At Cloud Next 2025, Google launched Ironwood, its fastest and most energy efficient AI chip, alongside major updates to Gemini, Vertex AI, and Cloud WAN. With AI now powering over 2 billion monthly Workspace assists, Google is leading the way in building a connected AI future.
NVIDIA's move to US manufacturing responds to tariffs and Trump's policies. Following White House talks, this shift aims to produce $500B in AI infrastructure while strengthening supply chains in the U.S.
Tariffs on tech imports remain in flux as the Trump administration shifts its stance yet again. Mixed messages, steep levies, and retaliatory tariffs from China have left U.S. businesses and consumers caught in the crossfire of an increasingly chaotic trade strategy.
A new report by Australian researcher Lina Lau links the NSA to a cyberattack on China’s Northwestern Polytechnical University. Allegedly, NSA hackers used U.S. work schedules and American keyboards, exposing their operations.
NSA Faces Scrutiny Over Alleged Cyberattack on Chinese University
The U.S. National Security Agency (NSA) is at the center of new allegations following a detailed analysis by Australian cyber security researcher Lina Lau. Her report outlines how China traced an alleged NSA cyberattack on Northwestern Polytechnical University, a key institution for aerospace and defense research.
Lau’s findings, based on intelligence from Chinese cyber security firms and government sources, suggest that NSA hackers, operating under the alias “Amanda Ramirez,” followed a strict U.S. work schedule, inadvertently exposing operational details. The attackers reportedly used American English keyboards and mistakenly revealed internal system directories due to scripting errors.
3\ How did China attribute this attack to the NSA (APT-C-40) ?
- Over 40 unique tools were forensically uncovered with several sharing similarities to tools mentioned in Shadow Brokers leak
- Attack timestamps aligned with US working hours (9 AM–4 PM EST)
The attackers allegedly gained initial access by compromising Solaris-based servers in China’s neighboring countries using SHAVER, an automated exploitation tool targeting x86/SPARC systems with RPC services.
These servers served as proxies, masking the origin of subsequent phishing campaigns against NPU staff.
Forensic analysis revealed that TAO operators leveraged SECONDDATE, a network surveillance tool installed on border routers and firewalls, to intercept and redirect internal traffic to the NSA’s FOXACID platform.
In response, an NSA official did not deny the allegations but emphasized its role in cyber security defense, stating:
“NSA is unwavering in its commitment to equipping network defenders with timely, actionable guidance to safeguard critical infrastructure against the growing and evolving landscape of cyber threats.”
The report claims NSA operatives systematically extracted classified research, infrastructure data, and sensitive operational documents. The attack allegedly leveraged a hacking platform previously exposed by former NSA contractor Edward Snowden. Lau also noted that China had tracked similar activity dating back years, suggesting a prolonged cyber espionage effort.
Despite growing evidence, the NSA has consistently avoided direct responses regarding its alleged cyber operations. Instead, officials continue to highlight China’s cyber activities, contending that:
“China’s aim is to gain access to our critical networks to sow disruption and chaos.”
The case underscores the ongoing cyber warfare between the U.S. and China, with both nations leveraging digital espionage to gain strategic advantages. As one NSA official reaffirmed:
“It is imperative that we stay committed to providing the most up-to-date guidance and actionable intelligence to those defending our networks.”
The Accusation in Context
The CVERC, China’s equivalent to a national cyber security watchdog, has been vocal about alleged U.S. cyber operations since at least 2022, when the Northwestern Polytechnical University (NPU) incident first came to light. According to their reports, the NSA has been systematically targeting Chinese institutions—universities, government agencies, tech companies, and critical infrastructure—for years.
This bulletin highlights concerns over unauthorized access and data breaches linked to a sophisticated threat actor.
The claim of “tens of thousands” of attacks isn’t just hyperbole; it’s part of a broader narrative China has pushed to depict the U.S. as the aggressor in cyberspace, flipping the script on Washington’s frequent accusations against Chinese hackers such as APT41 or the Ministry of State Security.
The Global Times, a nationalist tabloid run by the Chinese Communist Party’s People’s Daily, has amplified these claims with detailed articles. For instance, in September 2022, it reported that the NSA’s Tailored Access Operations (TAO) unit had conducted over 10,000 cyberattacks against Chinese targets over an unspecified period, later escalating that figure to “tens of thousands” in subsequent coverage. These attacks allegedly aimed to steal sensitive data, disrupt networks, and map out China’s digital infrastructure for future exploitation.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Australia is facing a double threat to its financial security: cyberattacks on major superannuation funds and the fallout from Trump’s “Liberation Day” tariff declaration. Both have exposed deep vulnerabilities in retirement savings, leaving Australia’s future wealth increasingly at risk.
Major cyber alliances are buckling. Australia’s super funds are under digital siege, the US slashes cyber defenses, and Five Eyes unity is faltering. As threats mount from China and Russia, the West’s fractured response risks emboldening adversaries and weakening global cyber resilience.
A coordinated cyberattack hit Australia’s largest pension funds, compromising over 20,000 accounts. Hackers targeted retirees for fraud, exploiting weak authentication. The breach exposed major gaps in super fund security and shook public trust in the $3.5T industry.
NVIDIA's Blackwell Chip ignites an AI innovation race, slashing DeepSeek R1’s time to 10 seconds. Dobot’s $27,500 humanoid robot dazzles, sending stocks soaring with affordable automation flair. Alphabet’s $32B Wiz buy excites markets, yet U.S. cyberattacks cast a dark shadow over tech’s rise.