The United States is pushing Vietnam to avoid using Chinese firm HMN Technologies in its plan to build 10 new undersea cables by 2030, amid concerns over national security and sabotage. Vietnam’s current cables, essential for global internet connectivity, have suffered repeated failures, prompting the government to prioritise new projects.
Washington is lobbying Hanoi to select more experienced and trusted suppliers for the cables, citing concerns about espionage and security threats linked to HMN Technologies, which the US views as associated with Chinese tech giant Huawei. The US has also raised concerns about possible sabotage of Vietnam’s current subsea cables.
Vietnamese authorities have remained open to working with Chinese firms, but United States officials have stressed that choosing HMN Tech could discourage American companies from investing in Vietnam. Meanwhile, Vietnam’s top telecoms company, Viettel, is already planning a cable with Singapore, bypassing disputed waters in the South China Sea.
The US and China are vying for influence in Vietnam as the Southeast Asian nation looks to expand its undersea cable infrastructure. Both countries are heavily invested in Vietnam, with subsea cables becoming a critical element in the broader US-China technology rivalry.
The US Federal Bureau of Investigation has disrupted another major Chinese hacking group, dubbed ‘Flax Typhoon,’ which had compromised thousands of devices globally. The FBI and officials from several allied countries accused a Chinese company, the Integrity Technology Group, of running the operation under the guise of an IT firm. FBI Director Christopher Wray revealed that the group was gathering intelligence and conducting surveillance for Chinese security agencies, targeting critical infrastructure as well as corporations, media organisations, and universities.
Cybersecurity officials from the UK, Canada, Australia, and New Zealand also joined the US in condemning the hacking group, noting that over 250,000 devices had been compromised as of June. The operation involved hijacking devices through a botnet—a network of infected cameras and storage devices—and was reportedly part of China’s broader cyber-sabotage efforts. Flax Typhoon’s activities mirrored those of another China-backed group, Volt Typhoon, which has been scrutinised for targeting US infrastructure.
The Chinese Embassy in Washington denied the accusations, claiming that the US had made baseless allegations. Despite China’s dismissal, the FBI remains firm, with Wray emphasising that this takedown is only one part of a longer struggle to counter Chinese cyberattacks. The operation faced some retaliation from the hackers, who launched a cyberattack in response but eventually retreated, leaving the FBI in control of the botnet’s infrastructure.
The American Cybersecurity and Infrastructure Security Agency (CISA) has introduced the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan, a key initiative designed to enhance federal cybersecurity across over 100 FCEB agencies. That plan establishes a framework for coordinated support and services, aiming to reduce cyber risks through a unified defence strategy.
The FOCAL Plan prioritises five key areas to advance operational cybersecurity: Asset Management, which focuses on understanding and managing the cyber environment and interconnected assets; Vulnerability Management, aimed at proactively protecting against threats and assessing defensive capabilities; Defensible Architecture, which emphasises building resilient infrastructure; Cyber Supply Chain Risk Management (C-SCRM), to identify and mitigate risks from third parties; and Incident Detection and Response, designed to enhance Security Operations Centers (SOCs) in managing and limiting the impact of security incidents.
The US Cybersecurity and Infrastructure Security Agency (CISA) also notes that while the FOCAL Plan is tailored for federal agencies, it provides valuable insights for public and private sector organisations. It is a practical guide for developing effective cybersecurity strategies and improving coordination across enterprise security capabilities. Rather than offering an exhaustive checklist, the FOCAL Plan prioritises key actions that will drive significant advancements in cybersecurity and alignment goals within the federal sector.
Russia’s Telecommunication Technologies Consortium (TT Consortium), which includes Rostech, Rostelecom, and Element, has raised serious concerns about the country’s new import substitution requirements for telecom equipment. The consortium has formally communicated to the Ministry of Industry and Trade and the Ministry of Digital Transformation that the proposed targets for domestic components are unachievable.
According to the TT Consortium, the domestic market in Russia needs more suitable alternatives to many foreign components, making the mandated thresholds for domestic content impractical. Furthermore, the consortium has warned of potential severe repercussions if the stringent regulations are adopted in their current form. They fear the resolution could lead to the suspension of decisions recognising telecom equipment as domestic starting 1 December 2024. Consequently, this could result in no domestic telecom equipment being available, disrupting supply chains and impacting key sectors, including government operations and critical information infrastructure.
Additionally, the Telecommunication Technologies Consortium has criticised the draft government decree’s ambitious targets, which require telecom equipment to include 10% domestic components by 2026, 30% by 2028, and 60% by 2030. Manufacturers within the consortium argue that redesigning equipment to meet these requirements is daunting, given the current state of domestic component availability. They assert that such redesigns could lead to significant operational disruptions and hinder their ability to supply essential equipment to government clients and critical infrastructure entities.
The Cybersecurity and Infrastructure Security Agency (CISA) have urged federal agencies to either remove or upgrade an outdated Ivanti appliance that has been exploited in recent attacks.
Ivanti updated its advisory, warning that a ‘limited number of customers’ had been breached due to the vulnerability CVE-2024-8190, which was disclosed earlier in the week. The flaw affects Ivanti’s Cloud Service Appliance (CSA), a tool used for secure internet communication and managing devices connected to central consoles. Exploitation of this bug, which the CISA confirmed, allows hackers to gain access to the affected device.
CISA has mandated that all federal civilian agencies remove the appliance or upgrade to version 5.0 by October 4. Ivanti advised customers to check for any new or modified administrative users, which could indicate exploitation of the bug, and to monitor security alerts with specific tools.
This advisory came just one day after another Ivanti vulnerability raised concerns. The company, which faced significant scrutiny after a series of high-profile nation-state attacks exploited its products earlier this year, has committed to a security overhaul.
Microsoft is developing an alternative platform for cybersecurity companies that currently rely on deep access to its operating system’s kernel layer, following a global IT crisis caused by a faulty CrowdStrike update. In response to customer and partner demand, Microsoft announced plans to design a ‘new platform capability’ that would allow security vendors to operate without needing kernel-level access, which is the most critical layer of the OS.
This initiative aims to improve system reliability while maintaining strong security. The shift will require significant changes not only for Microsoft but also for external cybersecurity firms that use kernel access to detect threats. Microsoft explained that newer versions of Windows provide more ways for cybersecurity vendors to offer services outside of the kernel layer. However, some in the security industry believe kernel access is still essential for innovation and advanced threat detection.
Sophos’ Chief Research Officer, Simon Reed, emphasised that kernel access is vital for security products, describing it as fundamental to both Sophos’ offerings and Windows endpoint security in general. ESET echoed this sentiment, supporting changes to the Windows ecosystem as long as they do not weaken security or limit cybersecurity solution options. Both companies argue that restricting kernel access would hinder innovation and the detection of future threats.
The debate over kernel access is unlikely to result in major changes soon, as security companies fear it could give Microsoft’s own security products an unfair advantage. Given Microsoft’s antitrust history, this issue could end up in court, with government officials from the US and Europe closely monitoring developments.
The Government of Malta has initiated a public consultation to establish a comprehensive legal framework for ethical hackers, also known as security researchers, who identify and disclose vulnerabilities in ICT systems to bolster cybersecurity. That initiative aims to clearly define the role of ethical hackers, ensuring that their activities are regulated and protected by law, enabling them to operate within a transparent and legitimate framework.
In addition, the Government of Malta has proposed that ICT system owners, especially those managing critical infrastructure, implement Coordinated Vulnerability Disclosure Policies (CVDP) to handle better the detection and resolution of security flaws identified by ethical hackers. Overseen by the Directorate for Critical Infrastructure Protection (CIPD), this policy comes in response to an incident where four computer science students were arrested after discovering a vulnerability in the FreeHour app.
Despite acting in good faith, the students faced legal consequences, highlighting the urgent need for clearer protections and legal guidance for ethical hackers. The proposed framework aims to formalise the process, encouraging cooperation between public and private entities and ensuring that cybersecurity research is conducted safely and responsibly.
Open to public input until 7 October 2024, the consultation is expected to lead to legislative reforms that distinguish ethical hacking from illegal activities, providing much-needed clarity for those working to enhance cybersecurity.
SITA has introduced its new cybersecurity solution, SITA Managed NAC (Network Access Control), designed to enhance airport and airline digital infrastructure security. That innovative solution addresses the increasing threats to digital networks in complex environments like airports, providing essential protection for critical communication systems.
SITA Managed NAC offers advanced security features for Local Area Network (LAN) and Wireless LAN communications. Specifically, it incorporates additional layers of identification checks and network segmentation, which ensure compliance with industry standards while safeguarding passenger systems and operational efficiency.
Furthermore, the solution provides granular control over network access, including detailed logging capabilities and the ability to quarantine non-compliant devices. As a result, it supports airports and airlines in meeting stringent cybersecurity recommendations from authorities such as the US Transportation Security Agency (TSA) and the Airports Council International (ACI).
Moreover, SITA Managed NAC integrates seamlessly with the existing SITA Campus Network product, leveraging Cisco’s Identity Services Engine (ISE) platform to enforce identity-based access controls and policies. Adopting a Zero Trust security model, the solution continuously authenticates and authorises access requests, significantly reducing the risk of unauthorised access and potential breaches.
Dubai has introduced a pioneering AI security policy through the Dubai Electronic Security Center, led by H.E. Amer Sharaf. This landmark initiative is designed to address the unique challenges and vulnerabilities associated with AI. The policy focuses on three critical pillars: data integrity, protection of critical infrastructure, and ethical AI usage.
By establishing robust guidelines and best practices, Dubai aims to ensure that AI systems are resilient against emerging threats and operate securely. This comprehensive approach not only sets a high standard for AI security but also positions Dubai as a global leader in digital innovation in accordance with the UAE National Strategy for Artificial Intelligence 2031.
As part of its broader strategy to drive digital transformation, Dubai has implemented a pioneering AI security policy that plays a crucial role in its ambition to become a leading global digital city. Integrating advanced security measures into its AI initiatives allows Dubai to mitigate risks while effectively creating an environment conducive to innovation. That policy underpins ambitious projects such as self-driving vehicles and smart health systems, highlighting Dubai’s commitment to fostering a secure and dynamic digital landscape that aligns with its forward-looking vision.
The chair of the Federal Communications Commission (FCC), Jessica Rosenworcel, has called for increased competition to SpaceX’s Starlink satellite internet service. Starlink currently operates nearly two-thirds of all active satellites and is responsible for a significant portion of space-based internet traffic.
Rosenworcel highlighted that monopolies do not benefit the economy, emphasising the need to bring in more companies to develop satellite constellations and drive innovation in space. She stressed that competition in communications markets typically leads to lower prices and more innovation, and the space sector should not be an exception.
The FCC has been working to support new entrants in the space economy, offering guidance on licensing processes and promoting outreach efforts. Rosenworcel aims to encourage more players to enter the market and challenge Starlink’s dominant position.
In 2022, the FCC withdrew $885.5 million in rural broadband subsidies from Starlink, citing the service’s inability to meet basic program requirements. SpaceX had originally agreed to deliver high-speed internet to over 600,000 rural homes and businesses across 35 US states.