Ukraine anticipates a surge in AI-driven drones and uncrewed ground vehicles next year

Ukraine plans to acquire tens of thousands of uncrewed ground vehicles next year, aiming to enhance battlefield logistics and safety. These robotic platforms, already deployed near the front, will transport supplies, evacuate casualties, and keep soldiers away from dangerous zones. Deputy Prime Minister Mykhailo Fedorov highlighted the growing role of technology in mitigating risks along active conflict lines.

Advancements in military tech are reshaping Ukraine’s defence strategy. With increased production of long-range attack drones, Kyiv is narrowing the technological gap with Moscow. Ukraine has also adopted decoy drones to counter Russian tactics, alongside AI-driven systems to improve battlefield precision and reduce reliance on direct piloting.

Efforts are underway to innovate drone defences, including intercepting Russia’s Shahed drones. Autonomous technologies are expected to rise, with potential for early-stage drone swarm deployment. Fedorov noted the importance of connectivity and launch methods as Ukraine adapts to changing enemy responses.

Ukraine’s government-backed initiatives continue to support military innovation, fostering partnerships with private firms to scale up production and refine technologies. These developments mark a significant shift in how modern warfare is conducted, blending AI and robotics into entrenched combat scenarios.

White House discusses China-linked telecom hack

The White House has engaged leading United States telecommunications executives in a high-level meeting to address a significant cyber-espionage campaign allegedly linked to China. National Security Adviser Jake Sullivan and Deputy Adviser Anne Neuberger hosted the meeting, seeking industry insights and strengthening government-private sector partnerships to counteract future cyber threats.

Earlier this month, US authorities disclosed that hackers, purportedly linked to China, accessed surveillance data meant for law enforcement by breaching multiple telecom companies. Senator Mark Warner described the breach as the ‘worst telecom hack in our nation’s history.’

Though the identities of the companies and executives involved remain undisclosed, the meeting underscores the urgency of cybersecurity improvements amid escalating threats from state-sponsored actors. While China has categorically denied involvement, the incident amplifies concerns over Beijing’s alleged cyber activities targeting critical US infrastructure.

The discussions aim to establish better safeguards against sophisticated attacks, reinforcing collaboration between federal agencies and the telecom sector to bolster national cyber resilience.

UK businesses have lost £44 billion to cyberattacks over five years

British businesses have lost an estimated £44 billion ($55 billion) in revenue over the past five years due to cyberattacks, with more than half of private sector companies experiencing at least one incident, according to a report by insurance broker Howden. Companies earning over £100 million annually faced the highest risk, with cyberattacks cutting 1.9% of revenue on average.

The report identified compromised emails (20%) and data theft (18%) as the leading causes of cyber incidents. Despite these risks, only 61% of businesses used anti-virus software, and just 55% had network firewalls, with cost and limited IT resources cited as major obstacles to better cybersecurity.

“Cybercrime is rising as businesses rely more on technology, exposing vulnerabilities to malicious actors,” said Sarah Neild, head of UK cyber retail at Howden. The findings are based on a September survey of 905 UK private-sector IT leaders conducted by YouGov.

US official warns that Chinese hackers target US critical infrastructure

According to Morgan Adamski, executive director of US Cyber Command, Chinese hackers are embedding themselves in US critical infrastructure IT networks to prepare for a potential conflict with the United States. He announced that China-linked cyber operations aim to secure strategic advantages in the event of a major clash.

These operations involve compromising key networks and positioning themselves to execute disruptive attacks. Examples include manipulating heating, ventilation, and air conditioning (HVAC) systems in server rooms or disrupting vital energy and water controls, officials said earlier this year.

Speaking at the Cyberwarcon security conference in Arlington, Virginia, Adamski emphasised the scale of the threat, noting that the US government has launched globally coordinated efforts to counter these operations. These efforts include offensive and defensive measures designed to degrade and disrupt China’s cyber activities worldwide. Actions range from exposing cyber campaigns to imposing sanctions and issuing cybersecurity advisories, with support from allied nations.

Earlier, US Senator Mark Warner described a suspected China-linked cyberespionage campaign, dubbed ‘Salt Typhoon,’ as the worst telecommunications hack in US history. Beijing has repeatedly denied conducting cyberattacks on US entities.

UN Cyber OEWG to host simulation exercise for states

The UN Office for Disarmament Affairs (ODA) will conduct a simulation exercise in early 2025 to help Member States engage with the Global Points of Contact (POC) Directory.

The directory ensures quick and effective responses to cybersecurity incidents by providing a reliable channel for diplomatic and technical contacts across countries. It is part of broader efforts to implement the agreed confidence-building measures (CBMs) and promote cyber stability and security globally, particularly under frameworks such as the UN’s Open-Ended Working Group (OEWG) on the security of ICTs. Most states have recently appointed their POCs and participated in the first ‘ping’ test (a test conducted by the directory manager to verify that the information in the directory is up-to-date).

In hybrid format, the exercise aims to familiarise nominated POCs with practical aspects of participating in the directory and clarify the roles of diplomatic and technical contacts. In collaboration with the UN Institute for Disarmament Research (UNIDIR) and the International Telecommunications Union (ITU), the event will occur virtually, with an in-person debrief.

UK Minister warns that NATO must adapt to AI threats

The UK government has announced the launch of a Laboratory for AI Security Research (LASR), an initiative to protect against emerging AI-driven threats and bolster Britain’s cyber resilience. The lab, backed by an initial £8.22 million in government funding, will bring together experts from academia, industry, and government to address AI’s evolving challenges to national security.

Speaking at the NATO Cyber Defence Conference in London, the Chancellor of the Duchy of Lancaster emphasised that AI is revolutionising national security and noted that ‘[…]as we develop this technology, there’s a danger it could be weaponised against us. Our adversaries are exploring how to use AI on the physical and cyber battlefield’.

LASR will collaborate with leading institutions, including the Alan Turing Institute, Oxford University, Queen’s University Belfast, and Plexal, alongside government agencies such as GCHQ, the National Cyber Security Centre, and the MOD’s Defence Science and Technology Laboratory. Partnerships will extend to NATO allies and Five Eyes countries, fostering an international approach to AI security.

In addition to LASR, the government announced a £1 million incident response project to help allies respond more effectively to cyberattacks. This initiative will further enhance international cooperation in managing cyber incidents.

The official communication highlights that this announcement aligns with the government’s broader agenda, including the forthcoming Cyber Security and Resilience Bill (to be introduced to Parliament in 2025) and the designation of data centres as critical national infrastructure (CNI) to secure the UK’s position as a global leader in cybersecurity and AI innovation.

Italy targets cybercrime with tough new measures

Italy is ramping up its fight against cybercrime with a draft decree aimed at tackling unauthorised access to sensitive computer systems. The move follows high-profile breaches, including incidents involving state and financial databases, prompting urgent government action. The legislation, which will be discussed by the cabinet on 25 November 2024, focuses on systems critical to military, public safety, health, and civil protection.

The draft gives Italy’s chief anti-mafia prosecutor expanded authority to oversee investigations into cases of extortion linked to data breaches. This comes on the heels of several arrests tied to illicit access to state systems, with dozens more under investigation, including individuals connected to prominent figures like Leonardo Maria Del Vecchio.

Separately, authorities in Bari are probing a potential breach at Italy‘s largest bank, Intesa Sanpaolo, which may have compromised Prime Minister Giorgia Meloni’s account. These incidents underscore the urgency of the proposed crackdown as Italy seeks to safeguard its digital infrastructure.

Senator labels reported China-linked hack on US telecoms as historic breach

US authorities have revealed a massive cyberattack on American telecommunications networks, describing it as the ‘worst telecom hack in our nation’s history.’ Linked to Chinese hackers, the breach targeted multiple telecom companies and allowed the interception of surveillance data meant for US law enforcement. According to a joint FBI and CISA statement, the hackers accessed sensitive call records and communications, particularly involving individuals in government and political roles.

The attack also raised alarms after reports suggested telephones belonging to Donald Trump, JD Vance, and other high-profile political figures were compromised. Senator Mark Warner, chairman of the Senate Intelligence Committee, warned that China’s long-term efforts to infiltrate global telecom systems pose a grave security risk. Hackers reportedly managed to listen to phone calls and read text messages, going beyond what the Biden administration has publicly acknowledged.

China has consistently denied allegations of hacking foreign systems, and its embassy in Washington declined to comment on the latest claims. Warner criticised the lack of sufficient safeguards, stating, “The barn door is still wide open,” as concerns over US telecom infrastructure security intensify.

South Korea links 2019 crypto heist to North Korea

South Korean police have confirmed that hackers linked to North Korea’s military intelligence agency were behind a 2019 Ethereum cryptocurrency theft valued at 58 billion won ($41.5 million at the time). Hackers infiltrated a crypto exchange and stole 342,000 Ethereum tokens, which are now worth over 1.4 trillion won ($1 billion).

The stolen funds were laundered through three hacker-controlled crypto exchanges and 51 other platforms, according to South Korea’s National Police Agency. While the exchange targeted was not officially named, South Korea-based Upbit had reported a similar transfer to an unidentified wallet during the incident. The investigation, conducted with the FBI, used IP address analysis and asset tracking to trace the theft to groups reportedly tied to North Korea’s Reconnaissance General Bureau.

This marks the first confirmed instance of North Korean hackers targeting a South Korean crypto exchange. Previously, a UN report linked North Korea to nearly $3.6 billion in crypto heists from 2017 to 2024. South Korean investigators recovered a small fraction of the stolen assets, equivalent to 600 million won, which were returned to the exchange. North Korea denies involvement in such activities despite mounting evidence to the contrary.

EU Council affirms international law’s role in cyberspace with new declaration

The EU Council, along with its member states, has adopted a declaration for the first time on this specific topic establishing a unified understanding of how international law applies to cyberspace. This declaration underscores that cyberspace is not a lawless realm and reaffirms that international law, including the UN Charter, international human rights law, and international humanitarian law, is fully applicable to activities conducted in cyberspace.

The declaration highlights the escalating threat of malicious cyber activities, such as ransomware, which have grown in scale, sophistication, and impact, posing significant risks to European societies and economies. Recognising these challenges, the EU emphasizes that adherence to the UN framework of responsible state behavior in cyberspace is essential for preserving international peace, security, and stability.

In the declaration, the EU and its member states have commented on principle of non-intervention, state sovereignty, due diligence, attribution, and countermeasures. In particular, the document highlights that “States exercise territorial jurisdiction over Information and Communications Technology (ICT)
infrastructure located in their territory, and persons engaged in cyber activities, within their territory”.

The official press release notes that the declaration’s foundation was laid in April 2024, when the European External Action Service (EEAS) presented a non-paper on the topic. After careful deliberation and collaboration between the Horizontal Working Party on Cyber Issues (HWPCI) and the Working Party on Public International Law (COJUR), the text was finalized and approved by the Permanent Representatives Committee (COREPER) on 13 November 2024.