NVIDIA drives a new era of industrial AI cybersecurity

AI-driven defences are moving deeper into operational technology as NVIDIA leads a shift toward embedded cybersecurity across critical infrastructure.

The company is partnering with firms such as Akamai Technologies, Forescout, Palo Alto Networks, Siemens and Xage Security to protect energy, manufacturing and transport systems that increasingly operate through cloud-linked environments.

Modernisation has expanded capabilities across these sectors, yet it has widened the gap between evolving threats and ageing industrial defences.

Zero-trust adoption in operational environments is gaining momentum as Forescout and NVIDIA develop real-time verification models tailored to legacy devices and safety-critical processes.

Security workloads run on NVIDIA BlueField hardware to keep protection isolated from industrial systems and avoid any interference with essential operations. That approach enables more precise control over lateral movement across networks without disrupting performance.

Industrial automation is also adapting through Siemens and Palo Alto Networks, which are moving security enforcement closer to workloads at the edge. AI-enabled inspection via BlueField enhances visibility in highly time-sensitive environments, improving reliability and uptime.

Akamai and Xage are extending similar models to energy infrastructure and large-scale operational networks, embedding segmentation and identity-based controls where resilience is most critical.

A coordinated architecture is now emerging in which edge-generated operational data feeds central AI analysis, while enforcement remains local to maintain continuity.

The result is a security model designed to meet the pressures of cyber-physical systems, enabling operators to detect threats faster, reinforce operational stability and protect infrastructure that supports global AI expansion.

Would you like to learn more about AI, tech and digital diplomacyIf so, ask our Diplo chatbot!  

Gabon imposes indefinite social media shutdown over national security concerns

Gabon’s media regulator, the High Authority for Communication (HAC), has announced a nationwide open-ended suspension of social media, citing online content that it says is fueling tensions and undermining social cohesion. In a statement, the HAC framed the move as a response to material it described as defamatory or hateful and, in some cases, a threat to national security, telling telecom operators and internet service providers to block access to major platforms.

The regulator pointed to what it called a rise in coordinated cyberbullying and the unauthorised sharing of personal data, saying existing moderation measures were not working and that the shutdown was necessary to stop violations of Gabon’s 2016 Communications Code.

The announcement arrives amid mounting labour pressure. Teachers began a high-profile strike in December 2025 over pay, status and working conditions, and the dispute has become one of the most visible signs of broader public-sector discontent. At the same time, the economic stakes are significant: Gabon had an estimated 850,000 active social media users in late 2025 (around a third of the population), and platforms are widely used for marketing and small-business sales.

Why does it matter?

Governments increasingly treat social media suspensions as a rapid-response tool for ‘public order’, but they also reshape information access, civic debate and commerce, especially in countries where mobile apps are a primary channel for news and income. The current announcement comes at a politically sensitive moment, since Gabon has a precedent here: during the 2023 election period, authorities shut down internet access, citing the need to counter calls for violence and misinformation. Gabon is still in transition after the August 2023 coup, and President Brice Oligui Nguema, who led the takeover, won the subsequent presidential election by a landslide in 2025, consolidating power while facing rising expectations for reform and stability.

Would you like to learn more about AI, tech and digital diplomacyIf so, ask our Diplo chatbot!

Germany drafts reforms expanding offensive cyber powers

Politico reports that Germany is preparing legislative reforms that would expand the legal framework for conducting offensive cyber operations abroad and strengthen authorities to counter hybrid threats.

According to the Interior Ministry, two draft laws are under preparation:

  • One would revise the mandate of Germany’s foreign intelligence service to allow cyber operations outside national territory.
  • A second would grant security services expanded powers to fight back against hybrid threats and what the government describes as active cyber defense.

The discussion in Germany coincides with broader European debates on offensive cyber capabilities. In particular, the Netherlands have incorporated offensive cyber elements into national strategies.

The reforms in Germany remain in draft form and may face procedural and constitutional scrutiny. Adjustments to intelligence mandates could require amendments supported by a two-thirds majority in both the Bundestag and Bundesrat.

The proposed framework for ‘active cyber defense’ would focus on preventing or mitigating serious threats. Reporting by Tagesschau ndicates that draft provisions may allow operational follow-up measures in ‘special national situations,’ particularly where timely police or military assistance is not feasible.

Opposition lawmakers have raised questions regarding legal clarity, implementation mechanisms, and safeguards. Expanding offensive cyber authorities raises longstanding policy questions, including challenges of attribution to identify responsible actors; risks of escalation or diplomatic repercussions; oversight and accountability mechanisms; and compatibility with international law and norms of responsible state behaviour.

The legislative process is expected to continue through the year, with further debate anticipated in parliament.

Would you like to learn more about AI, tech, and digital diplomacy? If so, ask our Diplo chatbot!

Shadow AI becomes a new governance challenge for European organisations

Employees are adopting generative tools at work faster than organisations can approve or secure them, giving rise to what is increasingly described as ‘shadow AI‘. Unlike earlier forms of shadow IT, these tools can transform data, infer sensitive insights, and trigger automated actions beyond established controls.

For European organisations, the issue is no longer whether AI should be used, but how to regain visibility and control without undermining productivity, as shadow AI increasingly appears inside approved platforms, browser extensions, and developer tools, expanding risks beyond data leakage.

Security experts warn that blanket bans often push AI use further underground, reducing transparency and trust. Instead, guidance from EU cybersecurity bodies increasingly promotes responsible enablement through clear policies, staff awareness, and targeted technical controls.

Key mitigation measures include mapping AI use across approved and informal tools, defining safe prompt data, and offering sanctioned alternatives, with logging, least-privilege access, and approval steps becoming essential as AI acts across workflows.

With the EU AI Act introducing clearer accountability across the AI value chain, unmanaged shadow AI is also emerging as a compliance risk. As AI becomes embedded across enterprise software, organisations face growing pressure to make safe use the default rather than the exception.

Would you like to learn more about AI, tech, and digital diplomacy? If so, ask our Diplo chatbot!

Japan and the United Kingdom expand cybersecurity cooperation

Japan and the United Kingdom have formalised a Strategic Cyber Partnership focused on strengthening cooperation in cybersecurity, including information sharing, defensive capabilities, and resilience of critical infrastructure. In related high-level discussions between the two leaders, Japan and the UK also agreed on the need to work with like-minded partners to address vulnerabilities in critical mineral supply chains.

The Strategic Cyber Partnership outlines three core areas of cooperation:

  • sharing cyber threat intelligence and enhancing cyber capabilities;
  • supporting whole-of-society resilience through best practices on infrastructure and supply chain protection and alignment on regulatory and standards issues;
  • collaborating on workforce development and emerging cyber technologies.

The agreement is governed through a joint Cyber Dialogue mechanism and is non-binding in nature.

Separately, at a summit meeting in Tokyo, the leaders noted the importance of strengthening supply chains for minerals identified as critical for modern industry and technology, and agreed to coordinate efforts with other partners on this issue.

Would you like to learn more about AI, tech and digital diplomacyIf so, ask our Diplo chatbot!

AI-driven scams dominate malicious email campaigns

The Catalan Cybersecurity Agency has warned that generative AI is now being used in the vast majority of email scams containing malicious links. Its Cybersecurity Outlook Report for 2026 found that more than 80% of such messages rely on AI-generated content.

The report shows that 82.6% of emails carrying malicious links include text, video, or voice produced using AI tools, making fraudulent messages increasingly difficult to identify. Scammers use AI to create near-flawless messages that closely mimic legitimate communications.

Agency director Laura Caballero said the sophistication of AI-generated scams means users face greater risks, while businesses and platforms are turning to AI-based defences to counter the threat.

She urged a ‘technology against technology’ approach, combined with stronger public awareness and basic security practices such as two-factor authentication.

Cyber incidents are also rising. The agency handled 3,372 cases in 2024, a 26% increase year on year, mostly involving credential leaks and unauthorised email access.

In response, the Catalan government has launched a new cybersecurity strategy backed by a €18.6 million investment to protect critical public services.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot

Fake AI assistant steals OpenAI credentials from thousands of Chrome users

A Chrome browser extension posing as an AI assistant has stolen OpenAI credentials from more than 10,000 users. Cybersecurity platform Obsidian identified the malicious software, known as H-Chat Assistant, which secretly harvested API keys and transmitted user data to hacker-controlled servers.

The extension, initially called ChatGPT Extension, appeared to function normally after users provided their OpenAI API keys. Analysts discovered that the theft occurred when users deleted chats or logged out, triggering the transmission of credentials via hardcoded Telegram bot credentials.

At least 459 unique API keys were exfiltrated to a Telegram channel months before they were discovered in January 2025.

Researchers believe the malicious activity began in July 2024 and continued undetected for months. Following disclosure to OpenAI on 13 January, the company revoked compromised API keys, though the extension reportedly remained available in the Chrome Web Store.

Security analysts identified 16 related extensions sharing the identical developer fingerprints, suggesting a coordinated campaign by a single threat actor.

LayerX Security consultant Natalie Zargarov warned that whilst current download numbers remain relatively low, AI-focused browser extensions could rapidly surge in popularity.

The malicious extensions exploit vulnerabilities in web-based authentication processes, creating, as researchers describe, a ‘materially expanded browser attack surface’ through deep integration with authenticated web applications.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot

UK firms prioritise cyber resilience and AI growth

Cybersecurity is set to receive the largest budget increases over the next 12 months, as organisations respond to rising geopolitical tensions and a surge in high-profile cyber-attacks, according to the KPMG Global Tech Report 2026.

More than half of UK firms plan to lift cybersecurity spending by over 10 percent, outpacing global averages and reflecting heightened concern over digital resilience.

AI and data analytics are also attracting substantial investment, with most organisations increasing budgets as they anticipate stronger returns by the end of 2026. Executives expect AI to shift from an efficiency tool to a core revenue driver, signalling a move toward large-scale deployment.

Despite strong investment momentum, scaling remains a major challenge. Fewer than one in 10 organisations report fully deployed AI or cybersecurity systems today, although around half expect to reach that stage within a year.

Structural barriers, fragmented ownership, and unclear accountability continue to slow execution, highlighting the complexity of translating strategy into operational impact.

Agentic AI is emerging as a central focus, with most organisations already embedding autonomous systems into workflows. Demand for specialist AI roles is rising, alongside closer collaboration to ensure secure deployment, governance, and continuous monitoring.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot

Ten cybersecurity predictions for 2026 from experts: How AI will reshape cyber risks

Evidence from threat intelligence reporting and incident analysis in 2025 suggests that AI will move from experimental use to routine deployment in malicious cyber operations in 2026. Rather than introducing entirely new threats, AI is expected to accelerate existing attack techniques, reduce operational costs for attackers, and increase the scale and persistence of campaigns.

Security researchers and industry analysts point to ten areas where AI is most likely to reshape the cyber threat landscape over the coming year:

  1. AI-enabled malware is expected to adapt during execution. Threat intelligence reporting indicates that malware using AI models is already capable of modifying behaviour in real time. In 2026, such capabilities are expected to become more common, allowing malicious code to adjust tactics in response to defensive measures.
  2. AI agents are likely to automate key stages of cyberattacks. Researchers expect wider use of agentic AI systems that can independently conduct reconnaissance, exploit vulnerabilities, and maintain persistence, reducing the need for continuous human control.
  3. Prompt injection will be treated as a practical attack technique against AI deployments. As organisations embed AI assistants and agents into workflows, attackers are expected to target the AI layer itself (e.g. through prompt injection, unsafe tool use, and weak guardrails) to trigger unintended actions or expose data.
  4. Threat actors will use AI to target humans at scale. The text emphasises AI-enhanced social engineering: conversational bots, real-time manipulation, and automated account takeover, shifting attacks from isolated human-led attempts to continuous, scalable interaction.
  5. AI will expose APIs as a too-easily-exploited attack surface. The experts argue that AI agents capable of discovering and interacting with software interfaces will lower the barrier to abusing APIs, including undocumented or unintended ones. As agents gain broader permissions and access to cloud services, APIs are expected to become a more frequent point of exploitation and concealment.
  6. Extortion will evolve beyond ransomware encryption. Extortion campaigns are expected to rely less on encryption alone and more on a combination of tactics, including data theft, threats to leak or alter information, and disruption of cloud services, backups, and supply chains.
  7. Cyber incidents will increasingly spread from IT into industrial operations. Ransomware and related intrusions are expected to move beyond enterprise IT systems and disrupt operational technology and industrial control environments, amplifying downtime, supply-chain disruption, and operational impact.
  8. The insider threat will increasingly include imposter employees. Analysts anticipate insider risks will extend beyond malicious or negligent staff to include external actors who gain physical or remote access by posing as legitimate employees, including through hardware implants or direct device access that bypasses end point security.
  9. Nation-state cyber activity will continue to target Western governments and industries. Experts point to continued cyber operations by state-linked actors, including financially motivated campaigns and influence operations, with increased use of social engineering, deception techniques, and AI-enabled tools to scale and refine targeting.
  10. Identity management is expected to remain a primary failure point. The rapid growth of human and machine identities, including AI agents, across SaaS, cloud platforms and third-party environments is likely to reinforce credential misuse as a leading cause of major breaches.

Taken together, these trends suggest that in 2026, cyber risk will increasingly reflect systemic exposure created by the combination of AI adoption, identity sprawl, and interconnected digital infrastructure, rather than isolated technical failures.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

EU cyber rules target global tech dependence

The European Union has proposed new cybersecurity rules aimed at reducing reliance on high-risk technology suppliers, particularly from China. In the European Union, policymakers argue existing voluntary measures failed to curb dependence on vendors such as Huawei and ZTE.

The proposal would introduce binding obligations for telecom operators across the European Union to phase out Chinese equipment. At the same time, officials have warned that reliance on US cloud and satellite services also poses security risks for Europe.

Despite increased funding and expanded certification plans, divisions remain within the European Union. Countries including Germany and France support stricter sovereignty rules, while others favour continued partnerships with US technology firms.

Analysts say the lack of consensus in the European Union could weaken the impact of the reforms. Without clear enforcement and investment in European alternatives, Europe may struggle to reduce dependence on both China and the US.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot