EU targets eight members states over cybersecurity directive implementation delay

Eight EU countries, including Ireland, Spain, France, Bulgaria, Luxembourg, the Netherlands, Portugal, and Sweden, have been warned by the European Commission for failing to meet the deadline on the implementation of the NIS2 Directive.

What is the NIS2 Directive about?

The NIS2 Directive, adopted by the EU in 2022, is an updated legal framework designed to strengthen the cybersecurity and resilience of critical infrastructure and essential services. Essentially, this directive replaces the 2016 NIS Directive, the EU’s first legislation to improve cybersecurity across crucial sectors such as energy, transport, banking, and healthcare. It set baseline security and incident reporting requirements for critical infrastructure operators and digital service providers to enhance the overall resilience of network and information systems in the EU.

With the adoption of the NIS2 Directive, the EU aims to broaden the scope to include not only traditional sectors like energy, transport, banking, and healthcare, but also public administration, space, manufacturing of critical products, food production, postal services, and a wide range of digital service providers.

NIS2 introduces stricter risk management, supply-chain security requirements, and enhanced incident reporting rules, with early warnings due within 24 hours. It increases management accountability, requiring leadership to oversee compliance and undergo cybersecurity training.

It also imposes heavy penalties for violations, including up to €10 million or 2% of global annual turnover for essential entities. The Directive also aims to strengthen EU-level cooperation through bodies like ENISA and EU-CyCLONe.

Member States were expected to transpose NIS2 into national law by 17 October 2024, making timely compliance preparation critical.

What is a directive?

There are two main types of the EU laws: regulations and directives. Regulations apply automatically and uniformly across all member states once adopted by the EU.

In contrast, directives set specific goals that member states must achieve but leave it up to each country to decide how to implement them, allowing for different approaches based on each member state’s capacities and legal systems.

So, why is there a delay in implementing the NIS2 Directive?

According to Insecurity Magazine, the delay is due to member states’ implementation challenges, and many companies across the EU are ‘not fully ready to comply with the directive.’ Six critical infrastructure sectors are facing challenges, including:

  • IT service management is challenged by its cross-border nature and diverse entities
  • Space, with limited cybersecurity knowledge and heavy reliance on commercial off-the-shelf components
  • Public administrations, which “lack the support and experience seen in more mature sectors”
  • Maritime, facing operational technology-related challenges and needing tailored cybersecurity risk management guidance
  • Health, relying on complex supply chains, legacy systems, and poorly secured medical devices
  • Gas, which must improve incident readiness and response capabilities

The deadline for the implementation was 17 October 2024. In May 2025, the European Commission warned 19 member states about delays, giving them two months to act or risk referral to the Court of Justice of the EU. It remains unclear whether the eight remaining holdouts will face further legal consequences.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Data breach hits cervical cancer screening programme

Hackers have stolen personal and medical information from nearly 500,000 participants in the Netherlands’ cervical cancer screening programme. The attack targeted the NMDL laboratory in Rijswijk between 3 and 6 July, but authorities were only informed on 6 August.

Data includes names, addresses, birth dates, citizen service numbers, possible test results and healthcare provider details. For some victims, phone numbers and email addresses were also stolen. The lab, owned by Eurofins Scientific, has suspended operations while a security review occurs.

The Dutch Population Screening Association has switched to a different laboratory to process future tests and is warning those affected of the risk of fraud. Local media reports suggest hackers may also have accessed up to 300GB of data on other patients from the past three years.

Security experts say the breach underscores the dangers of weak links in healthcare supply chains. Victims are now being contacted by the authorities, who have expressed regret for the distress caused.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Turkish authorities detain Ethereum developer amid legal probe

Ethereum developer Federico Carrone, known as Fede’s Intern, was detained in Turkey over allegations of helping misuse the Ethereum network. The incident happened at Izmir airport, where authorities informed him of a pending criminal charge likely linked to his privacy protocol work.

After intervention from the Ethereum community and legal support, Carrone was released and allowed to leave. The case seems tied to blockchain privacy tools, which face rising government scrutiny.

Carrone’s team previously came under attention for Tutela, a study on Ethereum and Tornado Cash user privacy. He emphasised that creating privacy code does not make developers criminals, comparing it to blaming software creators for misuse.

Growing legal challenges face developers building privacy and self-custody tools. Tornado Cash co-founder Alexey Roman recently received a criminal conviction and may face prison.

Crypto advocates warn lawsuits against developers risk stifling innovation and highlight ongoing legal uncertainty.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot

Ministers urged to forge a secure path for UK government’s digital future

TechUK has issued a comprehensive framework to guide the UK government’s digital transformation, emphasising the importance of secure technological progress as a national imperative.

The proposal outlines three foundational pillars: shaping digital regulation, strengthening countries and regions through digital investment, and advancing international digital trade.

It also calls for sweeping investments in digital skills to ensure citizens are prepared for the digital era. The trade body underscores the need for a digitally confident workforce to sustain the nation’s tech-driven ambitions.

Taken together, these recommendations aim to keep the UK a competitive and resilient digital economy that works for all citizens, supports sustainable growth, and adapts confidently to evolving global digital realities.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

US charges four over global romance scam and BEC scheme

Four Ghanaian nationals have been extradited to the United States over an international cybercrime scheme that stole more than $100 million, allegedly through sophisticated romance scams and business email compromise (BEC) attacks targeting individuals and companies nationwide.

The syndicate, led by Isaac Oduro Boateng, Inusah Ahmed, Derrick van Yeboah, and Patrick Kwame Asare, used fake romantic relationships and email spoofing to deceive victims. Businesses were targeted by altering payment details to divert funds.

US prosecutors say the group maintained a global infrastructure, with command and control elements in West Africa. Stolen funds were laundered through a hierarchical network to ‘chairmen’ who coordinated operations and directed subordinate operators executing fraud schemes.

Investigators found the romance scams used detailed victim profiling, while BEC attacks monitored transactions and swapped banking details. Multiple schemes ran concurrently under strict operational security to avoid detection.

Following their extradition, three suspects arrived in the United States on 7 August 2025, arranged through cooperation between US authorities and the Economic and Organised Crime Office of Ghana.

Would you like to learn more about AI, tech, and digital diplomacy? If so, ask our Diplo chatbot!

Trump’s potential Nvidia deal with China raises national security risks

The US President Donald Trump has shattered decades of US national security precedent by striking a deal with Nvidia and AMD that allows the sale of certain banned AI chips to China, but at a certain price.

In an arrangement without modern parallels, the companies will resume exports of their H20 processors to the Chinese market in exchange for giving the US government a 15% share of related revenues.

The move reopens a channel for sensitive technology sales and introduces a transactional element into what had long been treated as a matter of uncompromising national security.

For decades, Washington’s export controls on strategic technologies were blunt instruments: if a product was deemed too sensitive, no amount of corporate lobbying or lost revenue could override the ban.

Trump’s approach breaks from that tradition, effectively monetising access to restricted technologies. He has even floated the idea of allowing a weakened version of Nvidia’s cutting-edge Blackwell chip to be sold in China, a possibility that has set off alarm bells among national security hawks.

Republican and Democratic lawmakers have condemned the decision, warning it risks transforming US security policy into a ‘pay-for-play’ system.

Representative John Moolenaar, who chairs the House Select Committee on China, argued that export controls should remain a first line of defence against adversaries, not a bargaining chip. His Democratic counterpart, Raja Krishnamoorthi, cautioned that putting a dollar value on national security sends the wrong message to both allies and rivals.

The Trump administration has defended the arrangement by downplaying the risk. Commerce Secretary Howard Lutnick called the H20 Nvidia’s ‘fourth-best’ chip, noting that it is already widely used in China. The administration also framed the move to keep Chinese companies tied to US technology rather than turning to rival suppliers. Yet questions loom over the legality of the revenue-sharing scheme.

Trade experts have raised the possibility that it could be interpreted as an export tax, something the US Constitution prohibits, though details of the agreement remain opaque.

Beyond legal debates, the financial implications are significant. Analysts predict the levy could cut gross margins on China-bound chips by as much as 15 percentage points, trimming overall profitability for Nvidia and AMD.

In turn, this change of course could prompt other US companies selling strategic goods to China, from aerospace to advanced materials, to wonder if they too will face similar revenue-sharing requirements.

For some, it could be a costly burden; for others, it might be the only way to retain access to China’s lucrative market.

Would you like to learn more about AI, tech and digital diplomacyIf so, ask our Diplo chatbot!

University of Western Australia hit by password breach

The University of Western Australia has ordered a mass password reset for all staff and students after detecting unauthorised access to stored password data.

The incident was contained over the weekend by the university’s IT and security teams, who then moved to recovery and investigation. Australian authorities have been notified.

While no other systems are currently believed to have been compromised, access to UWA services remains locked until credentials are changed.

The university has not confirmed if its central access management system was targeted.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Trump weighs scaled-down Nvidia chip sales to China

President Donald Trump has signalled that he may permit Nvidia to sell a toned-down version of its latest Blackwell AI chip to China, which could substantially shift US tech export policy.

The idea, still under discussion with Nvidia CEO Jensen Huang, would involve reducing the chip’s computing power by 30% to 50%, creating what Trump described as an ‘unenhanced’ model for the Chinese market. While framed as a compromise, critics warn that even these stripped-down chips could fuel Beijing’s AI ambitions.

The announcement follows an unprecedented agreement between the Trump administration, Nvidia, and AMD, under which the US government would collect 15% of revenue from certain AI chip sales to China.

Washington insiders have expressed unease, noting that, with enough scaled-down hardware, China could still build AI supercomputers capable of competing with or surpassing American capabilities.

Saif Khan, a former White House technology adviser, cautioned that the move could accelerate China’s path toward AI dominance, undoing years of strict export controls.

Currently, Nvidia’s most advanced chip approved for sale in China is the H20, built on older Hopper architecture. The H20 was specifically designed to comply with restrictions imposed under President Biden and entered the Chinese market in 2024.

Although shipments were halted earlier this year, the Trump administration recently granted clearance for exports to resume. Trump dismissed the H20 as ‘obsolete’ and claimed China had already mastered it, suggesting the new Blackwell variant would offer a fresh revenue stream while staying within national security boundaries.

Nvidia’s flagship US Blackwell chip, unveiled in March 2024, is up to 30 times faster than its predecessor, making it a significant leap in AI performance. Details about the proposed Chinese variant remain undisclosed, but Reuters previously reported it would come at a lower cost and reduced power.

The US Commerce Department has begun issuing licenses for the H20, with officials insisting these exports do not threaten national security.

For Nvidia and AMD, the deal represents a rare case of direct government revenue-sharing tied to foreign sales, reflecting Trump’s hands-on approach to corporate negotiations. His administration has previously pressured tech executives to prioritise domestic manufacturing and has intervened in leadership appointments.

Nvidia, for its part, has stated it will follow all US export rules, while AMD confirmed receiving approval to ship some AI processors to China without directly addressing the revenue-sharing clause.

Beijing’s reaction so far has been muted. China’s foreign ministry declined to comment on the potential Blackwell deal but has repeatedly accused Washington of using technology controls to ‘maliciously contain and suppress’ Chinese industry.

Would you like to learn more about AI, tech and digital diplomacyIf so, ask our Diplo chatbot!

US Judiciary confirms cyberattack, moves to reinforce systems

The US Judiciary has confirmed suffering a cyberattack and says it is reinforcing systems to prevent further breaches. In a press release, it described ‘escalated cyberattacks of a sophisticated and persistent nature’ targeting its case management system and sensitive files.

Most documents in the judiciary’s electronic system are public; however, some contain confidential or proprietary information that is sealed from public view. The documents, it warned, are of interest to threat actors, prompting courts to introduce stricter controls on access under monitored conditions.

The Administrative Office of the US Courts is collaborating with Congress, the Department of Justice, the Department of Homeland Security, and other relevant agencies on security measures. No details were given on the exact methods of reinforcement.

The US court system has been a frequent target of cybercrime. Previous incidents include a 2020 federal court breach, a 2024 attack on Washington state courts, and a ransomware strike on the Los Angeles Superior Court in summer 2024.

Would you like to learn more about AI, tech, and digital diplomacy? If so, ask our Diplo chatbot!

AI-powered heist drains $1m from crypto wallets via Firefox add-ons

Hackers have stolen over $1 million in cryptocurrency using AI-generated malicious Firefox extensions disguised as legitimate wallet tools.

The group, known as GreedyBear, created over 150 fake add-ons for platforms like MetaMask and Phantom, bypassing security checks to drain funds from thousands of users. Analysts say AI enabled the attackers to automate coding and deployment at an industrial scale.

The theft comes amid a record-breaking year for crypto crime, with Chainalysis data showing over $2.17 billion stolen so far in 2025. Many incidents exploit smart contract flaws and human error, with access control attacks accounting for the most recent losses.

Security experts warn that AI is now a double-edged sword, helping attackers and defenders. They urge exchanges, developers, and users to adopt AI-powered monitoring, stronger verification, and collaborative defences to restore trust in digital assets.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!