoy opportunities for professional growth, creativity, and autonomy.To apply, fill out the form below. About the roleWe're going to offer a strong starting salary with a monthly bonus plan. Benefits are included.Base Compensation: to USD or local currency equivalent based on experience in this type of role. Bonus: Profit share to be reviewed as part of job offer. We're profitable and growing, and profit share potential is high.Potential for equity in the company will be considered after an initial evaluation period.
    #growth #minded #director #lifecycle #marketing
    Growth Minded: Director of Lifecycle Marketing & Growth Strategy
    OverviewBacked by Craig Zingerline, Growth Minded is a boutique micro-agency focused on helping early stage through growth startups grow. We're looking for a Director of Lifecycle Marketing & Growth Strategy to help us increase our client engagement capacity, as well as work on internal projects. To learn more about Craig, please visit his Growth Mentor profile, or check him out on LinkedIn.What we doClients hire us to help them find, convert, and retain customers. We work from high level strategy down into channel level tactics, and every layer in-between. As a company and team we care deeply about solving the challenging problems our customers face, and typically own major components of the marketing side of their business. We focus first on growth strategy development, then deliver tactics through a thoughtful, experiment driven approach. Our customers trust us with their business - and we take our work seriously.The roleWe are looking for a talented growth marketing with deep experience running lifecycle marketing programs and building growth strategies. Our ideal candidate has a blend of in-house client-side experience plus agency experience, but candidates with strong lifecycle marketing and growth strategy chops will be considered regardless of exact background. We care deeply about partnering with hardworking, thoughtful, and intellectually curious individuals who are strong lifecycle marketing experts, have world class growth strategy chops, are talented at writing and content framework development, are strategic thinkers, and who have the ability to go deep into the weeds, helping execute campaigns for our clients.Strong client facing skills are a must - you must present well, be able to take feedback and think on the fly, and bring thoughtful, actionable work to the company each day.Job OverviewAs the Director of Lifecycle Marketing & Growth Strategy, you will own the growth strategy and execution of lifecycle marketing campaigns across various channels, focusing on customer acquisition, activation, retention, and monetization. You will work closely with client product, marketing, sales, and analytics teams to drive user growth, create scalable strategies, and optimize conversion pathways to help our clients achieve and exceed their growth goals.Key Responsibilities- Develop comprehensive lifecycle marketing strategies for clients- Lead client relationship management, serving as the primary strategic point of contact- Design and optimize multi-channel customer journeys to maximize engagement, conversion, and retention- Analyze customer data to identify segmentation opportunities and personalization strategies- Write, design and implement email marketing campaigns- Oversee push notification, SMS, and in-app messaging strategies- Implement automated flows with sophisticated triggers- Monitor campaign performance, conduct A/B testing, and provide data-driven recommendations- Set up reports and dashboard on performance- Monitor and identify deliverability issues, as well as implement both technical and content steps to improve deliverability- Build strategies around list cleaning and list hygiene- Ideate and implement ideas on list growth- Present campaign results and strategic insights to clients with clear ROI measurements- Stay current with industry trends and emerging technologies in lifecycle marketing- Develop client proposals and participate in new business pitchesData-Driven Decision Making:- Analyze data to understand the effectiveness of growth initiatives, measure KPIs, and make informed decisions.- Use customer segmentation and cohort analysis to uncover opportunities to increase user engagement and LTV.Nice to have's include:- Deep understanding and audit of the client’s current state of growth.- Design and execute growth strategies that cover the entire customer lifecycle, including acquisition, conversion, retention, and expansion.- Identify new growth opportunities for our clients through data analysis, customer insights, and market research.- Rank the opportunities and present evidence as to the order in which execution of the strategy should follow.- Lead A/B testing initiatives and growth experiments to improve customer acquisition and conversion rates.- Develop an experimentation framework to quickly validate ideas and scale winning initiatives.Collaboration and Leadership- Collaborate with both internal and client teams across marketing, product, and sales to ensure alignment in growth efforts.- Act as an owner within our small company, doing what it takes to help our clients succeed.-Ability to diplomatically assess tradeoffs between competing objectives.Requirements-Proven experience in a growth role, preferably at a startup or fast-paced environment within an agency.-Strong understanding of growth metrics and KPIs, including CAC, LTV, churn, and conversion rates.-Deep experience with lifecycle marketing-Deep experience with one or more of the following platforms: Kit, Hubspot, Salesforce, Klaviyo, Iterable, Customer.io, Google Tag Manager, Google Analytics, etc.- STRONG copywriting and content skills. Almost everything we do requires great content. We have an in-house editor that you can leverage but you'll need to be leading efforts on content for multiple clients. - Deep interest and/or experience in leveraging AI tools to boost your productivity. We are a high output company even though we're small in size. We prefer candidates who are already deeply leveraging AI, but at a minimum, you should have the desire to learn new tools to increase your productivity. -Strong ability to learn as you go.-Ability to manage multiple projects and priorities in a fast-paced environment.-Analytical mindset with strong experience using data to drive decision-making.-Hands-on experience with marketing tools and analytics platforms.-Excellent communication skills and the ability to work cross-functionally.-Passionate about user experience, data-driven decision making, and continual learning.-Hardworking, thoughtful, and intellectually curious—a self-starter who values continuous improvement and collaboration.Why Join Us?-Be a part of an exciting growth journey at a dynamic company that is in growth mode ourselves.-Work with a talented, passionate, and collaborative team.-Enjoy opportunities for professional growth, creativity, and autonomy.To apply, fill out the form below. About the roleWe're going to offer a strong starting salary with a monthly bonus plan. Benefits are included.Base Compensation: to USD or local currency equivalent based on experience in this type of role. Bonus: Profit share to be reviewed as part of job offer. We're profitable and growing, and profit share potential is high.Potential for equity in the company will be considered after an initial evaluation period. #growth #minded #director #lifecycle #marketing
    WEWORKREMOTELY.COM
    Growth Minded: Director of Lifecycle Marketing & Growth Strategy
    OverviewBacked by Craig Zingerline, Growth Minded is a boutique micro-agency focused on helping early stage through growth startups grow. We're looking for a Director of Lifecycle Marketing & Growth Strategy to help us increase our client engagement capacity, as well as work on internal projects. To learn more about Craig, please visit his Growth Mentor profile, or check him out on LinkedIn.What we doClients hire us to help them find, convert, and retain customers. We work from high level strategy down into channel level tactics, and every layer in-between. As a company and team we care deeply about solving the challenging problems our customers face, and typically own major components of the marketing side of their business. We focus first on growth strategy development, then deliver tactics through a thoughtful, experiment driven approach. Our customers trust us with their business - and we take our work seriously.The roleWe are looking for a talented growth marketing with deep experience running lifecycle marketing programs and building growth strategies. Our ideal candidate has a blend of in-house client-side experience plus agency experience, but candidates with strong lifecycle marketing and growth strategy chops will be considered regardless of exact background. We care deeply about partnering with hardworking, thoughtful, and intellectually curious individuals who are strong lifecycle marketing experts, have world class growth strategy chops, are talented at writing and content framework development, are strategic thinkers, and who have the ability to go deep into the weeds, helping execute campaigns for our clients.Strong client facing skills are a must - you must present well, be able to take feedback and think on the fly, and bring thoughtful, actionable work to the company each day.Job OverviewAs the Director of Lifecycle Marketing & Growth Strategy, you will own the growth strategy and execution of lifecycle marketing campaigns across various channels, focusing on customer acquisition, activation, retention, and monetization. You will work closely with client product, marketing, sales, and analytics teams to drive user growth, create scalable strategies, and optimize conversion pathways to help our clients achieve and exceed their growth goals.Key Responsibilities- Develop comprehensive lifecycle marketing strategies for clients- Lead client relationship management, serving as the primary strategic point of contact- Design and optimize multi-channel customer journeys to maximize engagement, conversion, and retention- Analyze customer data to identify segmentation opportunities and personalization strategies- Write, design and implement email marketing campaigns- Oversee push notification, SMS, and in-app messaging strategies- Implement automated flows with sophisticated triggers- Monitor campaign performance, conduct A/B testing, and provide data-driven recommendations- Set up reports and dashboard on performance- Monitor and identify deliverability issues, as well as implement both technical and content steps to improve deliverability- Build strategies around list cleaning and list hygiene- Ideate and implement ideas on list growth- Present campaign results and strategic insights to clients with clear ROI measurements- Stay current with industry trends and emerging technologies in lifecycle marketing- Develop client proposals and participate in new business pitchesData-Driven Decision Making:- Analyze data to understand the effectiveness of growth initiatives, measure KPIs, and make informed decisions.- Use customer segmentation and cohort analysis to uncover opportunities to increase user engagement and LTV.Nice to have's include:- Deep understanding and audit of the client’s current state of growth.- Design and execute growth strategies that cover the entire customer lifecycle, including acquisition, conversion, retention, and expansion.- Identify new growth opportunities for our clients through data analysis, customer insights, and market research.- Rank the opportunities and present evidence as to the order in which execution of the strategy should follow.- Lead A/B testing initiatives and growth experiments to improve customer acquisition and conversion rates.- Develop an experimentation framework to quickly validate ideas and scale winning initiatives.Collaboration and Leadership- Collaborate with both internal and client teams across marketing, product, and sales to ensure alignment in growth efforts.- Act as an owner within our small company, doing what it takes to help our clients succeed.-Ability to diplomatically assess tradeoffs between competing objectives.Requirements-Proven experience in a growth role, preferably at a startup or fast-paced environment within an agency.-Strong understanding of growth metrics and KPIs, including CAC, LTV, churn, and conversion rates.-Deep experience with lifecycle marketing (email, sms, push)-Deep experience with one or more of the following platforms: Kit, Hubspot, Salesforce, Klaviyo, Iterable, Customer.io, Google Tag Manager, Google Analytics, etc.- STRONG copywriting and content skills. Almost everything we do requires great content. We have an in-house editor that you can leverage but you'll need to be leading efforts on content for multiple clients. - Deep interest and/or experience in leveraging AI tools to boost your productivity. We are a high output company even though we're small in size. We prefer candidates who are already deeply leveraging AI, but at a minimum, you should have the desire to learn new tools to increase your productivity. -Strong ability to learn as you go.-Ability to manage multiple projects and priorities in a fast-paced environment.-Analytical mindset with strong experience using data to drive decision-making.-Hands-on experience with marketing tools and analytics platforms (e.g., Google Analytics, HubSpot, Mixpanel).-Excellent communication skills and the ability to work cross-functionally.-Passionate about user experience, data-driven decision making, and continual learning.-Hardworking, thoughtful, and intellectually curious—a self-starter who values continuous improvement and collaboration.Why Join Us?-Be a part of an exciting growth journey at a dynamic company that is in growth mode ourselves.-Work with a talented, passionate, and collaborative team.-Enjoy opportunities for professional growth, creativity, and autonomy.To apply, fill out the form below. About the roleWe're going to offer a strong starting salary with a monthly bonus plan. Benefits are included.Base Compensation: $85,000 to $100,000 USD or local currency equivalent based on experience in this type of role. Bonus: Profit share to be reviewed as part of job offer. We're profitable and growing, and profit share potential is high.Potential for equity in the company will be considered after an initial evaluation period.
    0 Commentarii 0 Distribuiri
Sponsorizeaza Paginile