Cybersecurity and Information Warfare

Cybersecurity and Information Warfare

Infosys launches AI, cybersecurity, and space tech center in Hubballi.

Infosys has launched a centre for Advanced AI, Cybersecurity, and Space Technology in Hubballi, North Karnataka, significantly enhancing the region’s tech landscape. This initiative aims to create employment opportunities while fostering innovation through collaboration with local institutions and hiring talent from engineering colleges. The establishment of this hub is a strategic move to position Hubballi as a key player in the tech ecosystem, responding to local government expectations for growth in the area. With a focus on AI-driven solutions, Infosys is committed to regional development…
Share
Read More
Cybersecurity and Information Warfare

DRDO Guest House Manager Detained for Espionage in Jaisalmer

In Jaisalmer, Mahendra Prasad, manager of the DRDO guest house, has been detained for suspected espionage, raising serious concerns about security at sensitive military sites. Reports indicate he may have shared information with Pakistan, having received suspicious communications since 2020. His detention follows a trend of espionage arrests in Rajasthan, highlighting the increasing vigilance of Indian Intelligence agencies along the border. The situation underscores the vulnerability of India’s strategic military installations, prompting heightened surveillance to safeguard national security…
Share
Read More
Cybersecurity and Information Warfare

Microsoft's SharePoint Hack Reveals Risks of Foreign Management

Microsoft disclosed that Chinese state-sponsored hackers exploited vulnerabilities in its SharePoint software, impacting numerous US agencies, including critical security departments. Notably, it was revealed that China-based engineers had long been maintaining the compromised software, raising significant security concerns over foreign access to sensitive systems. Cybersecurity experts emphasize the risks posed by allowing foreign personnel to manage vital US government infrastructure, especially given China’s extensive data collection laws. This incident has prompted US lawmakers to demand t…
Share
Read More
Cybersecurity and Information Warfare

Cloudflare accuses Perplexity of evading web access restrictions.

Cybersecurity firm Cloudflare accused AI company Perplexity, led by IIT Madras alumnus Arvind Srinivas, of employing stealth crawling techniques to bypass website restrictions, including using undeclared user agents and IP rotation to access blocked content. Perplexity defended itself, asserting it provides real-time summaries for user queries rather than storing data, challenging Cloudflare’s characterization of its operations as malicious. The dispute highlights the tension between web crawlers and content providers, with Cloudflare responding to customer complaints about unauthorized acce…
Share
Read More
Cybersecurity and Information Warfare

Google's AI Big Sleep uncovers 20 flaws in open-source software

Google’s AI-powered vulnerability researcher, Big Sleep, has successfully identified 20 security flaws in widely used open-source software, including tools like FFmpeg and ImageMagick. This initiative, developed by Google’s DeepMind and Project Zero teams, emphasizes augmenting human security researchers rather than replacing them, allowing for thousands of tests to be conducted rapidly. The AI operates by simulating malicious actions to probe code and network services for potential exploits, with human experts reviewing findings before submission. This advancement showcases the growing role o…
Share
Read More
Cybersecurity and Information Warfare

Kashmir's youth exploit social media for profit, raising concerns

In recent days, security agencies in Kashmir have uncovered a growing trend where some local youth exploit social media by posting provocative images and content glorifying separatist figures—most notably Burhan Wani, a slain Hizbul Mujahideen commander—not out of ideological conviction but as a calculated strategy for profit. Investigations following the detention of several individuals revealed that these youth deliberately used inflammatory visuals to attract followers, rapidly expanding their online reach. Once a substantial following was secured, they shifted content toward more neutr…
Share
Read More
Cybersecurity and Information Warfare

China's export restrictions threaten US military tech supply chains.

China’s export restrictions on critical minerals like rare earths and gallium are significantly impacting US defense production by causing delays and increased costs. With China dominating global refining, the Pentagon is facing supply chain vulnerabilities that could undermine its military readiness. Although the US is seeking new mining investments and alternative supply deals, these efforts are unlikely to fill the gap swiftly, leaving Washington exposed. This situation underscores the strategic importance of securing mineral resources, enhancing India’s defense strategies by highlighting t…
Share
Read More
Cybersecurity and Information Warfare

BSF to analyze Chinese drone found near India-Bangladesh border

The Border Security Force (BSF) is set to analyze a Chinese-made drone discovered near the India-Bangladesh border in Tripura. Found by a local boy, the drone, which has two high-resolution cameras and weighs 915 grams, will undergo forensic examination before being handed over to the BSF for a comprehensive study. This incident highlights ongoing security concerns, particularly given the heightened vigil along the border following internal unrest in Bangladesh. The BSF’s proactive measures, including intensified surveillance, aim to mitigate risks from cross-border crimes and infiltrations, e…
Share
Read More
Cybersecurity and Information Warfare

China demands Nvidia prove chip security to regain trust.

China’s state media has called for Nvidia to provide “convincing security proofs” regarding its chips, particularly following concerns over potential backdoor risks associated with its H20 AI chip. The commentary from People’s Daily emphasizes that foreign companies must align with Chinese laws to regain market trust after a recent US export ban was lifted. Nvidia reassured that its chips do not contain backdoors, underscoring its commitment to cybersecurity. This situation highlights the ongoing tensions between the US and China over technology and security, reflecting China’s cautious stance…
Share
Read More
Cybersecurity and Information Warfare

Ransomware complexity surges in APAC, urging stronger defenses

The Akamai SOTI report highlights a concerning rise in ransomware attacks in the Asia Pacific (APAC) region, with an alarming shift towards quadruple extortion tactics, which now include DDoS attacks and pressure on third parties. Critical sectors like healthcare and legal services are particularly vulnerable, with major groups like LockBit and emerging players targeting these industries. The report underscores the need for robust cyber defenses, such as Zero Trust architectures and microsegmentation, to combat evolving threats. The fragmented regulatory landscape further complicates complianc…
Share
Read More
Cybersecurity and Information Warfare

US Defense Bill Targets Apple Display Supplier BOE Over Security Risks

On August 2, 2025, momentum built in Washington as the latest U.S. National Defense Authorization Act advanced proposals to scrutinize BOE Technology Group, a key Apple display supplier, for potential ties to the Chinese military. The bill, approved by congressional committees in July and expected to become law later this year, instructs the Pentagon to assess whether BOE should be classified as a Chinese military company. Though this designation would not immediately disrupt BOE’s commercial relationships, it could bar the company from the U.S. military supply chain and intensify pressure o…
Share
Read More
Cybersecurity and Information Warfare

China Accuses US of Using Microsoft Bugs for Military Espionage

China has accused the US of exploiting flaws in Microsoft email servers to conduct cyberattacks on its military, claiming that US actors were linked to significant breaches affecting defense sector companies. This allegation follows a history of reciprocal accusations, with the US frequently attributing cyber incidents to China. While both nations engage in offensive cyber operations, China’s public attribution strategy appears aimed at influencing international discourse on cybersecurity, particularly regarding Taiwan. This ongoing cyber rivalry highlights the complexities of modern geopoliti…
Share
Read More
Cybersecurity and Information Warfare

Nvidia denies chip 'backdoors' amid China's security concerns

Nvidia has denied the existence of “backdoors” in its chips amidst China’s scrutiny over security concerns, particularly regarding its H20 AI processing units. The US tech giant confirmed it would resume H20 sales to China following the easing of export restrictions by Washington. However, China’s Cyberspace Administration has summoned Nvidia to address potential security vulnerabilities. This situation reflects broader US-China trade tensions, with China promoting its domestic 910C chip as an alternative, potentially undermining reliance on foreign technology. Ultimately, Nvidia’s commitmen…
Share
Read More
Enable Notifications OK No thanks