4chan returns after major cyberattack

After suffering what it called a ‘catastrophic’ cyberattack earlier this month, controversial image board 4chan has returned online, admitting its systems were breached through outdated software.

The attacker, reportedly using a UK-based IP address, gained entry by uploading a malicious PDF, allowing access to 4chan’s database and administrative dashboard. The intruder exfiltrated source code and sensitive data before vandalising the site, which led to its temporary shutdown on 14 April.

Although 4chan avoided directly naming the software vulnerability, it indirectly confirmed suspicions that a severely outdated backend—possibly an old version of PHP—was at fault. The site confessed that slow progress in updating its infrastructure resulted from a chronic lack of funds and technical support.

It blamed years of financial instability on advertisers, payment processors, and providers pulling away under external pressure, leaving it dependent on second-hand hardware and a stretched, largely volunteer development team.

Despite purchasing new servers in mid-2024, the transition was slow and incomplete, meaning key services still ran on legacy equipment when the breach occurred. Following the attack, 4chan replaced the compromised server and implemented necessary software updates.

PDF uploads have been suspended, and the Flash board permanently closed due to the difficulty in preventing similar exploits through .swf files.

Now relying on volunteer tech workers to support its recovery efforts, the site insists it won’t be shut down. ‘4chan is back,’ it declared, claiming no other site could replace its unique community, despite long-standing criticism over its content and lax moderation.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Apple to shift US iPhone assembly to India by 2025

Apple is preparing to assemble all iPhones sold inside the US in India by next year, aiming to produce over 60 million units annually in the country by 2026.

The move comes in response to mounting geopolitical tensions and renewed tariff threats under former President Donald Trump’s trade agenda, which once imposed duties as high as 145% on Chinese imports.

The decision marks a major shift in Apple’s supply chain strategy, which has long depended on China. By doubling production in India, Apple hopes to reduce its exposure to trade-related risks instead of relying on short-term tariff exemptions.

Foxconn’s plant in Tamil Nadu and Tata Electronics are leading the effort, with support from India’s government through manufacturing incentives and subsidies.

While Apple remains dependent on Chinese suppliers for many components, shifting final assembly to India reflects growing urgency. Trump-era tariffs triggered a $700 billion market loss for the company in early 2024, prompting Apple to act swiftly instead of waiting for further shocks.

Around 20% of all iPhones are now made in India, a figure expected to rise sharply in the coming years.

Although challenges remain, such as the complexity of relocating the broader supply chain, analysts believe the shift is crucial for Apple’s long-term growth.

With US production capacity lacking the scale and workforce needed, India presents a more viable solution to ensure continued momentum and price stability in Apple’s most important market.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Trump’s first 100 days show steady tech policy

In his blog post ‘Tech continuity in President Trump’s first 100 days,’ Jovan Kurbalija highlights that Trump’s approach to technology remained remarkably stable despite political turbulence in trade and environmental policy. Out of 139 executive orders, only nine directly addressed tech issues, focusing mainly on digital finance, AI leadership, and cybersecurity, reflecting a longstanding US tradition of business-centric tech governance.

Trump’s administration reinforced the idea of letting the tech sector evolve without heavy regulatory interference, even as international players like the EU pushed for stronger digital sovereignty measures. Content moderation policies saw a significant shift, notably with an executive order to curb federal involvement in online censorship, aligning with moves by platforms like Meta and X (formerly Twitter) toward deregulation.

Meanwhile, the prolonged TikTok saga underlined the growing intersection of tech and geopolitics, with ByteDance receiving a deadline extension to sell its US operations amid rising tensions with China. In AI policy, Trump steered away from Biden-era safety concerns, favouring economic competitiveness and educational reforms to strengthen American AI leadership, while public consultations revealed a broad range of industry perspectives.

Kurbalija also noted the administration’s steady hand in cybersecurity, focusing on technical infrastructure while minimising concern over misinformation, and in digital economy matters, where new tariffs and the removal of the de minimis import exemption pointed toward a potentially fragmented global internet. In the cryptocurrency sector, Trump adopted a crypto-friendly stance by creating a Strategic Bitcoin Reserve and easing previous regulatory constraints, though these bold moves sparked fears of financial volatility.

Despite these tactical shifts, Kurbalija concludes that Trump’s overarching tech policy remains one of continuity, firmly rooted in supporting private innovation while navigating increasingly strained global digital relations.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

IBM commits $150 billion to US tech

IBM has announced a major investment plan worth $150 billion over the next five years to solidify its role as a global leader in advanced computing and quantum technologies.

The move also aims to support US economic growth by expanding local innovation and manufacturing, instead of relying heavily on overseas operations.

Over $30 billion of the funding will be directed towards research and development, helping IBM advance in areas such as mainframe and quantum computer production.

According to CEO Arvind Krishna, this commitment ensures that IBM remains the core hub of the world’s most sophisticated computing and AI capabilities. The company already operates the largest fleet of quantum computing systems and intends to continue building them in the US.

The announcement comes amid a wider shift among major tech firms investing heavily in US-based infrastructure.

Companies like Nvidia and Apple have each pledged massive sums—Nvidia alone is preparing to invest up to $500 billion—in response to President Donald Trump’s call for greater domestic manufacturing through policies like reciprocal tariffs.

By focusing investment at home instead of abroad, IBM joins a growing list of tech leaders aligning with government efforts to revitalise American industry while maintaining their global competitiveness in AI and next-generation computing.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Huawei develops Ascend 910D chip to rival Nvidia

Huawei Technologies is preparing to test its newest AI processor, the Ascend 910D, as it seeks to offer an alternative to Nvidia’s products following US export restrictions. The company has approached several Chinese tech firms to assess the technical feasibility of the new chip.

Extensive testing will follow to ensure the chip’s performance before it reaches the wider market. Sources claim Huawei aims for the Ascend 910D to outperform Nvidia’s H100 chip, widely used for AI training since 2022.

Huawei is already shipping large volumes of its earlier Ascend 910B and 910C models to state-owned carriers and private AI developers like ByteDance. Demand for these processors has risen as US restrictions tightened Nvidia’s ability to sell its H20 chip to China.

Increased domestic demand for Huawei’s AI hardware signals a shift in China’s semiconductor market amid geopolitical tensions. Analysts believe this development strengthens Huawei’s ambition to compete globally in the AI chip market.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Autonomous construction robot Zyrex set for 2026 debut

Construction sites could soon see a dramatic change with the arrival of Zyrex, a 20-foot-tall autonomous robot developed by RIC Robotics in California.

Designed for welding, carpentry, 3D printing, and material handling, Zyrex is being built to tackle labour shortages and improve safety on high-risk construction sites.

The company expects to complete a working prototype by early 2026, aiming to revolutionise the industry with a fully autonomous machine equipped with advanced cognitive capabilities.

Zyrex will initially be operated by human controllers using VR and simulators, while it gathers real-time data through LiDAR and visual sensors. By comparing this information to digital building models, Zyrex will ensure precision and quality before eventually transitioning to full autonomy.

Unlike humanoid robots, Zyrex is purpose-built for construction, focusing on both heavy-duty tasks and delicate operations like welding and exterior finishing.

Building on earlier successes, including the RIC-M1 Pro which helped 3D-print Walmart warehouse extensions ahead of schedule, Zyrex promises to be both powerful and cost-effective. RIC Robotics estimates the price to be under $1 million, with leasing options starting below $20,000 a month.

Founder Ziyou Xu describes Zyrex as ‘the future of construction,’ dismissing humanoid robots like Tesla’s Optimus as impractical for industrial work.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

SK Telecom begins SIM card replacement after data breach

South Korea’s largest carrier, SK Telecom, began replacing SIM cards for its 23 million customers on Monday following a serious data breach.

Instead of revealing the full extent of the damage or the perpetrators, the company has apologised and offered free USIM chip replacements at 2,600 stores nationwide, urging users to either change their chips or enrol in an information protection service.

The breach, caused by malicious code, compromised personal information and prompted a government-led review of South Korea’s data protection systems.

However, SK Telecom has secured less than five percent of the USIM chips required, planning to procure an additional five million by the end of May instead of having enough stock ready for immediate replacement.

Frustrated customers, like 30-year-old Jang waiting in line in Seoul, criticised the company for failing to be transparent about the amount of data leaked and the number of users affected.

Instead of providing clear answers, SK Telecom has focused on encouraging users to seek chip replacements or protective measures.

South Korea, often regarded as one of the most connected countries globally, has faced repeated cyberattacks, many attributed to North Korea.

Just last year, police confirmed that North Korean hackers had stolen over a gigabyte of sensitive financial data from a South Korean court system over a two-year span.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Quantum encryption achieves new milestone without cryogenics

Computer scientists at Toshiba Europe have set a new record by distributing quantum encryption keys across 158 miles using standard computer equipment and existing fibre-optic infrastructure.

Instead of relying on expensive cryogenic cooling, which is often required in quantum computing, the team achieved this feat at room temperature, marking a significant breakthrough in the field.

Experts believe this development could lead to the arrival of metropolitan-scale quantum encryption networks within a decade.

David Awschalom, a professor at the University of Chicago, expressed optimism that quantum encryption would soon become commonplace, reflecting a growing confidence in the potential of quantum technologies instead of viewing them as distant possibilities.

Quantum encryption differs sharply from modern encryption, which depends on mathematical algorithms to scramble data. Instead of mathematical calculations, quantum encryption uses the principles of quantum mechanics to secure data through Quantum Key Distribution (QKD).

Thanks to the laws of quantum physics, any attempt to intercept quantum-encrypted data would immediately alert the original sender, offering security that may prove virtually unbreakable.

Until recently, the challenge was distributing quantum keys over long distances because traditional fibre-optic lines distort delicate quantum signals. However, Toshiba’s team found a cost-effective solution using twin-field quantum key distribution (TF-QKD) instead of resorting to expensive new infrastructure.

Their success could pave the way for a quantum internet within decades, transforming what was once considered purely theoretical into a real-world possibility.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

MTN confirms cybersecurity breach and data exposure

MTN Group has confirmed a cybersecurity breach that exposed personal data of some customers in certain markets. The telecom giant assured the public, however, that its core infrastructure remains secure and fully operational.

The breach involved an unknown third party gaining unauthorised access to parts of MTN’s systems, though the company emphasised that critical services, including mobile money and digital wallets, were unaffected.

In a statement released on Thursday, MTN clarified that investigations are ongoing, but no evidence suggests any compromise of its central infrastructure, such as its network, billing, or financial service platforms.

MTN has alerted the law enforcement of South Africa and is collaborating with regulatory bodies in the affected regions.

The company urged customers to take steps to safeguard their data, such as monitoring financial statements, using strong passwords, and being cautious with suspicious communications.

MTN also recommended enabling multi-factor authentication and avoiding sharing sensitive information like PINs or passwords through unsecured channels.

While investigations continue, MTN has committed to providing updates as more details emerge, reiterating its dedication to transparency and customer protection.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

New research highlights escalating cyberthreats to global energy sector

Resecurity has published new research examining recent cyber threat activity targeting energy infrastructure across North America, Asia, and the European Union. The report, a continuation of Resecurity’s earlier analysis, focuses on incidents involving energy firms, including nuclear facilities and associated research entities.

According to the findings, these organisations are being targeted by various threat actors, including hacktivist groups, ransomware operators, and nation state entities. The report observes that geopolitical tensions remain a significant factor behind many of these activities, with actors associated with China, Iran, North Korea, and Russia among those identified.

The primary focus of these campaigns has been cyber-espionage, although incidents involving ransomware operations against operational technology (OT) systems have also been reported. The convergence of IT and OT systems, the growing use of cloud technologies, and the increased deployment of Industrial Internet of Things (IIoT) devices are noted as factors contributing to the expanded attack surface within the sector.

Resecurity’s HUNTER unit documented various threat actors engaged in targeting critical infrastructure. The report emphasises the need for energy firms to monitor potential exposure of credentials across dark web platforms, particularly due to vulnerabilities within IT and software supply chains.

Technological developments such as AI adoption within the energy sector are also discussed as contributing to the evolving threat landscape. AI is reported to lower entry barriers for certain types of cyber operations, while its integration into critical infrastructure networks introduces additional risks.

The Resecurity analysis also underscores the role of cyber supply chain risks, citing the MOVEit managed file transfer breach as an example of downstream impacts affecting multiple layers of vendors and service providers.

In response to these developments, the US Department of Energy (DOE), alongside the National Association of Regulatory Utility Commissioners (NARUC), issued updated cybersecurity guidelines in 2024 aimed at strengthening the resilience of electric distribution systems and distributed energy resources.

Overall, the research identifies an increase in cyberattacks targeting energy infrastructure globally, suggesting that some of these activities may be linked to broader geopolitical strategies. The report highlights the involvement of both state-sponsored and criminal actors in shaping this threat environment.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!