Cybersecurity chief warns of rising cyber risks in the UK

The UK faces an escalating cyber threat from hostile states and criminal gangs, according to Richard Horne, head of the National Cyber Security Centre (NCSC). In his first major speech, Horne warned that the severity of these risks is being underestimated, citing a significant rise in cyber incidents, particularly from Russia and China. He described Russia’s cyber activity as ‘aggressive and reckless’ while noting that China’s operations are highly sophisticated with growing global ambitions.

Over the past year, the NCSC responded to 430 cyber incidents, a marked increase from the previous year. Among them, 12 were deemed especially severe, a threefold rise from 2023. The agency highlighted the growing threats to critical infrastructure and supply chains, urging both public and private sectors to strengthen their cyber defences. The UK also faces a growing number of ransomware attacks, often originating from Russia, which target key organisations like the British Library and healthcare services.

Horne emphasised the human costs of cyber-attacks, citing how these incidents disrupt vital services like healthcare and education. The rise in ransomware, often linked to Russian criminal gangs, is a major concern, and the NCSC is working to address these challenges. The agency’s review also pointed to increasing cyber activity from China, Iran, and North Korea, with these states targeting the UK’s infrastructure and private sector.

Experts like Professor Alan Woodward of Surrey University echoed Horne’s concerns, urging the UK to step up its cybersecurity efforts to keep pace with evolving threats. With adversaries growing more sophisticated, the government and businesses must act swiftly to protect the country’s digital infrastructure.

Meta tightens financial ad rules in Australia

Meta Platforms announced stricter regulations for advertisers promoting financial products and services in Australia, aiming to curb online scams. Following an October initiative where Meta removed 8,000 deceptive ‘celeb bait’ ads, the company now requires advertisers to verify beneficiary and payer details, including their Australian Financial Services License number, before running financial ads.

This move is part of Meta’s ongoing efforts to protect Australians from scams involving fake investment schemes using celebrity images. Verified advertisers must also display a “Paid for By” disclaimer, ensuring transparency in financial advertisements.

The updated policy follows a broader regulatory push in Australia, where the government recently abandoned plans to fine internet platforms for spreading misinformation. The crackdown on online platforms is part of a growing effort to assert Australian sovereignty over foreign tech companies, with a federal election looming.

India introduces new rules for critical telecom infrastructure

The government of India introduced the Telecommunications (Critical Telecommunication Infrastructure) Rules, 2024, on 22 November, which require telecom entities designated as Critical Telecommunication Infrastructure (CTI) to grant government-authorised personnel access to inspect hardware, software, and data. These rules are part of the Telecommunications Act, 2023, empowering the government to designate telecom networks as CTI if their disruption could severely impact national security, the economy, public health, or safety.

The rules mandate that telecom entities appoint a Chief Telecom Security Officer (CTSO) to oversee cybersecurity efforts and report incidents within six hours, a revised deadline from the original two hours proposed in the draft rules. This brings the telecom sector in India in line with existing Telecom Cyber Security Rules and CERT-In directions, though experts argue that the six-hour window does not meet global standards and may contribute to over-regulation.

Telecom networks are already governed under the Information Technology Act, creating potential overlaps with other regulatory frameworks such as the National Critical Information Infrastructure Protection Centre (NCIIPC). The rules also raise concerns about inspection protocols and data access, as they lack clarity on when inspections can be triggered or what limitations should be placed on government personnel accessing sensitive information.

Experts have also questioned the accountability measures in case of abuse of power and the potential for government officials to access the personal data of telecom subscribers during these inspections. To implement these rules, telecom entities must provide detailed documentation to the government, including network architecture, access lists, cybersecurity plans, and security audit reports. They must also maintain logs and documentation for at least two years to assist in detecting anomalies.

Additionally, remote maintenance or repairs from outside India require government approval, and upgrades to hardware or software must be reviewed within 14 days. Immediate upgrades are allowed during cybersecurity incidents, with notification to the government within 24 hours. A digital portal will be established to manage these rules, but concerns about the lack of transparency in communications have been raised. Finally, all CTI hardware, software, and spares must meet Indian Telecommunication Security Assurance Requirements.

T-Mobile prevents cyberattack, safeguarding customer data

T-Mobile has reported recent attempts by cyber attackers to infiltrate its systems. The US telecom giant confirmed that its security measures successfully prevented access to sensitive customer data, including calls, voicemails, and texts. The intrusion originated from a compromised network connected to T-Mobile’s systems, prompting the company to sever the connection.

The attackers’ traits resembled those of Salt Typhoon, a Chinese-linked cyber espionage group, though T-Mobile has not confirmed their identity. The firm’s Chief Security Officer, Jeff Simon, stated that customer information remained secure, with no disruption to services. Findings were reported to the US government for further investigation.

Simon attended a White House meeting last week to discuss escalating cyber threats. The FBI and the Cybersecurity & Infrastructure Security Agency recently disclosed an ongoing investigation into a Chinese-linked espionage campaign targeting several US telecom providers.

The broader operation reportedly infiltrated multiple companies, stealing sensitive call data and accessing private communications. Such breaches compromised the devices of individuals in government and politics, including campaign staff during the 2020 US presidential election, raising concerns about national security.

France eyes strategic tech control in Atos deal

French IT giant Atos has entered discussions with the government for a potential €500 million ($524 million) acquisition of its advanced computing division. Known for its crucial role in securing communications for the French military and manufacturing supercomputer servers, Atos is restructuring to address its mounting debt. The government has prioritised retaining control over the company’s strategic technology assets to safeguard national interests.

The proposed deal includes an initial payment of €150 million upon signing, expected before the exclusivity period ends on May 31. The offer could rise to €625 million with performance-based earn-outs. French Finance Minister Antoine Armand emphasised the state’s duty to ensure the survival and development of industries critical to national sovereignty. Atos’ advanced computing and cybersecurity unit, employing 4,000 people and generating €900 million annually, is seen as a vital asset.

As part of its restructuring, Atos announced plans to sell its cybersecurity unit’s Critical Systems and Cyber Products. With this deal factored in, the company forecasts its financial leverage for 2027 to be between 1.8 and 2.1 times core earnings. Meanwhile, France‘s parliament is considering an amendment that could pave the way for Atos’ nationalisation, underscoring the government’s commitment to protecting key technologies.

GCTU partners with Microsoft for digital skills programme in Ghana

Ghana Communication Technology University and Microsoft Skills have partnered to introduce the Microsoft Skills for Jobs Microdegree Programme in Ghana, aimed at enhancing digital skills in high-demand fields such as cybersecurity, AI, and coding. That collaboration, funded by the European Union, will provide training, certification, and job placement opportunities, helping students and professionals gain the essential skills needed in today’s digital economy.

To make the programme more accessible, local banks will offer micro-loans, allowing participants to pay fees in manageable instalments. The initiative is expected to certify 286,000 students globally by 2026, with 60,000 certifications coming from Ghana, creating significant opportunities for local students in the global job market.

Ghana Communication Technology University and Microsoft Skills have also partnered to foster international collaboration through student exchange programs. The partnership will also connect Ghanaian graduates to job opportunities with 32,000 IT companies across Europe, further expanding their career prospects and establishing GCTU as a leader in IT education in Ghana.

EU Council affirms international law’s role in cyberspace with new declaration

The EU Council, along with its member states, has adopted a declaration for the first time on this specific topic establishing a unified understanding of how international law applies to cyberspace. This declaration underscores that cyberspace is not a lawless realm and reaffirms that international law, including the UN Charter, international human rights law, and international humanitarian law, is fully applicable to activities conducted in cyberspace.

The declaration highlights the escalating threat of malicious cyber activities, such as ransomware, which have grown in scale, sophistication, and impact, posing significant risks to European societies and economies. Recognising these challenges, the EU emphasizes that adherence to the UN framework of responsible state behavior in cyberspace is essential for preserving international peace, security, and stability.

In the declaration, the EU and its member states have commented on principle of non-intervention, state sovereignty, due diligence, attribution, and countermeasures. In particular, the document highlights that “States exercise territorial jurisdiction over Information and Communications Technology (ICT)
infrastructure located in their territory, and persons engaged in cyber activities, within their territory”.

The official press release notes that the declaration’s foundation was laid in April 2024, when the European External Action Service (EEAS) presented a non-paper on the topic. After careful deliberation and collaboration between the Horizontal Working Party on Cyber Issues (HWPCI) and the Working Party on Public International Law (COJUR), the text was finalized and approved by the Permanent Representatives Committee (COREPER) on 13 November 2024.

Trump deepfake scam bot targets crypto users

Russian security experts have uncovered a new deepfake scam exploiting the image of Donald Trump, targeting English-speaking audiences. FACCT, a Moscow-based cybercrime prevention firm, reported that scammers are using a bot to create deepfake videos of prominent figures like Trump, Elon Musk, and Tucker Carlson. These videos are being shared on platforms such as TikTok and YouTube to promote fraudulent crypto exchanges.

The bot allows users to generate customised videos with text up to 400 characters long, which fraudsters use to advertise fake trading platforms. FACCT identified three primary scams: fake exchanges where victims’ tokens are stolen, malware links that compromise crypto wallets, and bogus tokens that can’t be sold.

This warning follows a rise in crypto-related scams in Russia, including digital ruble frauds. Authorities are urging vigilance as the Russian Central Bank prepares to launch its central bank digital currency nationwide next year.

Ireland intensifies regulation on digital platforms to curb terrorist content

The Irish media regulator, Coimisiún na Meán, has mandated that online platforms TikTok, X, and Meta must take decisive steps to prevent the spread of terrorist content on their services, giving them three months to report on their progress.

This action follows notifications from EU authorities under the Terrorist Content Online Regulation. If the platforms fail to comply, the regulator can impose fines of up to four percent of their global revenue.

This decision aligns with Ireland’s broader enforcement of digital laws, including the Digital Services Act (DSA) and a new online safety code. The DSA has already prompted investigations, such as the European Commission’s probe into X last December, and Ireland’s new safety code will impose binding content moderation rules for video-sharing platforms with European headquarters in Ireland. These initiatives aim to curb the spread of harmful and illegal content on major social media platforms.

KEMS-Zajil Telecom and MBCOM Technologies partner to boost digital infrastructure and cybersecurity in Middle East

Kuwait KEMS-Zajil Telecom and Emirates MBCOM Technologies have partnered to strengthen digital infrastructure and cybersecurity across the Middle East, aiming to help businesses remain secure and agile in a connected, fast-evolving world. This partnership formalised through a Memorandum of Understanding (MoU) on 16 October 2024, focuses on providing enterprise solutions in critical areas like network optimisation, cloud services, and cybersecurity.

By merging their expertise, the companies intend to deliver advanced solutions that optimise network performance and bolster defences against cyber threats, essential capabilities for supporting business growth and resilience. Moreover, both companies see this partnership as a strategic move to drive digital transformation in the region, effectively meeting the rising demand for secure, efficient, and scalable digital services.

Furthermore, KEMS-Zajil Telecom emphasised that collaborating with MBCOM Technologies allows them to expand their digital services portfolio with cutting-edge solutions that enhance growth and security. Similarly, MBCOM Technologies highlighted how this partnership positions both companies to bring innovative technology to regional businesses. Ultimately, with its dual focus on advanced infrastructure and robust security, this collaboration reflects a shared vision to empower Middle Eastern enterprises through comprehensive digital solutions that drive long-term growth and resilience.