Cybersecurity and Information Warfare

Cybersecurity and Information Warfare

BSF to analyze Chinese drone found near India-Bangladesh border

The Border Security Force (BSF) is set to analyze a Chinese-made drone discovered near the India-Bangladesh border in Tripura. Found by a local boy, the drone, which has two high-resolution cameras and weighs 915 grams, will undergo forensic examination before being handed over to the BSF for a comprehensive study. This incident highlights ongoing security concerns, particularly given the heightened vigil along the border following internal unrest in Bangladesh. The BSF’s proactive measures, including intensified surveillance, aim to mitigate risks from cross-border crimes and infiltrations, e…
Share
Read More
Cybersecurity and Information Warfare

China demands Nvidia prove chip security to regain trust.

China’s state media has called for Nvidia to provide “convincing security proofs” regarding its chips, particularly following concerns over potential backdoor risks associated with its H20 AI chip. The commentary from People’s Daily emphasizes that foreign companies must align with Chinese laws to regain market trust after a recent US export ban was lifted. Nvidia reassured that its chips do not contain backdoors, underscoring its commitment to cybersecurity. This situation highlights the ongoing tensions between the US and China over technology and security, reflecting China’s cautious stance…
Share
Read More
Cybersecurity and Information Warfare

Ransomware complexity surges in APAC, urging stronger defenses

The Akamai SOTI report highlights a concerning rise in ransomware attacks in the Asia Pacific (APAC) region, with an alarming shift towards quadruple extortion tactics, which now include DDoS attacks and pressure on third parties. Critical sectors like healthcare and legal services are particularly vulnerable, with major groups like LockBit and emerging players targeting these industries. The report underscores the need for robust cyber defenses, such as Zero Trust architectures and microsegmentation, to combat evolving threats. The fragmented regulatory landscape further complicates complianc…
Share
Read More
Cybersecurity and Information Warfare

US Defense Bill Targets Apple Display Supplier BOE Over Security Risks

On August 2, 2025, momentum built in Washington as the latest U.S. National Defense Authorization Act advanced proposals to scrutinize BOE Technology Group, a key Apple display supplier, for potential ties to the Chinese military. The bill, approved by congressional committees in July and expected to become law later this year, instructs the Pentagon to assess whether BOE should be classified as a Chinese military company. Though this designation would not immediately disrupt BOE’s commercial relationships, it could bar the company from the U.S. military supply chain and intensify pressure o…
Share
Read More
Cybersecurity and Information Warfare

China Accuses US of Using Microsoft Bugs for Military Espionage

China has accused the US of exploiting flaws in Microsoft email servers to conduct cyberattacks on its military, claiming that US actors were linked to significant breaches affecting defense sector companies. This allegation follows a history of reciprocal accusations, with the US frequently attributing cyber incidents to China. While both nations engage in offensive cyber operations, China’s public attribution strategy appears aimed at influencing international discourse on cybersecurity, particularly regarding Taiwan. This ongoing cyber rivalry highlights the complexities of modern geopoliti…
Share
Read More
Cybersecurity and Information Warfare

China Accuses US of Using Microsoft Bugs for Military Espionage

China has accused the US of exploiting flaws in Microsoft email servers to conduct cyberattacks on its military, claiming that US actors were linked to significant breaches affecting defense sector companies. This allegation follows a history of reciprocal accusations, with the US frequently attributing cyber incidents to China. While both nations engage in offensive cyber operations, China’s public attribution strategy appears aimed at influencing international discourse on cybersecurity, particularly regarding Taiwan. This ongoing cyber rivalry highlights the complexities of modern geopoliti…
Share
Read More
Cybersecurity and Information Warfare

Nvidia denies chip 'backdoors' amid China's security concerns

Nvidia has denied the existence of “backdoors” in its chips amidst China’s scrutiny over security concerns, particularly regarding its H20 AI processing units. The US tech giant confirmed it would resume H20 sales to China following the easing of export restrictions by Washington. However, China’s Cyberspace Administration has summoned Nvidia to address potential security vulnerabilities. This situation reflects broader US-China trade tensions, with China promoting its domestic 910C chip as an alternative, potentially undermining reliance on foreign technology. Ultimately, Nvidia’s commitmen…
Share
Read More
Cybersecurity and Information Warfare

Nvidia denies chip 'backdoors' amid China's security concerns

Nvidia has denied the existence of “backdoors” in its chips amidst China’s scrutiny over security concerns, particularly regarding its H20 AI processing units. The US tech giant confirmed it would resume H20 sales to China following the easing of export restrictions by Washington. However, China’s Cyberspace Administration has summoned Nvidia to address potential security vulnerabilities. This situation reflects broader US-China trade tensions, with China promoting its domestic 910C chip as an alternative, potentially undermining reliance on foreign technology. Ultimately, Nvidia’s commitmen…
Share
Read More