Tech Intelligence Copy RSS link Link copied to clipboard!
India shifts to zero-trust architecture to combat AI-driven cyber fraud
India is reassessing digital identity frameworks and adopting zero-trust architecture to address a surge in AI-assisted cyber fraud. Investigations reveal a shift from basic phishing to sophisticated scams involving voice cloning, identity mimicry, and automated attacks targeting UPI users. Government agencies and financial institutions are deploying real-time monitoring, behavioural analytics, and stronger authentication protocols to counter these threats. The Indian Cyber Crime Coordination Centre has expanded its role, while policymakers focus on balancing security with user convenience to protect the digital economy.
Glasgow hosts inaugural Scottish Defence Procurement and Supply Chain Summit
Glasgow will host the inaugural DPRTE Scottish Defence Procurement and Supply Chain Summit on 20 May. Officially supported by the Ministry of Defence and ADS Scotland, the event connects Scottish industry with increased defence investment opportunities. Keynote speakers include Douglas Alexander MP and Calum Taylor. The summit aims to strengthen Scotland's position in the UK and global defence ecosystem by enabling access to procurement routes and building supply chain resilience. Topics include naval platforms, submarine support, radar, space capability, and digital technology.
Defence Minister warns of AI dual-use perils citing BrahMos and Sudarshan systems
Defence Minister Rajnath Singh warned at the ANI National Security Summit 2.0 that artificial intelligence presents significant dual-use risks, including deep fakes, cyber warfare, and autonomous weapons. He highlighted India's application of AI in defence operations such as Operation Sindoor and within the BrahMos and Sudarshan missile systems. Singh noted that while AI enhances precision and security, it requires robust deterrence strategies against potential misuse. He also mentioned AI initiatives for pension processing to improve soldier welfare.
India approves Ghatak stealth drone project worth 39,000 crores
The Indian Defence Ministry has recommended the acquisition of 60 Ghatak stealth Unmanned Combat Aerial Vehicles (UCAVs) developed by the DRDO under the Remote Piloted Strike Aircraft (RPSA) initiative. Valued at approximately ₹39,000 crore, the project aims to deliver deep-strike capabilities and operates under a development-cum-production partner model involving the private sector. The aircraft, designed for autonomous operations in contested airspace, is intended to support the Indian Air Force's Vision 2047 roadmap alongside manned fighter jets.
EON Space Labs launches germanium-free thermal drone camera for long-range surveillance
Hyderabad-based start-up EON Space Labs has launched Lumira_E40I50, India's first germanium-free thermal drone camera. The device uses chalcogenide glass and onboard AI to detect humans from two kilometres and vehicles from eight kilometres. This development addresses India's reliance on imported germanium, whose supply chain has been disrupted by geopolitical tensions and export restrictions, particularly from Israel. The camera is designed for aerial intelligence, surveillance, and reconnaissance missions, offering a strategic step towards self-reliance in critical defence technologies.
Apple attributes Mac mini shortage to AI demand surge
Apple states that the scarcity of Mac mini and Mac Studio units is driven by unexpectedly high demand fueled by the artificial intelligence industry. Tim Cook noted during financial results that customer response to these machines as local AI platforms was faster than predicted. The surge is attributed to the use of these devices for developing and running AI applications locally, rather than relying on cloud services. Apple expects several months to pass before supply and demand reach equilibrium.
North Korea establishes AI research center for cyber warfare
In March 2025, North Korea opened Research Center 227 under the Reconnaissance General Bureau in Pyongyang. The unit employs 90 specialists to develop AI-based offensive techniques for cyber espionage, digital asset theft, and critical infrastructure disruption. This institutionalizes a strategy previously used by hacker groups like Lazarus Group, which stole approximately $2 billion in 2025. The center aims to overcome human resource bottlenecks by leveraging AI to automate attacks and improve phishing capabilities, significantly increasing operational efficiency and threat potential.
Anthropic's Mythos AI reveals critical vulnerabilities in global digital infrastructure
Anthropic released Mythos Preview, an AI model capable of identifying thousands of high-severity software vulnerabilities in major operating systems and browsers. The tool poses significant risks to essential services including banking, electricity, and communications if misused. While Anthropic restricted access to forty major companies via Project Glasswing, experts warn that unauthorised access and rapid replication by other developers could expose global infrastructure. The release has prompted regulatory concern internationally, with Australia's former e-safety commissioner criticising the lack of mandatory guardrails in local AI policy.
David Sacks says AI will reshape cyber offense and defense
David Sacks, a member of the US Council of Advisers on Science & Technology, stated that AI models are tools reshaping cybersecurity rather than doomsday devices. He noted that while AI discovers existing vulnerabilities, it can also help patch them, potentially hardening systems. Sacks emphasized the need for defenders to access these models before attackers, citing rapid development in China. He predicted a market shift towards a new equilibrium between AI-powered offense and defense.
Palo Alto Networks to acquire Portkey to boost AI security play
Palo Alto Networks announced its intent to acquire AI infrastructure startup Portkey to strengthen capabilities in securing enterprise adoption of autonomous AI systems. The deal is expected to close in the fourth quarter of fiscal 2026, subject to necessary approvals. Financial terms were not disclosed. Palo Alto Networks plans to integrate Portkey's AI gateway into its Prisma AIRS platform to address risks associated with AI agents. Portkey, founded in 2023, provides an LLMOps platform acting as a single access layer for over 1,600 AI models.
UK Cyber Strategy Lacks Regional Capability Infrastructure
Analysis of CYBERUK 2026 identifies a critical gap between national cyber strategy and execution, attributing it to missing regional capability infrastructure. Without this layer, SMEs struggle to scale, supply chains destabilise, and resilience fails to distribute effectively. The report argues that while government policy provides clear direction, the mechanisms to translate strategy into scalable organisational resilience are undefined, leading to uneven capability development and potential system fragility.
Samsung reports record quarterly profit driven by 49-fold jump in chip income
Samsung Electronics reported a record quarterly profit of 57.2 trillion won, with its chip division generating 53.7 trillion won, a 49-fold increase from the previous year. This surge is attributed to a boom in AI data centre construction and sustained spending by major technology firms. While Samsung secured multi-year contracts to manage supply constraints, it faces potential production disruptions from union strikes in South Korea. Additionally, rising component costs are expected to reduce profitability in the mobile and display divisions.
Data centre industry evaluates direct current architectures for AI workloads
The rapid expansion of artificial intelligence workloads is driving data centre operators to reconsider power architectures, with direct current (DC) emerging as a potential solution for high-density racks exceeding 200kW. While alternating current (AC) remains dominant, the industry is exploring high-voltage DC distribution, such as 800VDC, to improve efficiency and reduce cabling constraints. Experts note that no single standard has emerged yet, with a likely future involving hybrid AC/DC systems and coexistence of multiple configurations as technical standards are defined by initiatives like the Open Compute Project.
Apple CEO Tim Cook warns of extended memory crunch and higher costs
Apple CEO Tim Cook warned that rising memory costs will increasingly impact the business during a Q&A session following the company's earnings call. Citing supply constraints driven by AI infrastructure demand, Cook stated the company would evaluate a range of options to address the issue. While Apple reported revenue growth of 17% for the fiscal second quarter, executives noted that memory shortages will significantly affect Mac models in the upcoming quarter. The global memory crisis has forced tech giants like Microsoft and Meta to increase capital expenditure forecasts due to elevated component prices.
Multiple organisations suffer data breaches and cyber attacks in April 2026
In April 2026, numerous global entities including Mercor, Cisco, the European Commission, Jones Day, Snowflake, Eurail, Los Angeles City Attorney's Office, China's supercomputers, Basic-Fit, Booking.com, Rockstar Games, McGraw-Hill, Ameriprise, Bol.com, Vercel, Canada Life, Russia's Gonets system, France Titres, Rituals, Udemy, UK Biobank, Coupang, ADT, Medtronic, Vimeo, Pitney Bowes, Amtrak, and Movistar Peru experienced data breaches or cyber attacks. Threat actors such as TeamPCP, Lapsus$, Silent ransom group, ShinyHunters, FlamingChina, and World Leaks were involved. Incidents ranged from supply chain compromises and stolen source code to the exposure of personal, financial, and sensitive government data affecting millions of individuals across various sectors including healthcare, technology, finance, and public services.
Cybersecurity standards and supply chain risks emerge for EV charging infrastructure
EV charging networks face growing cyber threats due to grid connectivity, with vulnerabilities in software, hardware, and third-party apps. Recent data breaches, including one involving Tesla chargers in the Middle East, highlight risks to customer data and grid stability. Governments in the US and EU are tightening regulations, such as the NIS2 Directive and proposed bans on Chinese components, to mitigate supply chain risks. Industry bodies are promoting standards like OCPP 2.0.1, ISO 15118, and NIST IR 8473 to enhance security protocols, encryption, and network segmentation across the sector.
UK AI Security Institute finds GPT-5.5 matches Claude Mythos in cyber attack tests
The UK AI Security Institute (AISI) reports that OpenAI's GPT-5.5 performs on par with Anthropic's Claude Mythos Preview in cyberattack evaluations. GPT-5.5 fully completed a multi-stage enterprise attack simulation and achieved a 71.4% success rate on expert-level tasks, slightly edging out Claude Mythos. AISI notes these results indicate growing AI autonomy in security breaches. However, a universal jailbreak bypassed all of OpenAI's safety safeguards, and GPT-5.5 failed to solve an industrial control system simulation. The tests lacked active defenders, highlighting risks for poorly protected networks.
White House opposes Anthropic plan to expand access to Mythos AI model
The White House has opposed Anthropic's proposal to expand access to its Mythos AI model to approximately 70 additional companies. Officials cited national security concerns and the risk of misuse, noting potential vulnerabilities in critical infrastructure such as power plants and hospitals. The model is currently restricted to select partners including Amazon, Apple, Google, Microsoft, and NVIDIA. Concerns were heightened by reports of unauthorized access during the model's limited release phase.
Anthropic launches public beta of Claude Security for enterprise customers
Anthropic has launched the public beta of Claude Security, a vulnerability detection and remediation tool available to enterprise customers. Powered by the Claude Opus 4.7 model, the platform performs deep contextual code analysis to reduce false positives and provide actionable patch instructions. New features include scheduled scanning, directory-level targeting, and webhook integrations. Major cybersecurity vendors are embedding the underlying model into their tools.
BufferZoneCorp account used to distribute malicious Ruby gems and Go modules
A sophisticated supply chain attack originating from the GitHub account BufferZoneCorp has been uncovered, targeting developers and continuous integration environments. Threat actors deployed sleeper packages in the Ruby and Go ecosystems that impersonated legitimate tools. These malicious packages execute credential theft by harvesting environment variables and scanning for sensitive files like SSH keys and AWS credentials. The stolen data is exfiltrated to remote endpoints. Additionally, some Go modules manipulate GitHub Actions workflows by altering environment variables, disabling checksum verification, and planting fake execution wrappers. Certain payloads also establish persistent backdoor access by appending SSH public keys to authorized files. Security teams have blocked the identified Go modules, but Ruby gems remained active during early investigations. Experts advise auditing environments and rotating credentials.