HQC announced as safeguard against future quantum attacks

The National Institute of Standards and Technology (NIST) has introduced HQC, a backup encryption algorithm designed to protect sensitive data from potential threats posed by future quantum computers.

As part of its ongoing efforts to strengthen cybersecurity, the agency selected HQC to complement the existing post-quantum cryptography (PQC) standard, ML-KEM, in case quantum advancements compromise current encryption methods.

HQC relies on error-correcting codes, a mathematical approach used in data protection for decades, including in NASA missions.

The algorithm is larger than ML-KEM and requires more computing power, but experts determined it to be a secure and reliable alternative. A draft standard for HQC is expected within a year, with final approval anticipated by 2027.

NIST has been working to prepare for the so-called ‘Q day,’ when quantum computers could break conventional encryption. Three PQC algorithms were finalized in 2024, including ML-KEM and two digital signature standards.

In addition to announcing HQC, NIST is preparing to release a draft standard for the FALCON algorithm, further strengthening protections against future cyber threats.

For more information on these topics, visit diplomacy.edu.

Trump administration ends support for cybersecurity projects

The Trump administration has cut funding for two key cybersecurity initiatives, including one supporting election security, sparking concerns over potential vulnerabilities in future US elections.

The Cybersecurity and Infrastructure Security Agency (CISA) announced it would end around $10 million in annual funding to the non-profit Center for Internet Security, which manages election-related cybersecurity programmes.

However, this move comes as part of a broader review of CISA’s election-related work, during which over a dozen staff members were placed on administrative leave.

The decision follows another controversial step by the administration to dismantle an FBI task force that investigated foreign influence in US elections.

Critics warn that reducing government involvement in election security weakens safeguards against interference, with Larry Norden from the Brennan Center for Justice calling the cuts a serious risk for state and local election officials.

The National Association of Secretaries of State is now seeking clarification on CISA’s decision and its wider implications.

CISA has faced Republican criticism in recent years for its role in countering misinformation related to the 2020 election and the coronavirus pandemic. However, previous leadership maintained that the agency’s work was limited to assisting states in identifying and addressing misinformation.

While CISA argues the funding cuts will streamline its focus on critical security areas, concerns remain over the potential impact on election integrity and cybersecurity protections across local and state governments.

For more information on these topics, visit diplomacy.edu.

Switzerland mandates cyberattack reporting for critical infrastructure from 1 April 2025

As of 1 April 2025, operators of critical infrastructure in Switzerland will be required to report cyberattacks to the National Cyber Security Centre (NCSC) within 24 hours of discovery. This measure, introduced by the Federal Council, is part of an amendment to the Information Security Act (ISA) and aims to enhance cybersecurity coordination and response capabilities.

The reporting obligation applies to key sectors, including energy and water suppliers, transport companies, and public administrations at the cantonal and communal levels. Reports must be submitted when an attack disrupts critical infrastructure, compromises or manipulates information, or involves blackmail, threats, or coercion. Failure to comply may result in financial penalties, which will be enforceable from 1 October, allowing a six-month adjustment period before sanctions take effect.

To facilitate compliance, the NCSC will provide a reporting form on its Cyber Security Hub, with an alternative email submission option for organisations not yet registered on the platform. Initial reports must be submitted within 24 hours, followed by a detailed report within 14 days.

The Federal Council has also approved the Cybersecurity Ordinance, which outlines implementation provisions, reporting exemptions, and mechanisms for information exchange between the NCSC and other authorities. Consultations on the ordinance reflected broad support for streamlined reporting processes, ensuring alignment with existing obligations, such as those under data protection laws.

Additionally, from 1 April, the National Cyber Security Centre will officially change its name as part of its transition into a federal office within the Department of Defence, Civil Protection and Sport (DDPS).

This regulatory update aligns Switzerland with international cybersecurity practices, including the EU’s NIS Directive, which has required cyber incident reporting since 2018.

For more information on these topics, visit diplomacy.edu

Geopolitical tensions drive OT and ICS cyberattacks, a new report warns

Attacks on operational technology (OT) networks have increased, driven in part by geopolitical factors, with OT security gaining broader attention, according to the annual report from Dragos.

In 2024, two additional threat groups began targeting OT systems, bringing the total number of known active groups to nine.

Additionally, researchers from Dragos identified two new malware families designed to compromise industrial control systems (ICS).

According to Dragos’ annual report, barriers to OT/ICS attacks have lowered, making these systems more accessible targets for adversaries.

Ransomware attacks against OT/ICS asset owners also increased by 87% in 2024, with the number of ransomware groups targeting these systems growing by 60%.

Dragos monitors 23 threat groups that engage with OT networks for intelligence gathering or system manipulation. Nine of these groups were active in 2024, including two newly identified ones.

For more information on these topics, visit diplomacy.edu

Musk blames ‘major cyberattack’ for X outage, points to Ukraine

Elon Musk’s social media platform, X, experienced widespread disruptions on Monday, which the billionaire attributed to a major cyberattack.

Musk claimed the platform was targeted by an unusually powerful denial-of-service (DoS) attack, suggesting that a well-coordinated group or nation-state might be responsible. However, he offered no concrete evidence to support the claim, leaving cybersecurity experts sceptical.

Many pointed out that DoS attacks, which flood websites with excessive traffic to overwhelm their servers, are commonly executed by small groups or individuals with relatively limited resources.

Reports of outages spiked early in the day, with Downdetector tracking over 39,000 complaints from users in the US at the peak of the disruption. By the afternoon, the number had dwindled significantly, though intermittent service issues persisted for some.

According to an anonymous industry source, the attack consisted of multiple waves of rogue traffic bombarding X’s servers, beginning around 9:45 UTC.

While Musk later asserted in an interview with Fox Business that the cyberattack originated from Ukraine, the same industry source disputed this claim, stating that the bulk of the malicious traffic came from various locations, including the USA, Vietnam, and Brazil, with only a minimal amount from Ukraine.

Tracing the true origin of DoS attacks is notoriously tricky, as attackers often use proxy servers and botnets to disguise their locations.

Cybersecurity specialists have noted that assigning blame based solely on IP addresses can be misleading, as they rarely indicate the actual perpetrators. Despite Musk’s insistence on a Ukraine-based origin, no definitive proof has been presented to substantiate the claim.

Musk’s comments come amid his increasingly vocal criticisms of Ukraine’s ongoing war efforts against Russia, aligning with sentiments echoed by US President Donald Trump, whom he advises.

Over the weekend, Musk suggested that Ukraine’s battlefield operations would collapse without his Starlink satellite communication system, although he clarified that he had no intention of cutting off access.

The latest controversy surrounding X’s cyberattack has further fueled speculation about Musk’s political and strategic positioning in the ongoing geopolitical conflict.

For more information on these topics, visit diplomacy.edu.

Tusk warns against arrogance after US-Poland social media clash

Poland’s Prime Minister, Donald Tusk, has urged allies to show respect and avoid arrogance in a recent post on X, following a heated social media exchange between Polish and US officials. The remarks came after a disagreement over the role of Starlink satellites in Ukraine’s war effort. Radosław Sikorski, Poland‘s foreign minister, had suggested Ukraine may need an alternative to Starlink if its reliability becomes an issue. Poland funds the satellite service for Ukraine, which is crucial for military communications.

The dispute escalated when Marco Rubio, the US Secretary of State, accused Sikorski of being ungrateful, stating that ‘no one has made any threats about cutting Ukraine off from Starlink.’ Rubio emphasised the importance of Starlink in Ukraine’s success, saying the war could have been lost without it. Sikorski responded by thanking Rubio for reaffirming the collaboration between the US and Poland in providing the service.

The controversy deepened when Elon Musk, the founder of SpaceX, which operates Starlink, labelled Sikorski a “small man” and told him to ‘be quiet’ after the suggestion that Poland may seek alternatives. Musk reiterated his commitment to keeping Starlink operational in Ukraine, despite political disagreements, and denied using the service as a bargaining chip.

The ongoing debate highlights growing tensions surrounding the role of private companies in international conflict and the geopolitical importance of satellite technology. Meanwhile, the Franco-British operator Eutelsat saw a surge in stock prices, as speculation grows that it could potentially replace Starlink in providing services to Ukraine.

For more information on these topics, visit diplomacy.edu.

Japan to prioritise domestic cybersecurity solutions

Japan has announced plans to prioritise the use of domestic software for cybersecurity purposes, as part of an initiative to reduce the country’s reliance on foreign products in this critical sector.

The government intends to offer subsidies and support technology standards that will encourage the growth of the local cybersecurity industry. However, this move is also a part of the government’s broader efforts to enhance cyber defence and strengthen national security.

As of 2021, Japanese domestic companies were responsible for around 40% of the nation’s cybersecurity countermeasure products. For newer products, this share has significantly decreased, with domestic offerings accounting for less than 10% of the latest cybersecurity technologies.

The move reflects Japan’s increasing focus on cybersecurity as a national priority, particularly in the face of rising global cyber threats. By fostering a stronger domestic cybersecurity ecosystem, Japan aims to enhance its resilience against cyberattacks.

Experts, however, warned that that restricting foreign products could limit access to cutting-edge technologies, making the domestic industry potentially less competitive in terms of features, capabilities, or performance. This could hinder the effectiveness of cybersecurity defenses.

To support this transition, the government plans to offer financial incentives and collaborate with local technology providers to establish standardized solutions that meet both national and international security requirements.

These efforts are part of a broader strategy to ensure that Japan’s critical infrastructure and businesses are better protected in the digital age.

For more information on these topics, visit diplomacy.edu.

CISA reaffirms its commitment to monitor Russian cyber threats

The Cybersecurity and Infrastructure Security Agency (CISA) has refused recent reports suggesting a shift in its approach to addressing cyber threats from Russia.

The Guardian published an article citing anonymous sources who claimed CISA analysts had been instructed not to report on Russian cyber threats, and that a Russia-related project was halted.

In response, CISA issued a statement, affirming its continued commitment to defending US critical infrastructure against all cyber threats, including those from Russia, and asserting that any claims of a change in strategy were inaccurate.

However, this story coincided with the news about a temporary order from Defense Secretary Pete Hegseth for US Cyber Command to halt all planning related to Russia, though the order did not apply to the National Security Agency.

Further reports from the Washington Post and New York Times indicated that this directive may be related to diplomatic efforts by President Donald Trump to engage Russia in negotiations about the war in Ukraine.

Russia, however, was absent in a recent speech by a senior State Department official on critical infrastructure cyber threats within the UN Open-Ended Working Group (OEWG).

For more information on these topics, visit diplomacy.edu.

Scale AI wins Pentagon AI contract

Scale AI has secured a multimillion-dollar contract with the US Department of Defense to develop AI tools for military operations. The project, named Thunderforge, is the Pentagon’s flagship AI initiative aimed at enhancing decision-making, simulation, and operational planning. Led by the Defense Innovation Unit, the programme will see collaboration with technology partners such as Microsoft and Anduril, initially focusing on the Indo-Pacific and European Commands before expanding further.

Thunderforge represents a shift towards AI-driven military strategies, promising increased speed and efficiency in modern warfare. The Department of Defense and Scale AI have emphasised the importance of rapid response times, with the technology designed to process vast amounts of information quickly. However, while Scale AI has assured that human oversight will be maintained, the Defence Innovation Unit has not explicitly highlighted this aspect in its communications.

The deal comes as more AI firms reconsider their stance on military applications. Companies like OpenAI, Microsoft, and Google have altered policies that previously restricted AI development for defence purposes. Critics argue that these technologies could be used for harmful applications despite company assurances, raising ethical concerns about the potential for AI in warfare. Some experts warn that firms may have limited control over how their AI is ultimately deployed.

This latest partnership highlights the growing integration of AI into defence strategies, despite previous pushback from tech industry employees. While firms insist their technologies will be used responsibly, concerns remain over the long-term implications of AI-driven warfare and the ability to ensure its ethical use.

For more information on these topics, visit diplomacy.edu.

Eutelsat shares surge on prospects of replacing Starlink

Eutelsat shares surged by over 60% on Tuesday, continuing a remarkable rise that saw them increase by 68% the day before. This spike came after geopolitical tensions raised the possibility of OneWeb satellites, owned by the French satellite operator, replacing Elon Musk’s Starlink service in Ukraine. Since Friday, Eutelsat’s stock has nearly tripled in value following a public dispute between Ukrainian President Volodymyr Zelensky and former US President Donald Trump, which has cast doubt on the future of Starlink in the country.

Analysts suggest that the surge in Eutelsat’s stock is driven by the potential for OneWeb to secure the Ukrainian military’s satellite contract, with OneWeb being seen as a viable alternative to Starlink. The situation gained further momentum after a White House official revealed that Trump would pause military aid to Ukraine, potentially allowing Europe to increase its support. On Tuesday, the European Commission unveiled an ambitious 800 billion euro defense plan, further strengthening Europe’s role in the region.

Eutelsat has recently committed to increasing its satellite capacity for Ukraine, highlighting its growing importance for European defence. The French satellite operator has faced challenges, including concerns over rising debt and strong competition from US companies like SpaceX’s Starlink. Despite these hurdles, recent developments have rekindled investor confidence, with shares rising sharply after hitting all-time lows in February due to ongoing financial difficulties.

For more information on these topics, visit diplomacy.edu.