Australia’s DeWave is redefining brain-computer interfaces with an AI-powered EEG cap that decodes thoughts without surgery. While Neuralink drills into skulls, DeWave shows non-invasive tech can deliver real impact—raising big questions about access and the future of thought control.
AI-driven humanoids have turned factory floors into geopolitical battlegrounds. China is turbo-charging automation and redrawing alliances, while the U.S. scrambles to close the gap—placing the next era of diplomacy, defense, and economic power squarely in the decisive hands of intelligent machines.
Apple’s new research paper dismantles the myth of AI reasoning, revealing that models from OpenAI, Anthropic, and Google collapse under complex tasks. Released ahead of WWDC 2025, the findings challenge billion-dollar AGI claims and expose the industry’s most persuasive illusion.
BlackSuit Ransomware Strikes, China-Linked Cyber Threats, and Data Breach Fines
BlackSuit Ransomware Strikes Again! The notorious hackers behind last year's Dallas attack have rebranded as BlackSuit, now demanding $500 million in ransoms! The FBI and CISA confirm the group's new identity, with aggressive tactics and enhanced methods to pressure victims into paying up.
BlackSuit Ransomware Rebrand The notorious hackers behind last year's Dallas attack have rebranded as BlackSuit, now demanding an astonishing $500 million in ransoms! The FBI and CISA confirm the group's new identity, with bolder tactics and enhanced methods to pressure victims into paying up. Stay vigilant!
Easterly Warns of China-Linked Cyber Threats At the BlackHat conference, CISA Director Jen Easterly warned that recent global tech outages are a “dress rehearsal” for potential destructive cyberattacks from China. With escalating tensions over Taiwan, U.S. critical infrastructure must bolster resilience against possible disruptions.
KTT Fined for Data Breach Keppel Telecommunications and Transportation has been fined $120,000 for failing to delete personal data before selling a business.
Royal Ransomware Rebrands as BlackSuit, Demands Over $500 Million in Ransoms
The hackers behind the infamous ransomware attack on Dallas last year have rebranded as a new group named BlackSuit, demanding over $500 million in ransoms. The FBI and Cybersecurity and Infrastructure Security Agency (CISA) updated their advisory, confirming that the group, formerly known as Royal, now operates under the BlackSuit name.
The new advisory provides extensive technical details to help defenders identify the group's activities, which included ransom demands reaching up to $60 million. The transition to BlackSuit branding was noted as early as November, and recent attacks continue under this new name.
“Ransom demands have typically ranged from approximately $1 million to $10 million, with payment demanded in Bitcoin,” the agencies stated. “BlackSuit actors have exhibited a willingness to negotiate payment amounts.” The advisory highlights numerous coding similarities linking the Royal and BlackSuit groups, while also noting BlackSuit's enhanced capabilities.
The hackers predominantly use phishing emails for initial access, followed by disabling antivirus software, exfiltrating large amounts of data, and deploying ransomware. A rise in direct communication from BlackSuit actors to victims has been observed, a tactic aimed at pressuring ransom payments.
New technical data on BlackSuit, derived from FBI threat response incidents as of July 2024, reveals the hackers' use of legitimate tools and accounts to navigate victim systems. They deactivate antivirus software and maintain access using remote monitoring and management software. The advisory also lists IP addresses for organizations to investigate.
BlackSuit has claimed responsibility for several recent attacks on U.S. schools, colleges, prominent companies, and local governments. CISA Director Jen Easterly emphasised the urgency of cybersecurity, stating, “Because of ransomware attacks, people are waking up to the idea of ‘what do I need to do to protect my family and my community?’”
Easterly Warns of Destructive Cyberattacks from China Causing Widespread Outages
LAS VEGAS — Recent global technology outages caused by a CrowdStrike update should serve as a “dress rehearsal” for potential destructive cyberattacks from China-linked hackers, warns Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA). Speaking at the BlackHat cybersecurity conference, Easterly highlighted that escalating tensions between China and Taiwan have led Beijing to explore ways to launch destructive attacks against Taiwan and its allies, including the U.S.
“We are building resilience into our networks and our systems so that we can withstand a significant disruption or at least drive down the recovery time to be able to provide services,”
Easterly said, describing the CrowdStrike incident as a useful exercise in preparation for possible Chinese cyberattacks.
U.S. officials continue to hunt for and eliminate compromises caused by Volt Typhoon, a Chinese state-sponsored group aiming to prepare for such attacks. While China has denied involvement, CISA and the FBI have repeatedly warned that Volt Typhoon hackers are “seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States.” Evidence of Volt Typhoon hackers has been found in U.S. critical infrastructure in Guam and near other military bases, aiming to slow potential mobilisation of forces.
Easterly stressed the importance of building resilience now to prepare for massive disruptions. The CrowdStrike incident affected thousands of hospitals, airports, and businesses worldwide, requiring extensive IT work to resolve. CISA worked alongside other government agencies and Microsoft to provide mitigation guidance and assess the impact on critical infrastructure. Easterly emphasised the need for coordination, stating, “This is exactly what China wants to do,” and urged the public to be prepared for incidents causing significant technology outages.
KTT Fined $120,000 for Data Breach: Failure to Delete Personal Data Before Sale Exposes Thousands
SINGAPORE - Keppel Telecommunications & Transportation (KTT) has been fined $120,000 after failing to delete personal data from a server of a business it sold in 2022, which was subsequently hacked. The Personal Data Protection Commission (PDPC) revealed in a decision published online on August 2 that personal data belonging to about 22,659 people was at risk of unauthorised access and leakage.
The affected individuals included current and former employees of KTT and its subsidiaries, KTT’s shareholders when it was listed on the Singapore Exchange, and those with business dealings with the company. Evidence of the data leak surfaced when a ransomware group published nine encrypted files on the Dark Web, claiming they contained personal data of up to 7,184 individuals. "Such failures in data protection are unacceptable and must be addressed with utmost urgency," a PDPC spokesperson commented.
Despite KTT's inability to confirm if all personal data was compromised, the leak included signatures, images of identification cards, and bank account numbers.
Investigations revealed that an unknown entity infiltrated the server on September 5, 2022, through a compromised account of a vendor for Geodis Logistics Singapore (GLS), divested from KTT two months prior. The PDPC found KTT failed to delete the personal data after migrating it to cloud storage in 2020 and before selling the business in 2022. Although KTT took prompt actions to mitigate the incident's impact and cooperated fully with investigations, the PDPC cited systemic shortcomings in KTT’s data protection processes, leading to the fine.
Asia-Pacific faced over one-third of all cyberattacks in 2024, making it the world’s top target. From manufacturing breaches to talent shortages and rising ransomware, CNC investigates how a region of digital ambition became cybercrime’s global epicentre.
On May 30, 2025, Australia became the first nation to criminalize secret ransomware payments. Under the new Cyber Security Act, large organizations must report such incidents within 72 hours—marking a major step in the country’s quest to become a global cybersecurity leader by 2030.
AI is fueling a new wave of cyber threats—but it's also powering the tools to stop them. From privacy concerns and energy strain to predictive security and autonomous defence, this article explores how businesses are adapting to the dual impact of AI in 2025.
Australia’s Big Four banks including Commonwealth Bank, ANZ, NAB and Westpac have been hit by a major cybercrime wave. Over 31,000 customer credentials were stolen using infostealer malware, prompting urgent upgrades in bank security, fraud detection and digital protection.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!