China has moved another step into the future by activating the world’s first 10G broadband network. The milestone occurred in Sunan County, Hebei Province, through a collaboration between tech giant Huawei and the telecom operator China Unicom.
Near-10Gbps Downloads and Ultra-Low Latency Redefine Connectivity
The network’s performance is striking: download speeds reaching 9,834 Mbps, uploads hitting 1,008 Mbps, and latency as low as 3 milliseconds. For comparison, a 20 GB 4K movie that would typically take around 10 minutes to download on a 1 Gbps connection can now be obtained in under 20 seconds.
This breakthrough is powered by 50G PON (Passive Optical Network) technology, which enhances data transmission using the current fiber-optic infrastructure. The advancement paves the way for bandwidth-intensive applications such as:
Quicker, more reliable cloud computing
Richer, more immersive VR and AR environments
Seamless 8K video streaming
Smarter, more connected home ecosystems
China Sets a New Global Benchmark with the Launch of Its 10G Network
China’s rollout of the 10G network demonstrates that it’s not just keeping pace with digital transformation—it’s setting the standard. With this advancement, the country once again places itself at the cutting edge of technological progress, outpacing nations that previously topped internet speed rankings, such as the United Arab Emirates and Qatar.
Curious to witness these developments firsthand and see how China is shaping the future? Join StartSe’s China Immersion program—an international experience that brings you face-to-face with the country’s leading innovations and transformative companies. Learn more about the China Immersion program here.
Hubble Network is set to significantly enhance its satellite-based Bluetooth system. The Seattle startup, aiming to bring Apple’s Find My to enterprises, has built a phased-array receiver for a “true Bluetooth layer around the Earth,” says CEO Alex Haro.
Next-Gen Satellites to Boost Global Coverage and Device Efficiency by 2027
This technology will launch aboard two large MuSat XL satellites from Muon Space, scheduled for 2027. The satellites will provide 12-hour global revisit times and detect BLE signals using 30x less power, extending device battery life.
The pair will serve as the foundation of Hubble’s BLE Finding Network, targeting industries like logistics, infrastructure, and defense.
Hubble made headlines in 2024 as the first company to establish a direct Bluetooth link with a satellite. Its core pitch is simple yet powerful: rather than requiring custom hardware, users can connect to the Hubble network by adding a firmware update to existing chipsets.
Global Coverage Without Infrastructure
The company says its space-based network offers major advantages — global coverage, including remote regions, and an infrastructure-free solution for developers to track assets easily.
Hubble currently operates seven satellites and aims to expand to 60 by 2028. CEO Alex Haro notes that the long-term plan includes upgrading the entire fleet to larger, more capable satellite platforms for enhanced power and performance.
The timeline is ambitious, but Haro said Hubble chose Muon for its rapid manufacturing scalability. A $146M funding boost will support this, with Muon planning to build 500+ satellites annually by 2027.
Hubble will be the first to use Muon’s 500-kg MuSat XL, offering high power, fast downlinks, optical links, and near real-time communication. The deal also reflects Muon’s growing ambitions to secure larger contracts, including from the Department of Defense.
“The XL platform is ideal for SDA Tranche missions,” said Smirin, citing the agency’s missile defense effort in low Earth orbit. “It reflects our advancing tech stack and growing role in delivering versatile spacecraft.”
Muon uses a space-as-a-service model, building and operating satellites with its integrated Halo system. This approach lets companies with innovative payloads access space without building their own satellite infrastructure. This lets Hubble focus on its BLE network while Muon handles satellites and operations.
Warp was established in 2021 with the goal of helping businesses optimize their shipping supply chains and cut expenses by leveraging a technology-driven network of shippers, carriers, and warehouses.
Now, the company aims to enhance supply chain efficiency even more by deploying robots to automate its network of warehouses.
Daniel Sokolovsky, co-founder and CEO of Warp, told TechCrunch that the company is constantly exploring ways to improve shipping efficiency for its clients, which include major players like Walmart, Gopuff, and HelloFresh. With recent advancements in AI, Warp saw new possibilities for automation.
Focusing on In-House Automation to Boost Efficiency
While automating long-haul trucking or last-mile delivery isn’t currently feasible, Sokolovsky said the company is focusing on what it can control—streamlining operations within its warehouses.
To begin, Warp outfitted its test warehouse in Los Angeles with cameras and used computer vision to create a digital replica of the facility, allowing them to experiment in a simulated environment.
“We basically created a digital twin or simulation of our LA warehouse,” Sokolovsky explained. “A lot of it was trial and error—what happens if we try this, or that, or something completely different?”
From Trial and Error to Practical Robotics Solutions
One early experiment involved training humanoid robots to operate standard pallet jacks, which proved ineffective. Instead, Warp found more promising results by retrofitting off-the-shelf robots with custom technology.
“We’ve broken down complex logistics challenges into manageable, system-readable components,” said Sokolovsky. “Now, we’re leveraging AI—whether through voice, text, email, phone calls, or robotics—to handle tasks like unloading, storing, and reloading freight. We believe this approach will help us reach our goals faster without the need to expand our workforce.”
Troy Lester, Warp’s co-founder and CRO, added that these robotic solutions will also benefit the company’s warehouse partners. Aside from its Los Angeles test site, Warp doesn’t own the warehouses in its network, but the automation tech can still give these partners a competitive edge and help lower labor costs.
“Our partners frequently raise concerns about staffing shortages,” Lester noted. “And the workers doing these jobs often aren’t happy either. So, we see an opportunity to equip these businesses with robotic kits that not only strengthen Warp’s network but also improve their operations across the board.”
The messages appeared harmless, even routine. One, from someone claiming to be a potential guest, asked a hotel about an alleged comment on Booking.com. Another, seemingly from the booking site itself, requested a review of negative guest feedback.
The emails were fraudulent—phishing scams designed to trick recipients into downloading malware that would steal financial data and login credentials.
Now, a major tech company and global law enforcement agencies are targeting a malware network known as Lumma Stealer, which authorities link to the cyberattack. Microsoft, the U.S. Justice Department, Europol, and Japan’s Cybercrime Control Center have launched a joint operation to dismantle Lumma’s digital infrastructure, according to Microsoft and court documents unsealed Wednesday in federal court in Atlanta.
A Dangerous Malware Threat Targeting Sensitive Information and Critical Sectors
Steven Masada, assistant general counsel and director of Microsoft’s Digital Crimes Unit, called Lumma “one of the most renowned info-stealer malwares in existence” in an interview with The Atlanta Journal-Constitution. In 2024 alone, Lumma infected 1.8 million devices, according to cybersecurity firm Flashpoint.
Lumma is a form of malware that individuals sell on the dark web to steal passwords, credit card details, bank information, and cryptocurrency wallets. According to Microsoft, it has allowed cybercriminals to breach sectors such as transportation, finance, and healthcare, extort schools through ransomware attacks, and drain victims’ bank accounts.
Lumma has been active since 2022 and exemplifies the growing trend of cybercrime-as-a-service, according to Masada.
Much like legitimate software companies, Lumma offers tiered monthly or annual subscriptions, with pricing based on the level of customization and control users want. Masada noted that hundreds of cybercriminal and state-affiliated groups around the world have utilized it.
Unlike traditional software that provides tools like word processing or PDF editing, Lumma is designed for malicious use—demonstrated by the cyberattack that impersonated Booking.com, which showcased the malware’s reach and impact.
A Key Player in the Cybercrime Supply Chain, Spreading Across Global Devices
“Cybercriminals are essentially marketing and selling their services to other bad actors to expand their operations,” Masada said, describing Lumma as a key component in the cybercrime supply chain.
Between March and May, Microsoft detected Lumma infections on over 394,000 Windows devices globally. Court records reveal that hackers compromised at least 532 computers in Georgia alone, with Atlanta ranking among the most heavily impacted U.S. cities.
Microsoft filed a federal civil lawsuit against Lumma on May 13 in Atlanta, citing the large number of victims in the area, including Booking.com, which has a significant presence there. Booking.com did not immediately comment on the situation.
In collaboration with other cybersecurity firms and law enforcement agencies, Microsoft gathered intelligence and coordinated efforts to dismantle various components of Lumma’s extensive infrastructure.
Global Action Against Lumma
Last week, Microsoft obtained a sealed court order authorizing it to begin disabling, suspending, and blocking roughly 2,300 domains linked to Lumma’s operations.
The Justice Department also disrupted Lumma’s online marketplace and seized its core command systems, while Europol’s European Cybercrime Center and Japan’s Cybercrime Control Center took down Lumma infrastructure within their respective regions.
According to Masada, Microsoft will reroute the seized domains to a cloud environment it monitors, using the data to gather intelligence and potentially identify more infected devices.
Despite this global crackdown, those behind Lumma remain unidentified. Microsoft traces the main developer, known by the alias ‘Shamel,’ to Russia and believes that other individuals are also involved in maintaining the malware.
Microsoft obtained a temporary restraining order against 10 unidentified individuals, including “Shamel,” others believed to be maintaining Lumma’s infrastructure, and users of the malware.
Masada noted that whoever is behind Lumma will likely attempt to adapt and reconstruct their network. Microsoft aims to have a court-appointed monitor in place to grant swift authorization to seize any new domains that cybercriminals may create in the future.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.