top of page

Cerca


Strategic Analysis: China's Doctrine on APP Security and Implications for Cyber Intelligence
The 2025 CAICT Report ( "Guidelines for Risk Classification and Grading of Mobile Internet Applications (APP) (2025) ") is not merely a...

Gabriele Iuvinale
11 ore faTempo di lettura: 3 min


Chinese Digital Sovereignty: Beijing's Dual Truth Between GAI Domination and Operational Vulnerabilities - Analysis
From Staticity to the Fifth Line: The Doctrine of Active Defense and Architectural Risks Abstract This analysis decodes the cybersecurity...

Gabriele Iuvinale
26 setTempo di lettura: 7 min


Chinese Drone Experts Deploy to Russia, Deepening Collaboration on Military UAVs for Ukraine War. China's Dual Role: Fuelling Russia's War while Powering EU's High-Tech Imports
Chinese Drone Experts Deploy to Russia, Deepening Collaboration on Military UAVs for Ukraine War. China's Dual Role: Fuelling Russia's War while Powering EU's High-Tech Imports
Nicola Iuvinale
25 setTempo di lettura: 4 min


Geopolitics of Cryptography: The Impact of New Regulations in China and Russia on Critical Infrastructure and Global Security
China and Russia are introducing stringent regulations on the use of cryptography to protect their critical infrastructure, an action...

Gabriele Iuvinale
23 setTempo di lettura: 4 min


China's cybersecurity strategy: between national protection and speech control
Beijing's new strategy between cyber defense and repression of dissent Recent moves by the Cyberspace Administration of China (CAC)...

Gabriele Iuvinale
22 setTempo di lettura: 3 min


How the TikTok deal betrays US national security, ensuring the triumph of China's strategy
The framework agreement between the United States and China on TikTok is not a diplomatic solution, but a blatant and humiliating...

Gabriele Iuvinale
21 setTempo di lettura: 4 min


The geopolitics of semiconductors: Chinese analysis reveals Beijing's next moves between collaboration and security risks
A recent study from the prestigious Chinese Academy of Sciences offers a rare look into China’s strategy for strengthening its...

Gabriele Iuvinale
19 setTempo di lettura: 3 min


Behind the Scenes of Global Fraud: How a Chinese Network Sells Fake IDs in North America
An investigation by the CloudSEK STRIKE team has unmasked a massive counterfeit identity operation, named ForgeCraft , which sells fake...

Gabriele Iuvinale
19 setTempo di lettura: 3 min


“Intelligent World 2035”: a roadmap for progress or control? The geostrategic analysis behind Huawei's vision
AI as a Tool of Power: Huawei's Vision and the Global Security Dilemma Huawei's evolution from a telecommunications giant to a global...

Gabriele Iuvinale
17 setTempo di lettura: 4 min


Command and Control: An In-Depth Analysis of China's New Framework for Artificial Intelligence in National Security and Global Influence
An analysis of how a centralized governance model and push toward technological self-sufficiency are positioning China as a leader in the...

Gabriele Iuvinale
17 setTempo di lettura: 7 min


RED ALERT: China Conducts Global Espionage Campaign Exploiting Our Networks
Joint US-Allied Alert Reveals Espionage Campaign Undermining Critical Global Infrastructure The Chinese government is conducting a global...

Gabriele Iuvinale
27 agoTempo di lettura: 3 min


Beyond the Alliance: Why Russia should beware of China's ambitions in the Arctic
Cooperation between Russia and China on the North Sea Route (NSR) offers Russia opportunities for economic and strategic development,...

Gabriele Iuvinale
2 agoTempo di lettura: 4 min


Hafnium: Irrefutable Evidence of China's State-Backed Cyber Assault
Beijing is weaponizing its cyber operations through a network of companies and hackers, such as Hafnium, utilizing covert patents for...

Gabriele Iuvinale
31 lugTempo di lettura: 8 min


Cadence Design Systems Fined Over $140 Million for Illegal Tech Exports to Chinese Military University
Cadence Design Systems Inc., his declaration of guilt and the transactive agreement of over 140 million dollars for the illegal export of...
Nicola Iuvinale
29 lugTempo di lettura: 5 min


When Your AI Is a Propaganda Megaphone: The Hidden Risks of Chinese Chatbots
NewsGuard's recent report on Chinese generative artificial intelligence models isn't just an alarm bell about technical performance; it's...

Gabriele Iuvinale
26 lugTempo di lettura: 4 min


Cyberwar in Southeast Asia: The Cyber Clashes Between Cambodia and Thailand and Their Global Ramifications
The conflict between Cambodia and Thailand, which escalated in May 2025 with border clashes and mutual accusations, quickly spilled over...

Gabriele Iuvinale
26 lugTempo di lettura: 16 min


Digital state crime: China unleashes its "liminal warfare" against the West, with the SharePoint attack the latest scar - Analysis
Beijing's shadow extends into a ruthless cyberwarfare: the devastating attack on Microsoft SharePoint, which compromised hundreds of...

Gabriele Iuvinale
26 lugTempo di lettura: 22 min


Australia, an Unforgivable Betrayal: Canberra Sacrifices Security for Chinese Illusions - Analysis
Australian Prime Minister Anthony Albanese 's visit to China in July 2025, and the joint statement that emerged outlining an ambitious...

Gabriele Iuvinale
21 lugTempo di lettura: 13 min


From Self-taught Patriots to Total Weaponry: The Chinese Method for Global Cybernetic Domination
Th new report “BEFORE VEGAS” by Eugenio Benincasa (CSS, ETH Zürich) unmasks China's meteoric rise to global cyber power, orchestrating an...

Gabriele Iuvinale
21 lugTempo di lettura: 20 min


TikTok, AliExpress, WeChat: Charges for failure to comply with GDPR
The allegations, which will have to be confirmed in court, relate to failure to provide full and understandable access to personal data...

Gabriele Iuvinale
18 lugTempo di lettura: 11 min
bottom of page