ShinyHunters has exposed a critical weakness in cloud systems. The McGraw Hill breach shows how misconfigured Salesforce portals enabled large scale data leaks, with no software flaw to fix. This marks a shift toward exploiting common operational gaps rather than rare vulnerabilities.
Anthropic’s Mythos clampdown, April’s record Patch Tuesday and Nvidia’s Blackwell‑to‑Rubin GPU roadmap mark a turning point in cyber defence, exposing how deeply allied nations now rely on US‑controlled, agentic AI to detect and counter zero‑day threats.
Booking.com confirms hackers accessed customer names, emails, addresses, and booking details via third-party compromise. Stolen data is already fuelling targeted WhatsApp phishing attacks, exposing deep supply chain vulnerabilities in global travel platforms.
FBI & CISA Issue Alert: Chinese Drones Pose Risks to Critical Infrastructure
In a recent development that underscores the global concern over Chinese technological dominance, the U.S. government has intensified its efforts to counter the influence of Chinese drones.
Image prompt: Illustrates the fleet of drones, CCTV cameras, and solar panels in a network, symbolising China's global surveillance influence over western nations.
FBI & CISA report flags Chinese UAS threats; DJI holds major market share.
Australian Senator Paterson calls for review of Chinese tech in infrastructure.
U.S. advised on cybersecurity amidst concerns over DJI's operations.
Worldwide focus on China's military-civil fusion strategy raises data security alarms.
Understanding the Global Implications of Chinese Drones on National Security
In a recent development that underscores the global concern over Chinese technological dominance, the U.S. government has intensified its efforts to counter the influence of Chinese drones.
The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have released a pivotal report emphasising the security risks posed by Chinese uncrewed aircraft systems (UAS) manufacturers, notably DJI, which holds a commanding 70% share of the global consumer drone market.
The report comes amid a wave of bans targeting Chinese drone manufacturers. U.S. lawmakers have referred to the aircraft as “TikTok with wings,” in reference to the alleged spying taking place on the popular, China-owned social media platform.
This move aligns with international apprehensions, as highlighted by Australian Senator Paterson's call for a review of critical infrastructure relying on Chinese technologies, including solar panels, drones, and CCTV surveillance systems in government buildings.
This global legislative focus reflects the mounting anxiety over China's strategy of integrating civilian, military, and Communist Party mandates in surveillance technologies—a tactic that has long been a point of contention in Western governments.
The report, "Cybersecurity Guidance: Chinese-Manufactured UAS," though non-binding, advises American firms at all government levels on critical infrastructure and cybersecurity precautions.
This follows a request from 16 U.S. lawmakers to CISA Director Jen Easterly for an investigation into DJI's activities in the U.S. and their potential security risks. Bryan Vorndran, Assistant Director of the FBI's Cyber Division, warns,
“Without mitigations in place, the widespread deployment of Chinese-manufactured UAS in our nation’s key sectors is a national security concern, and it carries the risk of unauthorised access to systems and data.”
This statement underscores the urgency of the guidance issued by the FBI and CISA to protect critical infrastructure. The concern over UAS vulnerabilities is particularly acute with Chinese models, given the legal framework in the People’s Republic of China (PRC) that allows unprecedented governmental access to data from Chinese companies.
A letter from 16 U.S. Senators to Director Easterly in March 2023 highlighted China's "Military-Civil Fusion" strategy, which effectively merges PLA and civilian science and technology efforts. This approach by the PRC, viewing information as a strategic asset and actively seeking its acquisition, including through UAS, raises serious implications.
There are fears that drone-captured data on U.S. infrastructure and intellectual property might be accessed by Chinese authorities, leading to potential cyberattacks or physical sabotage.
The FBI and CISA assert that PRC laws provide the government extensive rights to access and control data from Chinese firms, with Chinese-made UAS often employed in U.S. critical infrastructure, potentially exposing sensitive information.
The report also discusses the vulnerabilities and dangers for U.S. drone companies operating without adequate cybersecurity measures, suggesting that prevalent strategies might not sufficiently prevent China from accessing crucial data that could bolster its strategic objectives.
The recent escalation of global concerns regarding Chinese technological influence, lead by U.S. government last year and with is latest report is not an isolated policy change by Western governments.
Four of the 16 signatures from U.S lawmakers.
Senator Paterson's Call for Review Echoes U.S. Concerns on Data Security and National Infrastructure
In 2023, we witnessed, much debate across the media and the Australian government wit these similar initiatives being echoed by a series of significant political calls from Australian Senator Paterson, advocating for a comprehensive review of critical infrastructure in Australia that depends on Chinese technologies, including solar panels, drones, and CCTV surveillance systems in government buildings.
This movement reflects a wider, international legislative focus on the risks associated with China's strategy of merging civilian, military, and Communist Party mandates in surveillance technologies—a practice that has sparked significant debate and concern among Western nations regarding national security.
This issue is not isolated to the U.S.; it represents a broader concern for governments in the West, spotlighting the debate on national security and the impact of Chinese surveillance technology in global geopolitics.
Anthropic’s Mythos clampdown, April’s record Patch Tuesday and Nvidia’s Blackwell‑to‑Rubin GPU roadmap mark a turning point in cyber defence, exposing how deeply allied nations now rely on US‑controlled, agentic AI to detect and counter zero‑day threats.
Anthropic’s rise is no longer about models, but control. As it embeds across enterprise, leaked code reveals deep telemetry, remote overrides and emerging autonomy. Industry leaders warn the same systems reshaping business may amplify cyber risk beyond current defences.
Anthropic’s sabotage report and new tests on OpenAI models reveal AI systems bypassing safeguards, resisting shutdown, and enabling covert data leaks. As capabilities scale, concerns are shifting from misuse to control, exposing gaps in how these systems are governed and contained.
NVIDIA turned AI factories into grid assets, China published its AI dominance doctrine, and the US military confirmed using Claude in Iran strikes. From energy infrastructure to battlefield targeting, the AI race this week moved well beyond Silicon Valley.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!