Normal view

Received today — 14 February 2026

Andrew aide advised Epstein to omit conviction on China visa form, files suggest

14 February 2026 at 02:00

Epstein files release shows David Stern advised against mentioning ‘being denied previously or criminal charges’

An aide to Andrew Mountbatten-Windsor advised Jeffrey Epstein to illegally hide his child sexual abuse conviction to obtain a visa to China, according to the latest Epstein files release.

David Stern, who was a close associate of both Epstein and the then prince, was asked for his help after the disgraced financier’s initial application for a visa was rejected.

Continue reading...

© Photograph: US Department of Justice

© Photograph: US Department of Justice

© Photograph: US Department of Justice

Received yesterday — 13 February 2026

Beijing pastry shop overrun by shoppers after Xi Jinping’s visit

13 February 2026 at 10:17

Customers flock to Daoxiangcun to pick up cakes selected by the president during lunar new year tour around city

A Beijing pastry shop visited by the Chinese president, Xi Jinping, on a lunar new year tour this week has been swarmed by customers hoping to get their hands on Xi-approved sweet treats.

Traffic was brought to a standstill in Beijing’s capital as the president took a tour around the city on Monday and Tuesday.

Continue reading...

© Photograph: Xinhua/Xinhua/Alamy Live

© Photograph: Xinhua/Xinhua/Alamy Live

© Photograph: Xinhua/Xinhua/Alamy Live

University expels student who called for accountability over Hong Kong fire

13 February 2026 at 12:58

Discipline committee decides to terminate Miles Kwan from studies because of ‘multiple acts of misconduct’

A Hong Kong university student who had called for accountability over a deadly fire at an apartment complex in the city has been expelled by the school for disciplinary offences.

Miles Kwan, a politics student, was detained for two nights by the city’s national security police last year for “seditious intent” after handing out flyers calling for an independent investigation into a fire that killed 168 people in November.

Continue reading...

© Photograph: Lam Yik/Reuters

© Photograph: Lam Yik/Reuters

© Photograph: Lam Yik/Reuters

CIA publishes recruitment video aimed at disaffected Chinese soldiers

Army in turmoil after Xi Jinping placed top general under investigation for suspected corruption last month

The CIA (the US’s Central Intelligence Agency) has published a Mandarin-language recruitment video aimed at Chinese soldiers, in an apparent attempt to capitalise on the recent instability in the People’s Liberation Army (PLA) after a series of high-level purges.

The video, published on the CIA’s YouTube channel on Thursday, is titled The Reason for Stepping Forward: To Save the Future.

Continue reading...

© Photograph: Andre M Chang/ZUMA Press Wire/Shutterstock

© Photograph: Andre M Chang/ZUMA Press Wire/Shutterstock

© Photograph: Andre M Chang/ZUMA Press Wire/Shutterstock

These charts show how Trump is isolating the US on the world stage

13 February 2026 at 02:00

Analysis shows that the world is moving closer to China, as Trump’s isolationism rears its head at the United Nations

Donald Trump’s return to the White House has accelerated a profound shift in the global order, according to new analysis.

A report from Focaldata, which analyses UN voting records, reveals how Washington’s “America First” agenda has started to redraw the geopolitical map in favour of China.

Continue reading...

© Composite: Prina Shah for the Guardian / Reuters / AFP/Getty Images

© Composite: Prina Shah for the Guardian / Reuters / AFP/Getty Images

© Composite: Prina Shah for the Guardian / Reuters / AFP/Getty Images

Japan seizes Chinese fishing boat inside its economic waters amid rift with Beijing

12 February 2026 at 23:19

Japan’s fisheries agency said the vessel failed to comply with an order to stop. The incident comes weeks after a row between China and Japan over Taiwan

Authorities in Japan have seized a Chinese fishing boat and arrested its captain in a move that is likely to inflame an ongoing diplomatic row between Tokyo and Beijing.

The seizure, which occurred on Thursday about 170km from the south-western port city of Nagasaki, came after the skipper refused an order to stop for an onboard inspection, according to media reports.

Continue reading...

© Photograph: Aspere/Wiki Commons

© Photograph: Aspere/Wiki Commons

© Photograph: Aspere/Wiki Commons

Received before yesterday

Palo Alto Chose Not To Tie China To Hacking Campaign For Fear of Retaliation From Beijing

12 February 2026 at 14:10
An anonymous reader shares a report: Palo Alto Networks opted not to tie China to a global cyberespionage campaign the firm exposed last week over concerns that the cybersecurity company or its clients could face retaliation from Beijing, according to two people familiar with the matter. The sources said that Palo Alto's findings that China was tied to the sprawling hacking spree were dialed back following last month's news, first reported by Reuters, that Palo Alto was one of about 15 U.S. and Israeli cybersecurity companies whose software had been banned by Chinese authorities on national security grounds. A draft version of the report by Palo Alto's Unit 42, the company's threat intelligence arm, said that the prolific hackers -- dubbed "TGR-STA-1030" in a report published on Thursday of last week -- were connected to Beijing, the two people said. The finished report instead described the hacking group more vaguely as a "state-aligned group that operates out of Asia." Attributing sophisticated hacks is notoriously difficult and debates over how best to assign blame for digital intrusions are common among cybersecurity researchers.

Read more of this story at Slashdot.

China’s Yangtze River shows signs of remarkable recovery after fishing ban

12 February 2026 at 14:00

Doubling of fish biomass and rebounding of endangered species shows government measures starting to work, biologists say

The Yangtze River in China, which has been in ecological decline for 70 years, is showing signs of recovery thanks to a sweeping fishing ban.

The ban was made more effective by the implementation of “evolutionary game theory”, which included finding alternative employment for fishers.

Continue reading...

© Photograph: Alex Plavevski/EPA

© Photograph: Alex Plavevski/EPA

© Photograph: Alex Plavevski/EPA

China showcases new Moon ship and reusable rocket in one extraordinary test

11 February 2026 at 14:35

China's space program, striving to land astronauts on the Moon by 2030, carried out a test flight of a new reusable booster and crew capsule late Tuesday (US time), and the results were spectacular.

The demonstration "marks a significant breakthrough in the development of [China's] manned lunar exploration program," the China Manned Space Agency (CMSA) said in a statement. China and the United States are racing to accomplish the next human landing on the Moon in a competition for national prestige and lunar resources. The Long March 10 rocket and Mengzhou spacecraft, both tested Tuesday, are core elements of China's lunar architecture.

The launch of a subscale version of the Long March 10 rocket, still in development, provided engineers with an opportunity to verify the performance of an important part of the new Mengzhou capsule's safety system. The test began with liftoff of the Long March 10 booster from a new launch pad at Wenchang Space Launch Site on Hainan Island, China's southernmost province, at 10 pm EST Tuesday (03:00 UTC or 11 am Beijing time Wednesday).

Read full article

Comments

© VCG/VCG via Getty Images

ByteDance Suspends Seedance 2 Feature That Turns Facial Photos Into Personal Voices Over Potential Risks

10 February 2026 at 20:45
hackingbear writes: China's Bytedance has released Seedance 2.0, an AI video generator which handles up to four types of input at once: images, videos, audio, and text. Users can combine up to nine images, three videos, and three audio files, up to a total of twelve files. Generated videos run between 4 and 15 [or 60] seconds long and automatically come with sound effects or music. Its performance is unfortunately so good that it has forced the firm to block its facial-to-voice feature after the model reportedly demonstrated the ability to generate highly accurate personal voice characteristics using only facial images, even without user authorization. In a recent test, Pan Tianhong, founder of tech media outlet MediaStorm, discovered that uploading a personal facial photo caused the model to produce audio nearly identical to his real voice -- without using any voice samples or authorized data. [...]

Read more of this story at Slashdot.

Newly Unbound, Trump Weighs More Nuclear Arms and Underground Tests

It remains to be seen whether the three big nuclear powers are headed into a new arms race, or whether President Trump is trying to spur negotiations on a new accord now that a last Cold War treaty has expired.

© U.S. Atomic Energy Commission, via Associated Press

An underground atomic test at the Nevada Test Site near Yucca Flats in 1955. The last U.S. explosive test of a nuclear weapon was in 1992.

Why Is China Building So Many Coal Plants Despite Its Solar and Wind Boom?

8 February 2026 at 12:34
Long-time Slashdot reader schwit1 shared this article from the Associated Press: Even as China's expansion of solar and wind power raced ahead in 2025, the Asian giant opened many more coal power plants than it had in recent years — raising concern about whether the world's largest emitter will reduce carbon emissions enough to limit climate change. More than 50 large coal units — individual boiler and turbine sets with generating capacity of 1 gigawatt or more — were commissioned in 2025, up from fewer than 20 a year over the previous decade, a research report released Tuesday said. Depending on energy use, 1 gigawatt can power from several hundred thousand to more than 2 million homes. Overall, China brought 78 gigawatts of new coal power capacity online, a sharp uptick from previous years, according to the joint report by the Centre for Research on Energy and Clean Air, which studies air pollution and its impacts, and Global Energy Monitor, which develops databases tracking energy trends. "The scale of the buildout is staggering," said report co-author Christine Shearer of Global Energy Monitor. "In 2025 alone, China commissioned more coal power capacity than India did over the entire past decade." At the same time, even larger additions of wind and solar capacity nudged down the share of coal in total power generation last year. Power from coal fell about 1% as growth in cleaner energy sources covered all the increase in electricity demand last year. China added 315 gigawatts of solar capacity and 119 gigawatts of wind in 2025, according to statistics from the government's National Energy Administration... The government position is that coal provides a stable backup to sources such as wind and solar, which are affected by weather and the time of day. The shortages in 2022 resulted partly from a drought that hit hydropower, a major energy source in western China... The risk of building so much coal-fired capacity is it could delay the transition to cleaner energy sources [said Qi Qin, an analyst at the Centre for Research on Energy and Clean Air and another co-author of the report]... Political and financial pressure may keep plants operating, leaving less room for other sources of power, she said. The report urged China to accelerate retirement of aging and inefficient coal plants and commit in its next five-year plan, which will be approved in March, to ensuring that power-sector emissions do not increase between 2025 and 2030.

Read more of this story at Slashdot.

Hidden Cameras in Chinese Hotels Are Livestreaming Guests To Thousands of Telegram Subscribers

6 February 2026 at 14:40
An investigation has uncovered a sprawling network of hidden cameras in Chinese hotel rooms that livestream guests -- including couples having sex -- to paying subscribers on Telegram. Over 18 months, the BBC identified six websites and apps on the messaging platform that claimed to operate more than 180 spy cams across Chinese hotels, not just recording but broadcasting live. One site, monitored for seven months, cycled through 54 different cameras, roughly half active at any given time. Subscribers pay 450 yuan (~$65) per month for access to multiple live feeds, archived clips, and a library of more than 6,000 edited videos dating back to 2017. The BBC traced one camera to a hotel room in Zhengzhou, where researchers found it hidden inside a wall ventilation unit and hardwired into the building's electricity supply. A commercially available hidden-camera detector failed to flag it. China introduced regulations last April requiring hotel owners to check for hidden cameras, but the BBC found the livestreaming sites still operational.

Read more of this story at Slashdot.

Rocket Report: SpaceX probes upper stage malfunction; Starship testing resumes

6 February 2026 at 07:00

Welcome to Edition 8.28 of the Rocket Report! The big news in rocketry this week was that NASA still hasn't solved the problem with hydrogen leaks on the Space Launch System. The problem caused months of delays before the first SLS launch in 2022, and the fuel leaks cropped up again Monday during a fueling test on NASA's second SLS rocket. It is a continuing problem, and NASA's sparse SLS launch rate makes every countdown an experiment, as my colleague Eric Berger wrote this week. NASA will conduct another fueling test in the coming weeks after troubleshooting the rocket's leaky fueling line, but the launch of the Artemis II mission is off until March.

As always, we welcome reader submissions. If you don't want to miss an issue, please subscribe using the box below (the form will not appear on AMP-enabled versions of the site). Each report will include information on small-, medium-, and heavy-lift rockets, as well as a quick look ahead at the next three launches on the calendar.

Blue Origin "pauses" New Shepard flights. Blue Origin has "paused" its New Shepard program for the next two years, a move that likely signals a permanent end to the suborbital space tourism initiative, Ars reports. The small rocket and capsule have been flying since April 2015 and have combined to make 38 launches, all but one of which were successful, and 36 landings. In its existence, the New Shepard program flew 98 people to space, however briefly, and launched more than 200 scientific and research payloads into the microgravity environment.

Read full article

Comments

© SpaceX

Backdoor in Notepad++

5 February 2026 at 07:00

Hackers associated with the Chinese government used a Trojaned version of Notepad++ to deliver malware to selected users.

Notepad++ said that officials with the unnamed provider hosting the update infrastructure consulted with incident responders and found that it remained compromised until September 2. Even then, the attackers maintained credentials to the internal services until December 2, a capability that allowed them to continue redirecting selected update traffic to malicious servers. The threat actor “specifically targeted Notepad++ domain with the goal of exploiting insufficient update verification controls that existed in older versions of Notepad++.” Event logs indicate that the hackers tried to re-exploit one of the weaknesses after it was fixed but that the attempt failed.

Make sure you’re running at least version 8.9.1.

China Has Seized Sony's Television Halo

5 February 2026 at 05:30
Sony announced last month that it plans to pass control of its home entertainment division -- including the two-decade-old Bravia television brand -- to Chinese electronics group TCL through a joint venture in which TCL would hold a 51% stake. The Japanese company was long ago overtaken in sales by South Korea's Samsung and LG and now holds just 2% of the global television market. Sony stopped making its own LCD screens in 2011. Chinese companies supplied 71% of television panels made in Asia last year, according to TCL, and less than 10% are now produced in Japan and Korea. TCL is close to overtaking Samsung as the world's largest television maker. Sony retains valuable intellectual property in image rendering, and the Bravia brand still carries consumer recognition, but its OLED screens are already supplied by Samsung and LG. The company has been shifting toward premium cameras, professional audio, and its entertainment businesses in film, music, and games -- areas where intellectual property is less exposed to Chinese manufacturing scale.

Read more of this story at Slashdot.

Trump Unveils $12 Billion Critical Minerals Stockpile

2 February 2026 at 19:57
The “Project Vault” initiative is intended to reduce U.S. reliance on China for key technology components.

© Steve Marcus/Reuters

A rare earth mine in Mountain Pass, Calif. The United States is working to develop its own supply chain for critical minerals.

Hidden Car Door Handles Are Officially Being Banned In China

3 February 2026 at 02:01
sinij writes: Automakers have increasingly implemented door handles that retract into the bodywork for aerodynamic reasons, but they are now off limits in China. My issue is with electronic-only door latch mechanism. It should be possible to open the door from both inside and outside the car in case of complete power loss.

Read more of this story at Slashdot.

Move Fast, but Obey the Rules: China’s Vision for Dominating A.I.

2 February 2026 at 02:30
Beijing wants to lead the world in developing cutting-edge artificial intelligence, but it also wants companies to adhere to an increasingly complex set of rules.

© Tommy Wang/Agence France-Presse — Getty Images

Executives at Zhipu AI, one of China’s most promising A.I. start-ups, alongside others, at a launch event at the Hong Kong Stock Exchange last month.

Report: China approves import of high-end Nvidia AI chips after weeks of uncertainty

28 January 2026 at 12:21

On Wednesday, China approved imports of Nvidia's H200 artificial intelligence chips for three of its largest technology companies, Reuters reported. ByteDance, Alibaba, and Tencent received approval to purchase more than 400,000 H200 chips in total, marking a shift in Beijing's stance after weeks of holding up shipments despite US export clearance.

The move follows Beijing's temporary halt to H200 shipments earlier this month after Washington cleared exports on January 13. Chinese customs authorities had told agents that the H200 chips were not permitted to enter China, Reuters reported earlier this month, even as Chinese technology companies placed orders for more than two million of the chips.

The H200, Nvidia's second most powerful AI chip after the B200, delivers roughly six times the performance of the company's H20 chip, which was previously the most capable chip Nvidia could sell to China. While Chinese companies such as Huawei now have products that rival the H20's performance, they still lag far behind the H200.

Read full article

Comments

© Wong Yu Liang via Getty Images

U.S. Automakers’ Foreign Troubles Now Extend to Canada

24 January 2026 at 05:01
U.S. trade policy has devastated the Canadian auto industry and pushed the country to reach an agreement that will make it easier for Chinese companies to sell cars there.

© Chang W. Lee/The New York Times

Canada could serve as an important test market for Chinese automakers, like Geely, which is producing vehicles at a plant in Hangzhou, China.

EU to Phase Out ‘High-risk’ Mobile and Telecom Network Products

21 January 2026 at 15:52

EU to Phase Out ‘High-risk’ Mobile and Telecom Network Products

The European Commission has proposed a new cybersecurity legislative package that proponents say will strengthen the security of the EU's Information and Communication Technologies (ICT) supply chains by phasing out “high-risk” mobile and telecom network products from countries deemed to be risky. In a statement, the Commission said the revised Cybersecurity Act “will enable the mandatory derisking of European mobile telecommunications networks from high-risk third-country suppliers, building on the work already carried out under the 5G security toolbox.” The legislation refers to networks more broadly: “ICT components or components that include ICT components provided by high-risk suppliers shall be phased out from the key ICT assets of mobile, fixed and satellite electronic communication networks.” Mobile networks would have 36 months to comply with the legislation. Transition periods for fixed and satellite electronic communications networks will be specified by the Commission through implementing acts.

Russia, China May Be Among ‘High-risk’ Telecom Network Suppliers

The legislation is short on specifics, leaving much of the details to be worked out after passage, but it appears that telecom network suppliers from Russia and China may be targeted under the legislation and implementing regulations. At one point the legislation cites a 2023 European Parliament resolution on foreign interference in democratic processes. The legislation states: “The European Parliament called on the Commission to develop binding ICT supply chain security legislation that addresses non-technical risk and to ‘exclude the use of equipment and software from manufacturers based in high-risk countries, particularly China and Russia’. Members of the European Parliament also called for urgent action to secure telecommunications infrastructure against undue foreign influence and security risks.” China’s foreign ministry and Huawei have already criticized the legislation, which would formalize a process under way since 2020 to remove network equipment perceived as high-risk. "A legislative proposal to limit or exclude non-EU suppliers based on country of origin, rather than factual evidence and technical standards, violates the EU's basic legal principles of fairness, non-discrimination, and proportionality, as well as its WTO obligations," a Huawei spokesperson was quoted by Reuters as saying. The legislation will apply to 18 critical sectors, which Reuters said will include detection equipment, connected and automated vehicles, electricity supply and storage systems, water supply systems, and drones and counter‑drone systems. Cloud services, medical devices, surveillance equipment, space services and semiconductors would also be affected.

The EU’s 'Secure by Design' Certification Process

The legislative package and revised Cybersecurity Act is aimed at ensuring “that products reaching EU citizens are cyber-secure by design through a simpler certification process,” the Commission’s statement said. The legislation also bolsters the EU Agency for Cybersecurity (ENISA) in its role in managing cybersecurity threats and certification processes. “The new Cybersecurity Act aims to reduce risks in the EU's ICT supply chain from third-country suppliers with cybersecurity concerns,” the Commission said. “It sets out a trusted ICT supply chain security framework based on a harmonised, proportionate and risk-based approach. This will enable the EU and Member States to jointly identify and mitigate risks across the EU's 18 critical sectors, considering also economic impacts and market supply.” The Act will ensure “that products and services reaching EU consumers are tested for security in a more efficient way,” the Commission stated. That will be accomplished through an updated European Cybersecurity Certification Framework (ECCF), which “will bring more clarity and simpler procedures, allowing certification schemes to be developed within 12 months by default.” Certification schemes managed by ENISA “will become a practical, voluntary tool for businesses.” In addition to ICT products, services, processes and managed security services, companies and organizations “will be able to certify their cyber posture to meet market needs. Ultimately, the renewed ECCF will be a competitive asset for EU businesses. For EU citizens, businesses and public authorities, it will ensure a high level of security and trust in complex ICT supply chains,” the Commission stated. The legislative package also includes amendments to the NIS2 Directive “to increase legal clarity,” and also aims to lower compliance costs for 28,700 companies in keeping with the Digital Omnibus process. Amendments will “simplify jurisdictional rules, streamline the collection of data on ransomware attacks and facilitate the supervision of cross-border entities with ENISA's reenforced coordinating role.” The Cybersecurity Act will become effective after approval by the European Parliament and the Council of the EU, while Member States will have one year to implement NIS2 Directive amendments after adoption.

Trump Imposes Limited Tariffs on Foreign Semiconductors

14 January 2026 at 21:06
The tariffs will allow President Trump to take a cut of Nvidia’s chip sales to China while putting off a decision about imposing higher taxes on the chip industry.

© Jim Wilson/The New York Times

Much of the chip industry relies on materials from overseas.

China’s ‘Dr. Frankenstein’ Thinks Time Is on His Side

13 January 2026 at 18:20
He Jiankui spent three years in prison after creating gene-edited babies. Now back at work, he sees a greater opening for researchers who push boundaries.

© Chang W. Lee/The New York Times

He Jiankui, a researcher in gene editing, at his home in Beijing. He argues that his only crime was being ahead of his time in a world not yet ready for his vision.

China Is Investigating Meta’s Acquisition of the AI Start-Ip Manus

Regulators said they would look at whether the deal for Manus, a Singapore start-up with Chinese roots, complied with China’s export and investment rules.

© Jason Henry for The New York Times

Meta’s deal for Manus last month capped a year of extravagant spending by the American company on elite artificial intelligence researchers.

Telegram Hosting World’s Largest Darknet Market

5 January 2026 at 07:01

Wired is reporting on Chinese darknet markets on Telegram.

The ecosystem of marketplaces for Chinese-speaking crypto scammers hosted on the messaging service Telegram have now grown to be bigger than ever before, according to a new analysis from the crypto tracing firm Elliptic. Despite a brief drop after Telegram banned two of the biggest such markets in early 2025, the two current top markets, known as Tudou Guarantee and Xinbi Guarantee, are together enabling close to $2 billion a month in money-laundering transactions, sales of scam tools like stolen data, fake investment websites, and AI deepfake tools, as well as other black market services as varied as pregnancy surrogacy and teen prostitution.

The crypto romance and investment scams regrettably known as “pig butchering”—carried out largely from compounds in Southeast Asia staffed with thousands of human trafficking victims—have grown to become the world’s most lucrative form of cybercrime. They pull in around $10 billion annually from US victims alone, according to the FBI. By selling money-laundering services and other scam-related offerings to those operations, markets like Tudou Guarantee and Xinbi Guarantee have grown in parallel to an immense scale.

Meet a U.S. Start-Up Trying to Break China’s Rare-Earth Monopoly

29 December 2025 at 05:00
Companies like Phoenix Tailings, which recently began producing metal in New Hampshire, are using new processing methods to compete with Chinese suppliers.

© Tony Luong for The New York Times

Phoenix Tailings runs a metal-making plant in Exeter, N.H.

Kuaishou Cyberattack Disrupts Livestreaming, Triggers Sharp Stock Decline

23 December 2025 at 02:06

Kuaishou cyberattack

Chinese short-video platform Kuaishou Technology saw its shares fall sharply after the company confirmed a cyberattack that briefly disrupted its livestreaming services, exposed users to inappropriate content, and rattled investor confidence. The Kuaishou cyberattack, which occurred late on Monday night, triggered the stock’s steepest single-day decline in more than two months and pushed it to its lowest level since late November.  Shares of Hong Kong-listed Kuaishou Technology (HK:1024) fell by as much as 6% on Tuesday, dropping to HK$62.70 (approximately $8.06). This marked the company’s lowest share price since November 21 and represented its largest one-day percentage decline since October 14. The stock also emerged as the biggest decliner on the Hang Seng Tech Index, which itself fell about 0.5% on the day.  Market reaction followed confirmation of a cyberattack on Kuaishou that disrupted its livestreaming function. As one of China’s largest short-video platforms and a close competitor to Douyin, the Chinese version of TikTok, Kuaishou’s performance is closely watched by investors. The sudden service disruption and reports of exposed content raised concerns about platform security and operational resilience. 

Kuaishou Cyberattack Timeline

According to a company announcement issued on December 23, 2025, the Kuaishou cyberattack occurred at around 10:00 p.m. local time (14:00 GMT) on December 22, 2025. Cyberthreat actors targeted the live-streaming function of the Kuaishou app, temporarily interrupting services and exposing users to content described by some users as explicit and violent. Several reports characterized the incident as “unprecedented” for the platform.  Kuaishou stated that it activated its emergency response plan immediately after detecting the cyberattack on Kuaishou. Following system repairs and restoration efforts, livestreaming services gradually resumed normal operations. The company noted that other services on the Kuaishou app were not affected by the incident, although some livestreaming functions continued to experience limited disruption during the recovery phase. 

Company Response and Legal Actions 

In its press release, Kuaishou Technology said it had reported the incident to the police and relevant authorities and was pursuing further legal remedies. The company stated that it strongly condemns illegal and criminal activities linked to underground and gray industries and reiterated its opposition to any form of unlawful or harmful content.  Kuaishou also said it remains committed to operating in compliance with applicable laws and regulations and to safeguarding the interests of the company and its shareholders. While livestreaming services have largely returned to normal, the cyberattack on Kuaishou highlighted the operational and reputational risks associated with large-scale social and live-commerce platforms. 

Broader Security Concerns and Prior Data Leak Claims 

The recent cyberattack on Kuaishou has drawn renewed attention to earlier cybersecurity allegations involving the platform. In September, a threat actor on a known cybercrime forum claimed to have leaked order data allegedly stolen from Kuaishou. According to that claim, an attacker compromised a live broadcast room and used the access to place around 10,000 fraudulent orders for non-refundable virtual goods.  The data allegedly leaked included usernames, phone numbers, addresses, and order details of affected users. If accurate, the incident would represent a multi-layered security breach involving unauthorized access, financial fraud, and the exposure of personally identifiable information 

Implications for Platform Security 

The December livestreaming Kuaishou cyberattack shows how attacks on social video and live-commerce platforms can quickly extend beyond service disruption to include content abuse, fraud, and potential data exposure, with immediate financial and regulatory impact.   As Kuaishou works to restore stability and address security gaps, the incident stresses the need for early threat detection, rapid investigation, and continuous monitoring of underground activity. Cyble supports this need through AI-powered threat intelligence that tracks dark web and cybercrime signals, correlates indicators of compromise, and enables faster response. Security teams can assess their exposure and book a personalized demo to better anticipate and mitigate similar attacks. 

Chinese Surveillance and AI

16 December 2025 at 07:02

New report: “The Party’s AI: How China’s New AI Systems are Reshaping Human Rights.” From a summary article:

China is already the world’s largest exporter of AI powered surveillance technology; new surveillance technologies and platforms developed in China are also not likely to simply stay there. By exposing the full scope of China’s AI driven control apparatus, this report presents clear, evidence based insights for policymakers, civil society, the media and technology companies seeking to counter the rise of AI enabled repression and human rights violations, and China’s growing efforts to project that repression beyond its borders.

The report focuses on four areas where the CCP has expanded its use of advanced AI systems most rapidly between 2023 and 2025: multimodal censorship of politically sensitive images; AI’s integration into the criminal justice pipeline; the industrialisation of online information control; and the use of AI enabled platforms by Chinese companies operating abroad. Examined together, those cases show how new AI capabilities are being embedded across domains that strengthen the CCP’s ability to shape information, behaviour and economic outcomes at home and overseas.

Because China’s AI ecosystem is evolving rapidly and unevenly across sectors, we have focused on domains where significant changes took place between 2023 and 2025, where new evidence became available, or where human rights risks accelerated. Those areas do not represent the full range of AI applications in China but are the most revealing of how the CCP is integrating AI technologies into its political control apparatus.

News article.

Ford Will Take $19.5 Billion Hit as It Rolls Back E.V. Plans

15 December 2025 at 18:10
Ford Motor said the costs came from its decision to make fewer electric vehicles than it had planned and more hybrids that use both gasoline engines and batteries.

© Brittany Greeson for The New York Times

A Ford F-150 Lightning electric truck at the company’s plant in Dearborn, Mich., in 2022. The Lightning will no longer be a pure electric vehicle.

Australia Kicks Kids Off Social Media + Is the A.I. Water Issue Fake? + Hard Fork Wrapped

“I’m told that Australian teens, in preparation for this ban, have been exchanging phone numbers with each other.”

© Photo Illustration by The New York Times; Photo: David Gray/Agence France-Presse — Getty Images

China Is Getting Much of What It Wants From the U.S., Including Chips

12 December 2025 at 00:01
For China, President Trump’s moves to loosen chip controls, soften U.S. rhetoric and stay silent on tensions with Japan amount to a rare string of strategic gains.

© Haiyun Jiang/The New York Times

President Trump and Xi Jinping, China’s leader, after their meeting in Busan, South Korea, in October. Mr. Trump’s latest moves extended the conciliatory posture he struck at this summit.

After Australia, Which Countries Could Be Next to Ban Social Media for Children

11 December 2025 at 12:54
Governments are studying the decision to prohibit youths from using platforms like Facebook and TikTok as worries grow about the potential harm they cause.

© Ida Marie Odgaard/Ritzau Scanpix, via Agence France-Presse — Getty Images

Elementary school children in Denmark, which could become the first country in the European Union to impose an age limit on access to social media.

Ford’s Car of the Future, Hatched in a Skunk Works Near Los Angeles

11 December 2025 at 14:25
Desperate to catch up with Chinese automakers, Ford is redesigning its fleet with a Silicon Valley-style team. Is it too late?

© Emily Elconin for The New York Times

Doug Field, Ford Motor Company’s chief of electric vehicles, digital and design.

‘React2Shell’ Flaw Exploited by China-Nexus Groups Within Hours of Disclosure, AWS Warns

5 December 2025 at 06:14

React2Shell, China

The cycle of vulnerability disclosure and weaponization has shattered records once again. According to a new threat intel from Amazon Web Services (AWS), state-sponsored hacking groups linked to China began actively exploiting a critical vulnerability nicknamed "React2Shell," in popular web development frameworks mere hours after its public release.

The React2Shell vulnerability, tracked as CVE-2025-55182, affects React Server Components in React 19.x and Next.js versions 15.x and 16.x when using the App Router. The flaw carries the maximum severity score of 10.0 on the CVSS scale, enabling unauthenticated remote code execution (RCE).

The Rapid Weaponization Race

The vulnerability was publicly disclosed on Wednesday, December 3. AWS threat intelligence teams, monitoring their MadPot honeypot infrastructure, detected exploitation attempts almost immediately.

The threat actors identified in the flurry of activity are linked to known China state-nexus cyber espionage groups, including:

  • Earth Lamia: Known for targeting financial services, logistics, and government organizations across Latin America, the Middle East, and Southeast Asia.

  • Jackpot Panda: A group typically focused on East and Southeast Asian entities, often aligned with domestic security interests.

"China continues to be the most prolific source of state-sponsored cyber threat activity, with threat actors routinely operationalizing public exploits within hours or days of disclosure," stated an AWS Security Blog post announcing the findings.

The speed of operation showcased how the window between public disclosure and active attack is now measured in minutes, not days.

Also read: China-linked RedNovember Campaign Shows Importance of Patching Edge Devices

Hacker's New Strategy of Speed Over Precision

The AWS analysis also revealed a crucial insight into modern state-nexus tactics that threat groups are prioritizing volume and speed over technical accuracy.

Investigators observed that many attackers were attempting to use readily available, but often flawed, public Proof-of-Concept (PoC) exploits pulled from the GitHub security community. These PoCs frequently demonstrated fundamental technical misunderstandings of the flaw.

Despite the technical inadequacy, threat actors are aggressively throwing these PoCs at thousands of targets in a "volume-based approach," hoping to catch the small percentage of vulnerable configurations. This generates significant noise in logs but successfully maximizes their chances of finding an exploitable weak link.

Furthermore, attackers were not limiting their focus, simultaneously attempting to exploit other recent vulnerabilities, demonstrating a systematic, multi-pronged campaign to compromise targets as quickly as possible.

Call for Patching

While AWS has deployed automated protections for its managed services and customers using AWS WAF, the company is issuing an urgent warning to any entity running React or Next.js applications in their own environments (such as Amazon EC2 or containers).

The primary mitigation remains immediate patching.

"These protections aren't substitutes for patching," AWS warned. Developers must consult the official React and Next.js security advisories and update vulnerable applications immediately to prevent state-sponsored groups from gaining RCE access to their environments.

CVE-2025-55182 enables an attacker to achieve unauthenticated Remote Code Execution (RCE) in vulnerable versions of the following packages:
  • react-server-dom-webpack
  • react-server-dom-parcel
  • react-server-dom-turbopack

AWS' findings states a cautious tale that a vulnerability with a CVSS 10.0 rating in today's times becomes a national security emergency the moment it hits the public domain.

CISA Warns PRC Hackers Are Targeting VMware vSphere with BRICKSTORM Malware

4 December 2025 at 15:50

CISA Warns PRC Hackers Are Targeting VMware vSphere with BRICKSTORM Malware

U.S. and Canadian cybersecurity agencies are warning that China-sponsored threat actors are using BRICKSTORM malware to compromise VMware vSphere environments. “Once compromised, the cyber actors can use their access to the vCenter management console to steal cloned virtual machine (VM) snapshots for credential extraction and create hidden, rogue VMs,” CISA, the NSA and the Canadian Centre for Cyber Security warned in the advisory. Attacks have so far primarily targeted the government and IT sectors, the agencies said.

One PRC BRICKSTORM Malware Attack Lasted More Than a Year

CISA – the U.S. Cybersecurity and Infrastructure Security Agency – said it analyzed eight BRICKSTORM samples obtained from victim organizations, including one where CISA conducted an incident response engagement. While the analyzed samples were for VMware vSphere environments, there are also Windows versions of the malware, the agency said. In the incident response case, CISA said threat actors sponsored by the People’s Republic of China (PRC) gained “long-term persistent access” to the organization’s network in April 2024 and uploaded BRICKSTORM malware to a VMware vCenter server. The threat actors also accessed two domain controllers and an Active Directory Federation Services (ADFS) server, successfully compromising the ADFS server and exporting cryptographic keys. The threat actors used BRICKSTORM malware for persistent access “through at least Sept. 3, 2025,” the agency said. BRICKSTORM is an Executable and Linkable Format (ELF) Go-based backdoor. While samples may differ in function, “all enable cyber actors to maintain stealthy access and provide capabilities for initiation, persistence, and secure command and control (C2),” the agencies said. BRICKSTORM can automatically reinstall or restart if disrupted. It uses DNS-over-HTTPS (DoH) and mimics web server functionality “to blend its communications with legitimate traffic." The malware gives threat actors interactive shell access on the system and allows them to “browse, upload, download, create, delete, and manipulate files.” Some of the malware samples act as a SOCKS proxy to facilitate lateral movement and compromise additional systems.

PRC Hackers Got Access via a Web Server

CISA said that in its incident response engagement, the PRC hackers accessed a web server inside the organization’s demilitarized zone (DMZ) on April 11, 2024. The threat actors accessed it through a web shell present on the server. “Incident data does not indicate how they obtained initial access to the web server or when the web shell was implanted,” CISA said. On the same day, the hackers used service account credentials to move laterally using Remote Desktop Protocol (RDP) to a domain controller in the DMZ, where they copied the Active Directory (AD) database (ntds.dit). The following day, the hackers moved laterally from the web server to a domain controller within the internal network using RDP and credentials from a second service account. “It is unknown how they obtained the credentials,” CISA said. The hackers copied the AD database and obtained credentials for a managed service provider (MSP) account. Using the MSP credentials, the hackers moved from the internal domain controller to the VMware vCenter server. From the web server, the PRC hackers also moved laterally using Server Message Block (SMB) to two jump servers and an ADFS server, from which they stole cryptographic keys. After gaining access to vCenter, the hackers elevated privileges using the sudo command, dropped BRICKSTORM malware into the server’s /etc/sysconfig/ directory, and modified the system’s init file in /etc/sysconfig/ to run the malware. The modified init file controls the bootup process on VMware vSphere systems and executes BRICKSTORM, CISA said. The file is typically used to define visual variables for the bootup process. The hackers added an additional line to the script to execute BRICKSTORM from the hard-coded file path /etc/sysconfig/. CISA, NSA, and the Canadian Cyber Centre urged organizations to use the indicators of compromise (IOCs) and detection signatures in their lengthy report to detect BRICKSTORM malware samples. CISA also recommended that organizations block unauthorized DNS-over-HTTPS (DoH) providers and external DoH network traffic; inventory all network edge devices and monitor for suspicious network connectivity, and use network segmentation to restrict network traffic from the DMZ to the internal network.

Huawei and Chinese Surveillance

26 November 2025 at 07:05

This quote is from House of Huawei: The Secret History of China’s Most Powerful Company.

“Long before anyone had heard of Ren Zhengfei or Huawei, Wan Runnan had been China’s star entrepreneur in the 1980s, with his company, the Stone Group, touted as “China’s IBM.” Wan had believed that economic change could lead to political change. He had thrown his support behind the pro-democracy protesters in 1989. As a result, he had to flee to France, with an arrest warrant hanging over his head. He was never able to return home. Now, decades later and in failing health in Paris, Wan recalled something that had happened one day in the late 1980s, when he was still living in Beijing.

Local officials had invited him to dinner.

This was unusual. He was usually the one to invite officials to dine, so as to curry favor with the show of hospitality. Over the meal, the officials told Wan that the Ministry of State Security was going to send agents to work undercover at his company in positions dealing with international relations. The officials cast the move to embed these minders as an act of protection for Wan and the company’s other executives, a security measure that would keep them from stumbling into unseen risks in their dealings with foreigners. “You have a lot of international business, which raises security issues for you. There are situations that you don’t understand,” Wan recalled the officials telling him. “They said, ‘We are sending some people over. You can just treat them like regular employees.'”

Wan said he knew that around this time, state intelligence also contacted other tech companies in Beijing with the same request. He couldn’t say what the situation was for Huawei, which was still a little startup far to the south in Shenzhen, not yet on anyone’s radar. But Wan said he didn’t believe that Huawei would have been able to escape similar demands. “That is a certainty,” he said.

“Telecommunications is an industry that has to do with keeping control of a nation’s lifeline…and actually in any system of communications, there’s a back-end platform that could be used for eavesdropping.”

It was a rare moment of an executive lifting the cone of silence surrounding the MSS’s relationship with China’s high-tech industry. It was rare, in fact, in any country. Around the world, such spying operations rank among governments’ closest-held secrets. When Edward Snowden had exposed the NSA’s operations abroad, he’d ended up in exile in Russia. Wan, too, might have risked arrest had he still been living in China.

Here are two book reviews.

Scam USPS and E-Z Pass Texts and Websites

20 November 2025 at 07:07

Google has filed a complaint in court that details the scam:

In a complaint filed Wednesday, the tech giant accused “a cybercriminal group in China” of selling “phishing for dummies” kits. The kits help unsavvy fraudsters easily “execute a large-scale phishing campaign,” tricking hordes of unsuspecting people into “disclosing sensitive information like passwords, credit card numbers, or banking information, often by impersonating well-known brands, government agencies, or even people the victim knows.”

These branded “Lighthouse” kits offer two versions of software, depending on whether bad actors want to launch SMS and e-commerce scams. “Members may subscribe to weekly, monthly, seasonal, annual, or permanent licenses,” Google alleged. Kits include “hundreds of templates for fake websites, domain set-up tools for those fake websites, and other features designed to dupe victims into believing they are entering sensitive information on a legitimate website.”

Google’s filing said the scams often begin with a text claiming that a toll fee is overdue or a small fee must be paid to redeliver a package. Other times they appear as ads—­sometimes even Google ads, until Google detected and suspended accounts—­luring victims by mimicking popular brands. Anyone who clicks will be redirected to a website to input sensitive information; the sites often claim to accept payments from trusted wallets like Google Pay.

❌