Pro

joined 3 weeks ago
MODERATOR OF
psy
 

Reddit

For decades, European firms have leaned on Google Workspace and Microsoft 365 rather than home-grown tools. Our new Europe Tech Sovereignty Watch study maps just how deep that dependency goes — and it should concern anyone focused on EU privacy, security, or innovation.

Key findings

  • 74% of all publicly listed European companies run core services on Google or Microsoft. Several sectors/countries hit 100% reliance.
  • Email is the gateway: pick a US mail suite and you usually adopt its entire stack (storage, IAM, security, analytics).
  • Because both vendors are US entities, the CLOUD Act can compel hand-over even when the server sits in Frankfurt or Dublin.

74% of all publicly listed European companies run critical services (starting with email) on Google or Microsoft. In some sectors and countries, reliance hits 100%.

  • 🇫🇷 France: 61% of companies rely on US providers. For utilities, it’s 87%.
  • 🇬🇧 UK: 75% of companies depend on US tech for their email and communications.
  • 🇪🇸 Spain: 65% of companies rely on US services, including five sectors at 100%.
  • 🇵🇹 Portugal: 65% of businesses use US providers. In nine sectors, that figure is 100%
  • 🇮🇪 Ireland: In 11 sectors, 100% of large companies use US-based tech.

Why it matters

  • Company comms may feed foreign AI training sets.
  • EU data is vulnerable to US surveillance and extraterritorial subpoenas.
  • Critical infrastructure (utilities, transport, telecom) becomes a geopolitical pressure point.
  • Dependence fuels brain drain and suppresses European innovation.
 

The board determined the primary contributing factors were OceanGate’s inadequate design, certification, maintenance and inspection process for the Titan. Other factors cited in the report include a toxic workplace culture at OceanGate, an inadequate domestic and international regulatory framework for submersible operations and vessels of novel design, and an ineffective whistleblower process under the Seaman’s Protection Act.

The board also found OceanGate failed to properly investigate and address known hull anomalies following its 2022 Titanic expedition. Investigators determined the Titan’s real-time monitoring system generated data that should have been analyzed and acted on during the 2022 Titanic expedition. However, OceanGate did not take any action related to the data, conduct any preventative maintenance or properly store the Titan during the extended off season before its 2023 Titanic expedition.

 

Extreme price swings in wholesale electricity markets and growing concerns around grid instability are opening up new markets for energy storage. Batteries are now a critical solution to drive value for both capital and consumers.

2
submitted 1 week ago* (last edited 1 week ago) by Pro@mander.xyz to c/cybersecurity@infosec.pub
 

Full PDF Report.

CTM360 has discovered a widespread ongoing malicious campaign specifically aimed at TikTok Shop users across the globe. Threat actors are exploiting the official in-app e-commerce platform through a dual attack strategy that combines phishing and malware to target users. The core tactic involves a deceptive replica of TikTok Shop that tricks users into thinking theyʼre interacting with a legitimate affiliate or the real platform. We have dubbed this Tiktok Shop scam campaign as “ClickTokˮ.

The ongoing TikTok Shop scam campaign employs multiple sophisticated tactics to target different users including end users (buyers), and TikTok Shop Affiliate Program participants on the platform. The Threat actors are using fake Meta ads and AI-generated TikTok videos that mimic influencers or official brand ambassadors.

A key element of the campaign involves lookalike domains that closely mimic legitimate TikTok URLs. These domains serve two main purposes: hosting phishing pages designed to steal user credentials and distributing trojanized apps. Once installed, these trojanized apps mimic TikTokʼs interface but covertly deploy a variant of the SparkKitty Spyware, enabling deep data exfiltration from compromised devices.

Key Findings on ClickTok Scam Campaign:

  • The campaignʼs scope extends beyond TikTok Shop impersonation and includes fraudulent versions of TikTok Wholesale and TikTok Mall. Over 10,000 + impersonated websites have been identified to date, many hosted on dedicated spoofed domains.
  • TikTok shop sites have been observed using free or low-cost top-level domains such as .top, .shop, and .icu etc.
  • The threat actors distribute malicious App files through embedded download links and QR codes, with 5,000 distinct App download sites detected thus far.
  • The campaign cryptocurrency wallet as the payment method, subsequently hijacks transactions to carry out fraud and steal digital funds.
  • TikTok Shop is officially available in 17 countries, including the UK, US, Indonesia, and several in Europe and Asia; however, TikTok shop scams is rapidly increasing and spreading on a global scale, targeting users worldwide beyond these regions.
view more: ‹ prev next ›