The White House met with major tech companies and civil society activists on Thursday to address the need for increased digital bandwidth for government-funded tools that help bypass internet censorship. Companies like Amazon, Google, Microsoft, and Cloudflare were encouraged to provide discounted or subsidised server bandwidth for virtual private networks (VPNs) supported by the US-backed Open Technology Fund (OTF).
The OTF has seen a dramatic increase in VPN usage due to rising internet censorship in countries like Russia, Iran, and Myanmar. The number of VPN users has surged from around nine million monthly to over 46 million, driven by heightened demand for privacy and access to uncensored information. Despite receiving additional funding from the US State Department, the OTF struggles to keep up with the increased demand due to high hosting costs.
The meeting aimed to address these challenges by persuading tech giants to help manage the growing need for VPN infrastructure. The OTF’s president, Laura Cunningham, highlighted the urgent need for support to sustain the surge in VPN usage and continue providing critical services to users in restrictive environments.
Colombian President Gustavo Petro has called for an investigation into the previous administration’s $11 million purchase of Pegasus spyware. He raised concerns that the spyware, known for hacking the phones of opposition figures and journalists, may have been used to target political opponents. Petro questioned how such a large sum of cash was transported to Israel to purchase this software designed to spy on private communications.
During a televised broadcast, Petro expressed concern about whether he or other politicians in Colombia were under surveillance, calling into question the legal justification for such actions. He has asked the Information and Analysis Unit (UIAF) and the police to provide relevant documents and hand over the software to the attorney general for a thorough investigation.
President Petro emphasised the need for transparency, stating that citizens must trust that the state respects their rights. He vowed to uncover the full details of the purchase and ensure accountability.
The US National Telecommunications and Information Administration (NTIA) has launched an inquiry to address the challenges surrounding US data centres’ growth, resilience, and security. This initiative is crucial in light of the increasing demand for computing power driven by advancements in AI and other emerging technologies. Currently, the US has over 5,000 data centres, with demand projected to grow by approximately 9% annually through 2030, highlighting their role as foundational elements of a secure technology ecosystem.
To effectively tackle these challenges, the NTIA has issued a Request for Comment (RFC) to solicit stakeholders’ input on various data centre growth issues. Key focus areas include supply chain resilience, access to trusted equipment, energy demands, and the need for a specialised workforce. The RFC also explores the implications of data centre modernisation on society and the necessary data security practices for facilities hosting AI models. Insights from this inquiry will help develop comprehensive policy recommendations supporting sustainable and resilient data centre growth.
The inquiry is being conducted in coordination with the Department of Energy (DOE), highlighting the importance of addressing energy challenges associated with data centres. The collaboration aims to ensure the US can meet the energy demands of expanding data centre infrastructure while promoting clean energy solutions. The feedback received from the RFC will inform a report that outlines actionable recommendations for the US government, ultimately fostering a robust data centre ecosystem capable of supporting future technological advancements.
The Australian Government has taken decisive action to enhance the Triple Zero emergency call service in response to the November 2023 Optus outage, which left many Australians unable to access this critical service. Minister for Communications of Australia, the Hon. Michelle Rowland MP, announced a comprehensive set of reforms to improve industry accountability and ensure public access to emergency services. These changes are being implemented through a Ministerial direction to the Australian Communications and Media Authority (ACMA), which will amend enforceable rules for mobile carriers.
The government has directed the ACMA to require mobile carriers to take all reasonable steps to ensure that emergency calls can be made on any available network during outages. This directive addresses the technical issues that prevented many Optus customers from reaching Triple Zero during the outage. Additionally, the government is mandating that providers improve the visibility of future outages for frontline emergency service organisations, thereby enhancing communication and preparedness during emergencies.
Also, the government is committed to implementing all 18 recommendations from the Post Incident Review of the Optus outage, the first comprehensive assessment of the Triple Zero ecosystem in over a decade. These recommendations include establishing a Triple Zero Custodian framework, requiring telecommunications carriers to provide detailed work plans after major outages, and creating a comprehensive testing regime for telecommunications networks and devices.
Latvian cybersecurity officials report that politically motivated hackers linked to Russia and Belarus are launching a new wave of cyberattacks against the Latvian government and critical infrastructure websites. The attacks aim to disrupt access rather than steal sensitive data, according to Baiba Kaskina, head of the Latvian Computer Emergency Response Team (CERT). Varis Teivans, deputy manager of Latvian CERT, highlighted this trend two years ago in an interview with Recorded Future News.
In August, the frequency of attacks surged again, likely in response to Latvia’s new aid package to Ukraine, which includes drones and air defense systems. Vineta Sprugaine, a representative of the Latvian State Radio and Television Center, noted that such attacks often coincide with political decisions or holidays.
Most of these incidents involve distributed denial-of-service (DDoS) attacks, which temporarily slow down targeted websites. Kaskina described the attacks as “very large” in volume and “well customized” to their targets.
Russia-linked hacktivist groups, including NoName057(16) and Anonymous Guys, have claimed responsibility for the recent cyberattacks on Latvian websites, asserting they are retaliating against Latvia for supporting Ukraine. NoName057(16) declared on Telegram, “We continue to punish Russophobic Latvia for aiding the criminal Kyiv regime.”
Baiba Kaskina acknowledged that while Latvia is ‘well prepared’ for these attacks, the constantly evolving tactics of the hackers make them challenging to combat. She described the attacks on Latvia and other Baltic states as part of a ‘hybrid war’ aimed at creating societal panic and eroding trust in government institutions.
The Indian government maintains strict restrictions on Chinese telecom equipment manufacturers like ZTE and Huawei, citing security concerns. Despite ZTE’s recent proposal to partner with Celkon Resolute to manufacture routers in Andhra Pradesh, the government’s stance remains unchanged. This is due to the National Security Directive, which prohibits using equipment from ‘non-trusted sources’ in India’s telecom networks, effectively barring these companies from participating in the 5G rollout and limiting their involvement in existing networks.
The ‘trusted sources’ policy enforced by the National Cyber Security Coordinator (NCSC) is central to the issue. ZTE and Huawei still need to meet the stringent compliance requirements, which include detailed disclosures about their operations and products. As a result, they remain excluded from India’s telecom projects. The Department of Telecommunications (DoT) has also asked operators to assess and report the use of non-trusted equipment in their networks, further limiting these companies’ prospects.
Although ZTE can manufacture consumer Wi-Fi equipment in India, these products can only be used in telecom networks with NCSC approval. The ZTE-Celkon partnership has stalled due to a lack of progress and clarity from the government. Despite some recent relaxations for Chinese companies in other sectors, the telecom equipment industry remains tightly regulated, with little chance of relief for ZTE and Huawei amid ongoing geopolitical tensions and cybersecurity concerns.
The Telecom Regulatory Authority of India (TRAI) and Google have introduced new regulations to enhance user security and reduce spam. These changes are particularly significant for mobile users in India, focusing on improving the safety of online transactions and the quality of applications available for download. By implementing these measures, TRAI and Google are taking proactive steps to safeguard digital interactions, ensuring users can navigate their smartphones with greater confidence and security.
A key component of this initiative is TRAI’s new directive to combat spam calls and fraudulent messages. That regulation requires telecom operators to block unregistered numbers immediately, which is intended to protect users from scams. However, this measure may delay receiving one-time passwords (OTPs) during online transactions, as institutions like banks must register and allow their numbers to continue sending OTPs without interruption. While this could cause minor inconveniences, it is a crucial step toward preventing fraudulent activities and enhancing overall security for users.
In conjunction with TRAI’s efforts, Google has ramped up its policies to remove low-quality and potentially harmful apps from its Play Store. The following initiative aims to mitigate risks associated with malware and ensure that only trustworthy applications are accessible to users. By eliminating these problematic apps, Google creates a safer environment for users to download and use applications without compromising their personal information. The crackdown on low-quality apps is expected to significantly reduce the risk of malware, providing a more secure digital experience for all users.
Halliburton, a US oilfield services company, revealed that its systems were breached by an unauthorised third party in an August cyberattack. The company acknowledged that data was accessed and removed but stated that the incident is not expected to impact its operations significantly. Halliburton has not disclosed the specific nature of the stolen data or the costs related to the breach.
In response to the attack, Halliburton activated its cybersecurity response plan and launched an investigation with the help of external advisors to assess the damage and prevent further unauthorised activity. The breach caused disruptions and limited access to some of the company’s business applications. This incident highlights ongoing cybersecurity challenges faced by US energy firms, which multiple cyberattacks have targeted in recent years.
CrowdStrike is set to reveal the financial impact of a significant cyber outage that disrupted Microsoft’s Windows operating system last month. The incident, caused by a faulty software update, led to global disruptions, affecting various sectors, including aviation and healthcare.
The outage has sparked lawsuits, including one from Delta Air Lines, and has raised concerns about potential market share losses to rivals.
Following the outage, many customers have reconsidered their cybersecurity options. Competitors like Palo Alto Networks have seized the opportunity, offering discounts to attract customers, which analysts believe may have chipped away at CrowdStrike’s market share. Over half of the company’s brokerages have reduced their annual revenue estimates, anticipating that CrowdStrike may lower its forecast.
Despite the challenges, CrowdStrike remains a dominant player in the cybersecurity industry. Some analysts believe the financial hit from the outage will be short-lived, given the high costs associated with switching providers and the company’s efforts to assist customers in restoring their systems. Shares of CrowdStrike have declined by about 20% since the outage, yet the stock is still up over 5% for the year.
As CrowdStrike prepares to report a 31% revenue increase for the quarter ending in July, its focus is on regaining trust and solidifying its position in the market. The company will also participate in a Microsoft summit in September aimed at enhancing cybersecurity measures, which could be crucial in repairing its reputation.
According to Lumen Technologies, a Chinese hacking group has exploited a software flaw, compromising several internet companies in the US and abroad. Researchers at Lumen revealed that the hackers targeted a previously unknown vulnerability in Versa Director, a software platform used by Santa Clara-based Versa Networks. The attack began early in June and affected four US firms and one in India.
Versa Networks acknowledged the flaw and urged customers to update their software. Lumen’s researchers believe the hacking campaign was conducted by the Chinese government-backed group, ‘Volt Typhoon.’
Allegedly, the attackers aimed to surveil the customers of the compromised internet companies. Cybersecurity experts warn that such access could enable broad, undetected surveillance.
The US Cybersecurity and Infrastructure Security Agency added the Versa vulnerability to its list of known exploited weaknesses. Concerns over China’s cyber activities have grown, with US officials noting an increase in the intensity of these efforts. In April, the FBI warned that China was developing the capability to disrupt critical infrastructure.