Romania has been subjected to ‘aggressive hybrid Russian attacks’ during a series of recent elections, according to declassified documents from the country’s security council. The revelations come ahead of a presidential runoff between pro-Russian far-right candidate Calin Georgescu and pro-European centrist Elena Lasconi. Georgescu’s unexpected rise, attributed in part to coordinated promotion on TikTok, has raised alarms in this European Union and NATO member state.
Romanian intelligence reported over 85,000 cyber attacks exploiting vulnerabilities, including the publication of election website access data on Russian cybercrime platforms. The attacks persisted on election day and beyond, with officials concluding they stemmed from resources typical of a state actor. Russia has denied any involvement in the election.
If Georgescu wins, his anti-NATO stance and opposition to aiding Ukraine could isolate Romania from Western allies, marking a significant geopolitical shift. The alleged cyber campaigns have intensified concerns about election integrity in the region, drawing attention to the role of foreign interference in shaping democratic outcomes.
Anduril Industries and OpenAI have announced a partnership to advance AI applications for US national security. The collaboration will focus on enhancing counter-unmanned aircraft systems (CUAS), crucial for detecting and neutralising airborne drone threats.
By leveraging Anduril’s extensive CUAS data, AI models will be trained to respond to aerial threats in real time. OpenAI’s CEO, Sam Altman, highlighted the goal of safeguarding military personnel through these advanced AI solutions.
This partnership reflects the escalating global competition in AI-powered autonomous defence technologies, as nations like the United States and China race to innovate in automated military systems. Founded in 2017, Anduril specialises in autonomous systems, including drones and other tactical assets.
With organisations facing an average of 1,300 cyberattacks per week, Axiado is stepping up with a novel defence: a specialised security chip designed to protect digital infrastructure. Founded in 2017, the Silicon Valley-based startup recently secured $60M in Series C funding led by Maverick Silicon, with participation from Samsung Catalyst Fund and other investors. This brings Axiado’s total funding to $140M.
Axiado’s chip defends against boot-level and runtime security threats, ensuring the integrity of devices from data centres to 5G base stations. It uses root-of-trust technology to prevent hardware tampering and leverages AI-powered analytics to detect malicious data patterns. The company’s chip is positioned as a complement to existing software-based cybersecurity measures, acting as a last line of defence against sophisticated attacks.
The new funds will support Axiado’s go-to-market efforts and help transition its products into mass production by 2025. CEO Gopi Sirineni highlights the growing need for hardware-based security solutions, particularly as the stakes rise in the fight against cybercrime. With partnerships like the one with Jabil to develop server cybersecurity solutions, Axiado is set to expand its reach while competing with industry heavyweights and open-source projects such as Google’s OpenTitan.
A senior United States cybersecurity official has urged Americans to embrace encryption to safeguard their communications, citing ongoing efforts to expel alleged Chinese hackers from US telecom networks. Jeff Greene, Executive Assistant Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), emphasised the importance of avoiding plaintext communications and recommending encrypted apps like Signal and WhatsApp.
US authorities have accused hackers from China of infiltrating telecommunications companies, such as T-Mobile, to access sensitive data, including call records and intercepted audio, predominantly from Washington, DC. Beijing has denied the allegations, calling them disinformation. Greene acknowledged that removing the hackers entirely from the networks could take an unpredictable amount of time, further underscoring the need for encryption to ensure secure communications.
The advice marks a notable shift from previous US government positions that questioned strong encryption’s impact on public safety. As concerns over foreign cyber intrusions grow, Greene’s remarks highlight encryption as a critical tool for Americans facing prolonged cybersecurity threats.
Hostile cyber activity targeting the UK has surged, with incidents increasing by 16% in 2024 compared to the previous year. The National Cyber Security Centre (NCSC) reported handling 430 incidents, up from 371 in 2023. Of these, 347 involved data exfiltration, while 20 were linked to ransomware, underscoring the growing risks.
Richard Horne from the NCSC revealed that adversaries are exploiting society’s reliance on technology to maximise disruption. The centre issued 542 notifications to affected organisations, more than doubling the number of alerts from the previous year. Critical infrastructure sectors such as energy, transport, and health remain particularly vulnerable to ransomware attacks.
The annual review from the NCSC emphasised the evolving nature of threats, warning of the potential for AI to enhance cyberattack complexity. Officials also noted that the risks posed by state actors and cybercriminals remain underestimated. Horne urged against complacency, highlighting the severity of both immediate and long-term dangers.
Efforts to counter these threats are intensifying, but experts stress the importance of strengthening defences and maintaining vigilance as the cyber landscape becomes increasingly hostile.
The UK faces an escalating cyber threat from hostile states and criminal gangs, according to Richard Horne, head of the National Cyber Security Centre (NCSC). In his first major speech, Horne warned that the severity of these risks is being underestimated, citing a significant rise in cyber incidents, particularly from Russia and China. He described Russia’s cyber activity as ‘aggressive and reckless’ while noting that China’s operations are highly sophisticated with growing global ambitions.
Over the past year, the NCSC responded to 430 cyber incidents, a marked increase from the previous year. Among them, 12 were deemed especially severe, a threefold rise from 2023. The agency highlighted the growing threats to critical infrastructure and supply chains, urging both public and private sectors to strengthen their cyber defences. The UK also faces a growing number of ransomware attacks, often originating from Russia, which target key organisations like the British Library and healthcare services.
Horne emphasised the human costs of cyber-attacks, citing how these incidents disrupt vital services like healthcare and education. The rise in ransomware, often linked to Russian criminal gangs, is a major concern, and the NCSC is working to address these challenges. The agency’s review also pointed to increasing cyber activity from China, Iran, and North Korea, with these states targeting the UK’s infrastructure and private sector.
Experts like Professor Alan Woodward of Surrey University echoed Horne’s concerns, urging the UK to step up its cybersecurity efforts to keep pace with evolving threats. With adversaries growing more sophisticated, the government and businesses must act swiftly to protect the country’s digital infrastructure.
Ukraine plans to acquire tens of thousands of uncrewed ground vehicles next year, aiming to enhance battlefield logistics and safety. These robotic platforms, already deployed near the front, will transport supplies, evacuate casualties, and keep soldiers away from dangerous zones. Deputy Prime Minister Mykhailo Fedorov highlighted the growing role of technology in mitigating risks along active conflict lines.
Advancements in military tech are reshaping Ukraine’s defence strategy. With increased production of long-range attack drones, Kyiv is narrowing the technological gap with Moscow. Ukraine has also adopted decoy drones to counter Russian tactics, alongside AI-driven systems to improve battlefield precision and reduce reliance on direct piloting.
Efforts are underway to innovate drone defences, including intercepting Russia’s Shahed drones. Autonomous technologies are expected to rise, with potential for early-stage drone swarm deployment. Fedorov noted the importance of connectivity and launch methods as Ukraine adapts to changing enemy responses.
Ukraine’s government-backed initiatives continue to support military innovation, fostering partnerships with private firms to scale up production and refine technologies. These developments mark a significant shift in how modern warfare is conducted, blending AI and robotics into entrenched combat scenarios.
The White House has engaged leading United States telecommunications executives in a high-level meeting to address a significant cyber-espionage campaign allegedly linked to China. National Security Adviser Jake Sullivan and Deputy Adviser Anne Neuberger hosted the meeting, seeking industry insights and strengthening government-private sector partnerships to counteract future cyber threats.
Earlier this month, US authorities disclosed that hackers, purportedly linked to China, accessed surveillance data meant for law enforcement by breaching multiple telecom companies. Senator Mark Warner described the breach as the ‘worst telecom hack in our nation’s history.’
Though the identities of the companies and executives involved remain undisclosed, the meeting underscores the urgency of cybersecurity improvements amid escalating threats from state-sponsored actors. While China has categorically denied involvement, the incident amplifies concerns over Beijing’s alleged cyber activities targeting critical US infrastructure.
The discussions aim to establish better safeguards against sophisticated attacks, reinforcing collaboration between federal agencies and the telecom sector to bolster national cyber resilience.
British businesses have lost an estimated £44 billion ($55 billion) in revenue over the past five years due to cyberattacks, with more than half of private sector companies experiencing at least one incident, according to a report by insurance broker Howden. Companies earning over £100 million annually faced the highest risk, with cyberattacks cutting 1.9% of revenue on average.
The report identified compromised emails (20%) and data theft (18%) as the leading causes of cyber incidents. Despite these risks, only 61% of businesses used anti-virus software, and just 55% had network firewalls, with cost and limited IT resources cited as major obstacles to better cybersecurity.
“Cybercrime is rising as businesses rely more on technology, exposing vulnerabilities to malicious actors,” said Sarah Neild, head of UK cyber retail at Howden. The findings are based on a September survey of 905 UK private-sector IT leaders conducted by YouGov.
According to Morgan Adamski, executive director of US Cyber Command, Chinese hackers are embedding themselves in US critical infrastructure IT networks to prepare for a potential conflict with the United States. He announced that China-linked cyber operations aim to secure strategic advantages in the event of a major clash.
These operations involve compromising key networks and positioning themselves to execute disruptive attacks. Examples include manipulating heating, ventilation, and air conditioning (HVAC) systems in server rooms or disrupting vital energy and water controls, officials said earlier this year.
Speaking at the Cyberwarcon security conference in Arlington, Virginia, Adamski emphasised the scale of the threat, noting that the US government has launched globally coordinated efforts to counter these operations. These efforts include offensive and defensive measures designed to degrade and disrupt China’s cyber activities worldwide. Actions range from exposing cyber campaigns to imposing sanctions and issuing cybersecurity advisories, with support from allied nations.
Earlier, US Senator Mark Warner described a suspected China-linked cyberespionage campaign, dubbed ‘Salt Typhoon,’ as the worst telecommunications hack in US history. Beijing has repeatedly denied conducting cyberattacks on US entities.