top of page

Cerca


Beyond the Alliance: Why Russia should beware of China's ambitions in the Arctic
Cooperation between Russia and China on the North Sea Route (NSR) offers Russia opportunities for economic and strategic development,...

Gabriele Iuvinale
2 agoTempo di lettura: 4 min


Hafnium: Irrefutable Evidence of China's State-Backed Cyber Assault
Beijing is weaponizing its cyber operations through a network of companies and hackers, such as Hafnium, utilizing covert patents for...

Gabriele Iuvinale
31 lugTempo di lettura: 8 min


Cadence Design Systems Fined Over $140 Million for Illegal Tech Exports to Chinese Military University
Cadence Design Systems Inc., his declaration of guilt and the transactive agreement of over 140 million dollars for the illegal export of...
Nicola Iuvinale
29 lugTempo di lettura: 5 min


When Your AI Is a Propaganda Megaphone: The Hidden Risks of Chinese Chatbots
NewsGuard's recent report on Chinese generative artificial intelligence models isn't just an alarm bell about technical performance; it's...

Gabriele Iuvinale
26 lugTempo di lettura: 4 min


Cyberwar in Southeast Asia: The Cyber Clashes Between Cambodia and Thailand and Their Global Ramifications
The conflict between Cambodia and Thailand, which escalated in May 2025 with border clashes and mutual accusations, quickly spilled over...

Gabriele Iuvinale
26 lugTempo di lettura: 16 min


Digital state crime: China unleashes its "liminal warfare" against the West, with the SharePoint attack the latest scar - Analysis
Beijing's shadow extends into a ruthless cyberwarfare: the devastating attack on Microsoft SharePoint, which compromised hundreds of...

Gabriele Iuvinale
26 lugTempo di lettura: 22 min


Australia, an Unforgivable Betrayal: Canberra Sacrifices Security for Chinese Illusions - Analysis
Australian Prime Minister Anthony Albanese 's visit to China in July 2025, and the joint statement that emerged outlining an ambitious...

Gabriele Iuvinale
21 lugTempo di lettura: 13 min


From Self-taught Patriots to Total Weaponry: The Chinese Method for Global Cybernetic Domination
Th new report “BEFORE VEGAS” by Eugenio Benincasa (CSS, ETH Zürich) unmasks China's meteoric rise to global cyber power, orchestrating an...

Gabriele Iuvinale
21 lugTempo di lettura: 20 min


TikTok, AliExpress, WeChat: Charges for failure to comply with GDPR
The allegations, which will have to be confirmed in court, relate to failure to provide full and understandable access to personal data...

Gabriele Iuvinale
18 lugTempo di lettura: 11 min


Massistant, the Chinese Malware that Devastates Travelers' Privacy
Mobile security firm Lookout has exposed Massistant , a new and powerful mobile forensic tool that stands as the unsettling successor to...

Gabriele Iuvinale
17 lugTempo di lettura: 6 min


Exclusive report. The PLA's "Urban Collapse Warfare" Doctrine: Integrating Big Data, Generative AI, and the Lorenz Butterfly Effect for the Conquest of Taiwan
Abstract This report explores the Chinese People's Liberation Army (PLA)'s emerging "urban collapse warfare" doctrine, which aims to...
Nicola Iuvinale
15 lugTempo di lettura: 14 min


Artificial Intelligence and Geopolitics: An In-Depth Investigation - Report
The era of Artificial Intelligence has arrived and, with it, a radical rearrangement of global powers. As AI promises to unravel the...

Gabriele Iuvinale
10 lugTempo di lettura: 27 min


The PLA's Robotic Revolution: Humanoids on Tomorrow's Battlefield
Abstract This article explores the People's Liberation Army's (PLA) strategic vision for integrating humanoid robots into future...
Nicola Iuvinale
10 lugTempo di lettura: 14 min


From Laboratories to PLA: The Dangerous Links of Chinese AI and Western Unconsciousness
Western companies, including financial giants such as HSBC and Standard Chartered, industrial players such as Saudi Aramco, and even...

Gabriele Iuvinale
3 lugTempo di lettura: 10 min


Stolen Secrets, Eluded Sanctions: U.S. Accusations of Huawei and Global Risks
Extrema Ratio reviewed the federal prosecution record, revealing the legal vulnerabilities and strategic implications of unprecedented...

Gabriele Iuvinale
2 lugTempo di lettura: 19 min


CHINESE DIGITAL AGGRESSION IS NO LONGER TOLERABLE: HOUKEN ROOTKITS UNVEIL BEIJING'S LIMINAL WARFARE STRATEGY
Key Takeaways Aggressive State-Sponsored Cyber Operations: The Chinese state is actively engaged in a persistent and incremental...

Gabriele Iuvinale
2 lugTempo di lettura: 14 min


Western Technology and Chinese Ambitions: Where is the Boundary? The Oracle-TikTok Alliance Question
The partnership between Oracle and ByteDance , highlighted by the new SemiAnalysis report, drives AI growth but raises serious national...

Gabriele Iuvinale
30 giuTempo di lettura: 14 min


Temu Under Accuse: U.S. and EU Denounce Espionage, Fraud and Forced Labor in the Chinese Empire of Cheap
Extrema Ratio has conducted an in-depth analysis of the documentation revealing the complex legal and geopolitical challenges...

Gabriele Iuvinale
28 giuTempo di lettura: 14 min


The Price of Chinese Wind: European Competitiveness and Strategic Risks in the Rise of Ming Yang
Key Points Aggressive Expansion in Critical Sectors: Chinese wind giant Ming Yang Smart Energy has entered the European market starting...

Gabriele Iuvinale
27 giuTempo di lettura: 18 min


The Chinese PLA's New Playbook. Beyond the Bomb: How Severe Deterrence Aims to Paralyze the Enemy Nation
Abstract This article analyzes the strategic concept of "Severe Deterrence" as a doctrinal innovation designed to overcome the...
Nicola Iuvinale
27 giuTempo di lettura: 7 min
bottom of page