Tag - Network security

Poland investigates Iran links behind cyberattack on nuclear facility
Poland is looking into whether an attempted cyberattack on a nuclear research facility was carried out by Iran, the government said on Thursday. The country’s digital minister Krzysztof Gawkowski said in an emailed statement that Poland had “identified an attempted cyberattack on the servers of the National Centre for Nuclear Research,” which authorities had thwarted. He told local media that the attack was carried out “in the past few days,” Reuters reported.  The nuclear center said in a statement that “all safety systems operated according to procedures.” A reactor is “operating safely and smoothly at full power,” Jakub Kupecki, the center’s director said in the statement. The facility carries out research into nuclear energy; Poland does not have nuclear weapons of its own.  Polish cybersecurity services and the energy ministry are working with the facility, Gawkowski said.  The minister told local media that there are early signals suggesting the attack came from Iran, Reuters reported. “The first identifications of the entry vectors … are related to Iran,” he said, adding that more investigation is required.  Gawkowski added that hackers could also have used indicators linking the attack to Iran in efforts to hide their real origins. Poland has faced a huge number of Russian cyberattacks since the war in Ukraine began in 2022. Western cyber and intelligence agencies have warned critical entities to be on high alert for Iranian cyberattacks following the start of the conflict in late February. The Iranian embassy in Warsaw did not immediately respond to a request for comment.
Defense
Energy
Conflict
Safety
Energy and Climate
Huawei taking part in EU research programs despite Commission crackdown
Chinese technology giant Huawei is participating in 16 projects funded by the European Commission’s Horizon Europe research and innovation program despite being dubbed a high-risk supplier. The Commission restricted Huawei from accessing Horizon projects in 2023 after saying that it (and another Chinese telecom supplier, ZTE) posed “materially higher risks than other 5G suppliers” in relation to cybersecurity and foreign influence. However, public data reviewed by POLITICO’s EU Influence newsletter shows that Huawei still takes part in several projects, many of which are in sensitive fields like cloud computing, 5G and 6G telecom technology and data centers. These projects mean Huawei has been working alongside universities and tech companies in Spain, France, Sweden, Denmark, the Netherlands, Germany, Belgium, Finland and Italy. It also has access to the intellectual property generated by the projects, as the contracts require the sharing of information as well as joint ownership of the results between partners. A Commission spokesperson confirmed that of the 16 projects, 15 were signed before the restrictions took place. The remaining project “was signed in 2025 and was assessed as falling outside the scope of the existing restrictions.” Many of the projects started in January 2023, with the contracts running out at the end of this year, while others will last until 2027, 2028 and 2030. “Huawei participates in and implements projects funded under Horizon Europe in a lawful and compliant manner,” a company spokesperson said. One of the projects is to develop data privacy and protection tools in the fields of AI and big data, along with Italy’s National Research Council, the University of Malaga, the University of Toulouse, the University of Calabria, and a Bavarian high-tech research institute for software-intensive systems. Huawei received €207,000 to lead the work on “design, implementation, and evaluation of use cases,” according to the contract for that project, seen by POLITICO. COMMISSION CRACKDOWN Last month the Commission proposed a new Cybersecurity Act that would restrict Huawei from critical telecoms networks under EU law, after years of asking national capitals to do so voluntarily. “I’m not satisfied [with] how the member states … have been implementing our 5G Toolbox,” the Commission’s executive VP for tech and security policy, Henna Virkkunen, told POLITICO at the time, referring to EU guidelines to deal with high-risk vendors. “We know that we still have high-risk vendors in our 5G networks, in the critical parts … so now we will have stricter rules on this.” The Commission is also working on measures to cut Chinese companies out of lucrative public contracts. Bart Groothuis, a liberal MEP working on the Cybersecurity Act, told POLITICO that the Commission should “honor the promises and commitments” it made “and push them out.” “They should be barred from participating. Period.” Huawei was also involved in an influence scandal last year, with Belgian authorities investigating whether the tech giant exerted undue influence over EU lawmakers. The scandal led to Huawei’s being banned from lobbying on the premises of the European Commission and the European Parliament.
Intelligence
Politics
Technology
Critical infrastructure
Cybersecurity
Spain is handing ‘crown jewels’ to Huawei, lawmakers warn
BRUSSELS — European Parliament members on Monday slammed the Spanish government for using Huawei to store judicial wiretaps, with one leading lawmaker warning Madrid is putting its “crown jewels” at risk. The Spanish government has drawn criticism since the summer after it awarded a multimillion euro contract to Huawei for the storage of judicial wiretaps — a move that led the United States to threaten to cease intelligence sharing with Madrid. The outcry over Spain’s use of the Chinese tech giant for sensitive services lays bare how Europe continues to grapple with how to secure its digital systems against security threats. The European Union considers Huawei to be a high-risk supplier and wants to crack down on countries that still afford it broad market access. The EU proposed new draft cybersecurity legislation last month that, if approved, would force EU member countries to kick Huawei out of their telecoms networks, after years of trying to get capitals to ban the Chinese vendor voluntarily.  Lawmakers from several political groups said Spain’s contract with the Chinese tech giant could endanger the EU as a whole.  “We cannot operate in a union where one of the states actively strips high-risk vendors from its networks while another entrusts them with the crown jewels of its law enforcement,” said Markéta Gregorová, a Czech Pirate Party lawmaker who is part of the Greens group. Gregorová leads negotiations on a cyber bill that would give the EU the power to force Huawei and other — often Chinese — suppliers out of critical infrastructure in Europe. “When you introduce a high-risk vendor … we do not just risk a localized data breach, we risk poisoning the well of European intelligence sharing,” she said on Monday. Juan Ignacio Zoido Álvarez, a member of Spain’s center-right opposition party, said the decision puts “the entirety of the EU at risk.” The Spanish government has defended the contract it struck for storing wiretaps. Spain’s Interior Ministry said in a statement that the government had awarded a contract to “European companies,” which then bought storage products. “There is no risk to security, technological and legal sovereignty, nor is there any foreign interference or threat to the custody of evidence,” the ministry said. Interior Minister Fernando Grande-Marlaska told the Spanish parliament last September that Telefónica, the country’s telecom champion, operated a state surveillance system called SITEL and that storage “cabinets” had been integrated into that system.   Bloomberg reported last July that Huawei equipment is not used for classified information, with one government official saying the storage “represents a minor part of a watertight, audited, isolated and certified system.” On Monday, Juan Fernando López Aguilar, a prominent member of the European Parliament for the Socialists and Democrats group and a member of Prime Minister Pedro Sanchéz’s party in Spain, defended Madrid’s contract and pushed back on EU moves to intervene on the issue. In terms of “security, espionage, or violation of technological sovereignty,” there is “no risk,” Aguilar said. Huawei did not respond to a request for comment.
Data
Intelligence
Security
Procurement
Technology
Jeffrey Epstein spent years building ties to well-known hackers
Convicted sex offender Jeffrey Epstein for years communicated with experts in the cybersecurity community and expressed interest in attending two of the largest hacker conventions in the world, according to documents released by the Justice Department. It’s unclear if Epstein ever attended either DEFCON or Black Hat, where thousands of hackers and researchers gather annually in Las Vegas to discuss the latest cyber vulnerabilities and trends. According to his emails with several prominent researchers and business people, his interest in cybersecurity and cryptography appeared to be widespread, ranging from discussions about removing information about himself from online search engines to network security. Jeff Moss, founder of both the Black Hat and DEFCON conferences, told POLITICO in a statement that it’s unlikely Epstein actually made it to the conferences. “As far as we can tell, he wanted to attend, but never did,” Moss said of Epstein. “It looks like there were a lot of plans and I’m just waiting for some sort of evidence that he followed through on them.” According to the released emails, Epstein first made plans to attend DEFCON for a few hours in August 2013 to meet with Pablos Holman, who at the time worked on various tech and cyber projects at private equity company Intellectual Ventures. It’s unclear whether Epstein and almost a dozen of his guests obtained tickets to DEFCON or if Epstein attended. It appears that Epstein and Holman had been in touch since 2010, according to emails. Epstein in 2010 emailed cryptography researcher Ian Goldberg and said Holman “suggested we speak.” Holman also planned to stay in Epstein’s apartment while visiting New York City in 2013 and advised Epstein on how to bury “negative stuff” online. A spokesperson for the University of Waterloo, where Goldberg works within the School of Computer Science, confirmed to POLITICO that Goldberg turned down the offer from Epstein in 2010 to fund his work at the university. Holman, who currently serves as a general partner at venture capital group Deep Future, did not respond to multiple requests for comment. Joi Ito, the current president of Japan’s Chiba Institute of Technology and former director of the Massachusetts Institute of Technology’s Media Lab, appears to have introduced entrepreneur and researcher Vincenzo Iozzo via email to Epstein in 2014, according to the emails. Ito stepped down from his role at MIT in 2019 when previous disclosures revealed Ito had accepted about $1.7 million from Epstein for the lab and his own investment funds. Spokespersons for Chiba Institute of Technology did not respond to a request for comment on Ito’s connections to Epstein. Ito previously apologized for his association with Epstein and stressed that he was “never involved in, never heard him talk about and never saw any evidence of the horrific acts that he was accused of.” According to the emails, Iozzo, who currently serves as CEO of identity management company SlashID, discussed obtaining tickets for Epstein to attend DEFCON conferences in Las Vegas in 2016 and 2018. Iozzo previously served in roles at cybersecurity company CrowdStrike and as a board member for the annual Black Hat conference. He also planned to meet with Epstein at his New York City home on at least five occasions in 2014, 2015, 2016, 2017 and 2018. One email sent by Epstein to Iozzo ahead of the 2016 conferences noted he wanted to bring guests, including former Israeli Prime Minister Ehud Barak, American billionaire Tom Pritzker and “four girls.” It’s not clear if Epstein attended the conference that year or met with Barak, Pritzker or Iozzo. A spokesperson for Barak told POLITICO that the former prime minister “did not attend DEFCON in 2016,” and further noted that Epstein never asked him to attend. The spokesperson stressed that Barak “has repeatedly and publicly stated that he deeply regrets having any association with Jeffrey Epstein.” Separate spokespersons for Hyatt Hotels — where Pritzker serves as executive chairman of the board of directors — and for the Pritzker Organization did not respond to a request for comment. Epstein again discussed attending DEFCON in 2018, which Iozzo also offered to procure tickets for, according to the emails. Ahead of the 2018 convention, Epstein requested to meet with “founder” of Black Hat, but Iozzo wrote in an email that this person had turned down the meeting due to “what’s out there online” about Epstein. The founder, however, was “happy” to provide Epstein with tickets to the event, Iozzo wrote. It’s unclear if Epstein was referring to Moss or someone else. Moss told POLITICO in a statement that he “turned down Vincenzo’s badge request” for Epstein, and “advised Vincenzo to stay clear” of the disgraced financier. Moss noted that it’s possible Iozzo bought passes to the conference separately. An FBI file released by the Justice Department — first reported by TechCrunch — suggested that Epstein had a “personal hacker” who developed “offensive cyber tools” that were sold to several unnamed governments. It’s unclear if the information provided by the unnamed informant to the FBI is accurate. The name of the hacker is redacted in the file but a description of the person — including that they had a company that was acquired by CrowdStrike in 2017 and found vulnerabilities in Blackberry and iOS devices — matches Iozzo. Iozzo strongly denied that he was the so-called personal hacker for Epstein and issued a lengthy statement to POLITICO refuting the claims made by the FBI informant, including his alleged past work for foreign governments. Iozzo said that his interactions with Epstein “were limited to business opportunities that never materialized, as well as discussion of the markets and emerging technologies.” “The latest release of files contains a document with fabricated claims made about me to an FBI agent over eight years ago,” Iozzo said, noting that neither the FBI nor any other government agency ever contacted him about the file. “These accusations are false and defamatory. For the avoidance of doubt, it should go without saying that I have never been involved in any illegal or unethical activity.” Iozzo also said that he did not provide Epstein with “exclusive access” to the DEFCON and Black Hat conferences and did not know if Epstein actually attended either event. “I unfortunately knew Epstein for professional reasons,” Iozzo said. “I wish I did not. We were introduced by people whom I trusted and admired when I was 25 fundraising for my startup in 2014. Because of this, I failed to ask the right questions — questions that, in retrospect, seem obvious. I foolishly accepted the narrative that was presented to me by others that greatly minimized the magnitude of his horrific actions.” “I regret the past association and take full responsibility for not exercising greater judgment at the time,” he added. Epstein’s interest in the Black Hat and DEFCON conventions began years after he had been convicted of and jailed for soliciting sex from minors in 2008. Following his incarceration, Epstein reportedly took steps to scrub references to his conviction from the internet with the help of cyber professionals. Epstein was again arrested and charged with sex trafficking minors in 2019, though the federal case was formally dismissed in August 2019 following his death by suicide in jail while awaiting trial.
Security
Rights
Markets
Investment
Department
Washington pushes back against EU’s bid for tech autonomy
MUNICH, Germany — U.S. officials have countered Europe’s push for technology sovereignty from America with a clear message: It’s China you should worry about, not us. The European Union is rolling out a strategy to reduce its reliance on foreign technology suppliers. Donald Trump’s return to office has put the focus on American cloud giants, companies like Elon Musk’s Starlink and X and others — with European officials increasingly concerned that Washington has too much control over Europe’s digital infrastructure. As political leaders and security and intelligence officials met in Germany for the Munich Security Conference, Washington sought to calm nerves. The idea that Trump can pull the plug on the internet is not “a credible argument,” the United States’ National Cyber Director Sean Cairncross told an audience Thursday. Europe and the U.S. “face the same sort of threat and the same threat actors,” said Cairncross, who advises Trump on cybersecurity policy. Rather than weaning off America, wean off China, he said: “There is a clean tech stack. It is primarily American. And then there is a Chinese tech stack.” Claiming that U.S. tech is as risky as Chinese tech is “a giant false equivalency,” according to Cairncross. “Personal data doesn’t get piped to the state in the United States,” he said, referencing concerns that the Beijing government has laws requiring firms to hand over data for Chinese surveillance and espionage purposes. The attempt to quell concerns is notable even if it may not change the direction of travel in Europe. The European Commission wants to boost homegrown technology with a “tech sovereignty” package this spring. It presented a cybersecurity proposal in January that, if approved, could be used to root out suppliers that pose security risks — including from America. “We want to ensure that we don’t have risky dependencies when it comes to critical sectors,” the Commission’s Executive Vice President Henna Virkkunen told POLITICO in an interview in Munich on Friday. “We see this in AI, quantum technologies and semiconductors — we must have a certain level of capacity ourselves.” Europe’s attempt to pivot away from U.S. dependencies, while not new, has gained support in past months as the transatlantic alliance creaked. The POLITICO Poll conducted in February showed far more people described the U.S. as an unreliable ally than a reliable one across four countries, including half the adults polled in Germany and 57 percent in Canada. “The leadership claim of the U.S. is being challenged, perhaps already lost,” German Chancellor Friedrich Merz told the conference Friday. REBALANCING ACT Europe is still working out what a forceful attempt to build technology sovereignty would look like, as it reforms everything from industrial policy programs to procurement rules and data and cybersecurity requirements on companies and governments. Top European cyber officials in Munich told POLITICO that technological sovereignty does not mean cutting ties with trusted partners. Vincent Strubel, director of France’s cybersecurity agency ANSSI, said sovereignty means avoiding being bound by rules set elsewhere. “It’s about identifying what leverage non-European countries may have based on the technology they provide,” Strubel said in an interview. “It’s not about being friendly or unfriendly with any country — it’s about recognizing that we [currently] have no say in how that leverage might be used.” Claudia Plattner, head of Germany’s cybersecurity agency BSI, said, “We need to become more independent. We need to strengthen our local and European industries … We need to become digitally successful — that is essential to economic strength and to security.” The BSI plans to test sovereign cloud offerings from several large tech companies, including AWS and Google. The testing will examine whether European services can operate independently from parent systems and will help inform Germany’s national cloud strategy. Critics of Europe’s efforts to turn away from the U.S. say it is bound to lead to worse security. Christopher Ahlberg, the CEO of threat intelligence firm Recorded Future, said he understood that things like military command and control must remain national, “but if you start choosing sub-par cyber products just to achieve sovereignty, you’re going to be target No. 1 because threat actors will discover the vulnerabilities.” COMMON GROUND ON CHINA While tensions persist over the U.S.’s dominant position, Washington and European capitals have common ground when it comes to caution over Chinese tech. The EU is drafting legal requirements to cut out Chinese tech from critical supply chains including telecom networks, energy grids, security systems and railways. That move drew the ire of the Chinese government, which called it “blatant protectionism.” Many of the measures mirror what U.S. authorities have done in the past decade. “The U.S. understands what national security is. They don’t want to hear: ‘The U.S. is a threat.’ But they understand resilience,” said Sébastien Garnault, a prominent French cyber policy consultant. Trump “is putting America first, and the same goes in cyberspace,” Cairncross said. But, he added, “we don’t want it to be America alone. We want that partnership.” Laurens Cerulus contributed reporting.
Data
Defense
Intelligence
Military
Security
China hits back at EU over cyber bill
China’s foreign ministry on Wednesday said a new European Commission proposal to restrict high-risk tech vendors from critical supply chains amounted to “blatant protectionism,” warning European officials that Beijing will take “necessary measures” to protect Chinese firms. Beijing has “serious concerns” over the bill, Chinese foreign ministry spokesperson Guo Jiakun told reporters, according to state news agencies’ reports. “Using non-technical standards to forcibly restrict or even prohibit companies from participating in the market, without any factual evidence, seriously violates market principles and fair competition rules,” Guo said. The European Commission on Tuesday unveiled its proposal to revamp the bloc’s Cybersecurity Act. The bill seeks to crack down on risky technology vendors in critical supply chains ranging across energy, transport, health care and other sectors. Though the legislation itself does not name any specific countries or companies, it is widely seen as being targeted at China. 5G suppliers Huawei and ZTE are in the EU’s immediate crosshairs, while other Chinese vendors are expected to be hit at a later stage. European Commission spokesperson Thomas Regnier responded to the Chinese foreign ministry, saying Europe has allowed high-risk vendors from outside the EU in strategic sectors for “far too long.” “We are indeed radically changing this. Because we cannot be naive anymore,” Regnier said in a statement. The exclusion of high-risk suppliers will always be based on “strong risk assessments” and in coordination with EU member countries, he said. China “urges the EU to avoid going further down the wrong path of protectionism,” the Chinese foreign ministry’s Guo told reporters. He added the EU bill would “not only fail to achieve so-called security but will also incur huge costs,” saying some restrictions on using Huawei had already “caused enormous economic losses” in Europe in past years. European telecom operators warned Tuesday that the law would impose multi-billion euro costs on the industry if restrictions on using Huawei and ZTE were to become mandatory across Europe. A Huawei spokesperson said in a statement that laws to block suppliers based on their country of origin violate the EU’s “basic legal principles of fairness, non-discrimination, and proportionality,” as well as its World Trade Organization obligations. The company “reserve[s] all rights to safeguard our legitimate interests,” the spokesperson said. ZTE did not respond to requests for comment on the EU’s plans.
Energy
Intelligence
Security
Technology
Companies
European Parliament weighs banning Russian media from its networks
BRUSSELS — The European Parliament is considering whether to ban access to Russian websites such as Sputnik and RT from its IT infrastructure. Scores of websites hosting the broadcasters’ content remain accessible despite the EU sanctioning Russian media across the bloc in 2022 after Moscow launched its full-scale invasion of Ukraine. The right-wing European Conservatives and Reformists, whose Polish and Italian leaders publicly oppose Russia’s war, asked during a political group leaders’ meeting on Oct. 15 for “Russian propaganda websites under EU sanctions” to be made inaccessible on Parliament’s IT infrastructure. The request comes from Latvian MEP Rihards Kols, who said he wants the Parliament to block access to RT, Sputnik, VGTRK, ANO TV Novosti and others across all Parliament devices and networks. “This is a matter of information security, institutional coherence, and the credibility of the Parliament’s position against Russian disinformation,” he told POLITICO, adding that “the Latvian national media regulator has raised the issue directly with [Parliament] President [Roberta] Metsola.” If approved, the measure would mirror restrictions already imposed on the social media giant TikTok, whose parent company ByteDance is headquartered in Beijing, over network security concerns. The TikTok app was blocked on the Parliament’s Wi-Fi and devices in March 2023. Several political group leaders expressed concerns that the ban could set a precedent for websites being banned “for reasons other than security,” and cited the technical and legal challenges of enforcing such restrictions, according to the meeting notes. Metsola is “investigating” the possibility and studying which other measures are applied in other EU institutions, according to the notes. Kols said “a solution is expected to be proposed in the near future.” The Parliament’s press service said in a statement the matter will be discussed again in a future leaders’ meeting. “The European Parliament takes the protection of its users and their data seriously and implement measures to protect these and its infrastructures.”
Data
Media
Social Media
Politics
Security
Huawei’s solar tech sparks fears of Europe’s next dependency crisis
BRUSSELS — First it was telecom snooping. Now Europe is growing worried that Huawei could turn the lights off. The Chinese tech giant is at the heart of a brewing storm over the security of Europe’s energy grids. Lawmakers are writing to the European Commission to urge it to “restrict high-risk vendors” from solar energy systems, in a letter seen by POLITICO. Such restrictions would target Huawei first and foremost, as the dominant Chinese supplier of critical parts of these systems. The fears center around solar panel inverters, a piece of technology that turns solar panels’ electricity into current that flows into the grid. China is a dominant supplier of these inverters, and Huawei is its biggest player. Because the inverters are hooked up to the internet, security experts warn the inverters could be tampered with or shut down through remote access, potentially causing dangerous surges or drops in electricity in Europe’s networks. The warnings come as European governments have woken up to the risks of being reliant on other regions for critical services — from Russian gas to Chinese critical raw materials and American digital services. The bloc is in a stand-off with Beijing over trade in raw materials, and has faced months of pressure from Washington on how Brussels regulates U.S. tech giants. Cybersecurity authorities are close to finalizing work on a new “toolbox” to de-risk tech supply chains, with solar panels among its key target sectors, alongside connected cars and smart cameras. Two members of the European Parliament, Dutch liberal Bart Groothuis and Slovak center-right lawmaker Miriam Lexmann, drafted a letter warning the European Commission of the risks. “We urge you to propose immediate and binding measures to restrict high-risk vendors from our critical infrastructure,” the two wrote. The members had gathered the support of a dozen colleagues by Wednesday and are canvassing for more to join the initiative before sending the letter mid next week.   According to research by trade body SolarPower Europe, Chinese firms control approximately 65 percent of the total installed power in the solar sector. The largest company in the European market is Huawei, a tech giant that is considered a high-risk vendor of telecom equipment. The second-largest firm is Sungrow, which is also Chinese, and controls about half the amount of solar power as Huawei. Huawei’s market power recently allowed it to make its way back into SolarPower Europe, the solar sector’s most prominent lobby association in Brussels, despite an ongoing Belgian bribery investigation focused on the firm’s lobbying activities in Brussels that saw it banned from meeting with European Commission and Parliament officials. Security hawks are now upping the ante. Cybersecurity experts and European manufacturers say the Chinese conglomerate and its peers could hack into Europe’s power grid.  “They can disable safety parameters. They can set it on fire,” Erika Langerová, a cybersecurity researcher at the Czech Technical University in Prague, said in a media briefing hosted by the U.S. Mission to the EU in September.  Even switching solar installation off and on again could disrupt energy supply, Langerová said. “When you do it on one installation, it’s not a problem, but then you do it on thousands of installations it becomes a problem because the … compound effect of these sudden changes in the operation of the device can destabilize the power grid.”  Surges in electricity supply can trigger wider blackouts, as seen in Spain and Portugal in April. | Matias Chiofalo/Europa Press via Getty Images Surges in electricity supply can trigger wider blackouts, as seen in Spain and Portugal in April. Some governments have already taken further measures. Last November, Lithuania imposed a ban on remote access by Chinese firms to renewable energy installations above 100 kilowatts, effectively stopping the use of Chinese inverters. In September, the Czech Republic issued a warning on the threat posed by Chinese remote access via components including solar inverters. And in Germany, security officials already in 2023 told lawmakers that an “energy management component” from Huawei had them on alert, leading to a government probe of the firm’s equipment. CHINESE CONTROL, EU RESPONSE  The arguments leveled against Chinese manufacturers of solar inverters echo those heard from security experts in previous years, in debates on whether or not to block companies like video-sharing app TikTok, airport scanner maker Nuctech and — yes — Huawei’s 5G network equipment. Distrust of Chinese technology has skyrocketed. Under President Xi Jinping, the Beijing government has rolled out regulations forcing Chinese companies to cooperate with security services’ requests to share data and flag vulnerabilities in their software. It has led to Western concerns that it opens the door to surveillance and snooping. One of the most direct threats involves remote management from China of products embedded in European critical infrastructure. Manufacturers have remote access to install updates and maintenance. Europe has also grown heavily reliant on Chinese tech suppliers, particularly when it comes to renewable energy, which is powering an increasing proportion of European energy. Domestic manufacturers of solar panels have enough supply to fill the gap that any EU action to restrict Chinese inverters would create, Langerová said. But Europe does not yet have enough battery or wind manufacturers — two clean energy sector China also dominates. China’s dominance also undercuts Europe’s own tech sector and comes with risks of economic coercion. Until only a few years ago, European firms were competitive, before being undercut by heavily subsidized Chinese products, said Tobias Gehrke, a senior policy fellow at the European Council on Foreign Relations. China on the other hand does not allow foreign firms in its market because of cybersecurity concerns, he said. The European Union previously developed a 5G security toolbox to reduce its dependence on Huawei over these fears. It is also working on a similar initiative, known as the ICT supply chain toolbox, to help national governments scan their wider digital infrastructure for weak points, with a view to blocking or reduce the use of “high-risk suppliers.” According to Groothuis and Lexmann, “binding legislation to restrict risky vendors in our critical infrastructure is urgently required” across the European Union. Until legislation is passed, the EU should put temporary measures in place, they said in their letter.  Huawei did not respond to requests for comment before publication. This article has been updated.
Data
Energy
Intelligence
Security
Environment
AWS outage fuels call for Europe to limit reliance on US tech
A major outage of Amazon Web Services servers affecting multiple websites Monday morning prompted immediate calls for Europe to boost its tech sovereignty. Slack, Snapchat, Signal and Perplexity were among the affected sites. Amazon Web Services (AWS) offers cloud servers that allow these services and millions of other websites and platforms to run. Brussels is in the midst of a debate on how to achieve digital sovereignty, and what that means exactly, with cloud services at the center of the conversation. EU leaders are expected to take a position during a high-level summit meeting later this week. “Today’s outage shows how concentrated power makes the internet fragile and this lack of resilience hits our economies as a result,” technologist Robin Berjon said in an email. Berjon co-founded the Eurostack project — an initiative campaigning to make Europe self-reliant in digital services. “Europe’s dependency on monopoly cloud companies like Amazon is a security vulnerability and an economic threat we can’t ignore,” Cori Crider, executive director of the Future of Technology Institute, said in an email. According to AWS’s health dashboard, which shows a “running log of AWS service interruptions for the past 12 months,” the outage originated with servers in North America and specifically Virginia. That prompted reaction including from Ulrike Franke, senior fellow at the European Council on Foreign Relations: “My robot vacuum cleaner no longer works and can someone explain why a robot in Paris is linked to U.S. East? Talk about European digital sovereignty…” she posted on Bluesky. “These disruptions are not just technical issues, they’re democratic failures,” said Corinne Cath-Speth, head of digital at civil society group Article 19. “When a single provider goes dark, critical services go offline with it — media outlets become inaccessible, secure communication apps like Signal stop functioning, and the infrastructure that serves our digital society crumbles.” “We urgently need diversification in cloud computing,” she added. Transcription service Trint said in an email that it had experienced disruption but “customers on our EU servers should be largely unaffected.” In a statement shared with media outlets, Amazon Web Services said: “We continue to observe recovery across most of the affected AWS Services. We can confirm global services and features that rely on US-EAST-1 have also recovered. We continue to work towards full resolution and will provide updates as we have more information to share.” Asked at a briefing of reporters in Brussels on Monday, European Commission spokesperson Markus Lammert said the outage “would be a question for the companies, this is not for us to comment on.” With regard to how it had affected the Commission’s own operations, Paula Pinho, chief spokesperson for the European Commission, said: “We were more using for instance e-mails. We go back to our traditional methods.” Pieter Haeck contributed reporting.
Security
Technology
Resilience
Critical infrastructure
Infrastructure
Cyber spying on the rise, EU agency warns
BRUSSELS — Crafty hacking groups backed by hostile states have increasingly targeted European public institutions with cyber espionage campaigns in the past year, the European Union’s cybersecurity agency said Wednesday. Public institutions were the most targeted type of organization, accounting for 38 percent of the nearly 5,000 incidents analyzed, the ENISA agency said in its yearly threat landscape report on European cyber threats. The EU itself is a regular target, it added. State-aligned hacking groups “steadily intensified their operations toward EU organizations,” ENISA said, adding that those groups carried out cyber espionage campaigns on public bodies while also attempting to sway the public through disinformation and interference.  The report looked at incidents from July 1, 2024 to June 30, 2025. Multiple European countries said in August that they had been affected by “Salt Typhoon,” a sprawling hacking and espionage campaign believed to be run by China’s Ministry of State Security. In May, the Netherlands also attributed a cyber espionage campaign to Russia, and the Czech government condemned China for carrying out a cyberattack against its foreign ministry exposing thousands of unclassified emails. These incidents underlined how European governments and organizations are increasingly plagued by cyber intrusions and disruption. Though state-backed cyber espionage is on the rise, ENISA said the most “impactful” threat in the EU is ransomware, a type of hack where criminals infiltrate a system, shut it down and demand payment to allow victims to regain control over their IT. Another type of attack, known as distributed denial-of-service (DDoS), was the most common type of incident, ENISA said. DDoS attacks are most commonly deployed by cyber activists. ENISA said different types of hacking groups are increasingly using each others’ tactics, most notably when state-aligned groups use cyber-activist techniques to hide their provenance. The agency also highlighted the threat to supply chains posed by cyberattacks, saying the interconnected nature of modern services can amplify the effect of a cyberattack.   Passengers at Brussels, Berlin and London Heathrow airports recently experienced severe delays due to a cyberattack on supplier Collins Aerospace, which provides check-in and boarding systems. “Everyone needs to take his or her responsibilities seriously,” Hans de Vries, the agency’s chief operations officer, told POLITICO. “Any company could have a ripple effect … We are so dependent on IT. That’s not a nice story but it’s the truth.”
Intelligence
Security
Supply chains
Services
Disinformation