Next-gen tech: Next-gen threats
John E. Kaye
- Published
- Home, Technology

Bleak as it might sound, a digital cold war is likely to unfold over the next two years causing significant damage to business. The threat will take many forms, including the race to develop strategically important, next-generation technologies to provoke a period of intense nation state-backed espionage. Intellectual property (IP) will be targeted as the battle for economic and military dominance rages on, while cloud services will become a prime target for sabotage by those seeking to cause disruption to society and business. Drones will become both the weapon and target of choice as attackers turn their attention skywards. The threats on the horizon are numerous, so let us examine them closer and what they might mean for your organisation.
State-backed espionage targets next-gen tech
Nation states’ intelligence services will combine forces with commercial organisations to launch a new wave of industrial espionage. Organisations developing strategically important, next generation technologies will be systematically targeted as national and commercial interests blur.
Business models will unravel as data is compromised by nation state-backed attackers aiming to steal secrets and disrupt development. Strategic plans, IP and other trade secrets regarding the next generation of technologies will become a prime target for nation states aiming to get ahead in the race for economic and military superiority. Whilst the concept of espionage is not new, the digital realm has widened the attack surface. Cyber spies will optimise existing tools and develop new ones to launch espionage attacks on a grand scale. Targeted organisations should expect to face sustained and well-funded attacks, involving a range of techniques such as drone surveillance, zero-day exploits, Distributed Denial of Service (DDoS) attacks and advanced, persistent threats. This will be amplified by concerted attempts to infiltrate organisations and coerce existing employees.
The first nation state to develop technologies such as Artificial Intelligence (AI), 5G, robotics and quantum computing will gain unparalleled economic, social and military advantage over rivals. Organisations involved in their development will become highly enticing targets for nation state-backed espionage.
Organisations that use or develop next generation technologies will need to take proactive steps to secure IP or take legal steps to mitigate the impact of espionage.
Sabotaged cloud services freeze operations
The cloud is another area ripe for malicious exploitation. Indeed, much of what follows is already going on and it’s something your business should be acutely aware of. Attackers aiming to disrupt Critical National Infrastructure (CNI) or cripple supply chains will systematically sabotage cloud service providers. Organisations dependent on cloud services will find their operations and supply chains undermined when key cloud services go down for extended periods of time.
Nation states that engage in a digital cold war will aim to disrupt economies and take down CNI by sabotaging cloud infrastructure through traditional physical attacks or by exploiting vulnerabilities across homogeneous technologies. Attacks on cloud providers will become more regular, resulting in significant damage to businesses that share those platforms. Organisations with a just-in-time supply chain model will be particularly vulnerable to service outages and will struggle to know when services will be restored, as cloud providers scramble to prioritise customer recovery.
Further consolidation of the cloud services market will create a small number of distinct targets that underpin a significant number of business models, government services and critical infrastructure. A single act of sabotage will freeze operations across the globe. Organisations that are reliant on cloud providers for one or more critical system or service should prioritise preparation and planning activities to ensure future resilience.
Drones become both predator and prey
We have already witnessed numerous examples of drones being used maliciously to disrupt businesses, and this is only likely to increase over the short-term. But the threat is likely to increase as drones become smaller, more autonomous with increased range and equipped with cameras for prolonged surveillance missions. Flying in close proximity to operating environments, they will also be used to conduct advanced, man-in-the-middle attacks, degrade mobile networks, or spoof and jam other signals.
Conversely, drones will become prey as they are targeted by attackers in order to disrupt dependent businesses. Drones will be knocked out of the sky and hijacked. Information collected by drones will be stolen or manipulated in real-time. Industries that leverage drones to become more efficient, such as construction, agriculture and border control, will see their drones targeted as attackers’ spoof and disrupt transmissions.
Technological breakthroughs in drone technologies, combined with developments in 5G, big data, the Internet of Things (IoT), and the relaxation of aviation regulations, will mean that drones will become increasingly important to operating models. Organisations will rely upon them for delivery, monitoring, imagery and law enforcement, while attackers will embrace drones as their new weapon of choice. The threat landscape will take to the skies.
If an organisation is reliant upon drones for critical operations, then diligent risk assessments need to be conducted, and controls must be implemented or upgraded to mitigate risk to the business. As drones take to the skies, organisations must become more vigilant and warier.
Preparation must begin now
Information security professionals are facing increasingly complex threats — some new, others familiar but evolving. In the face of mounting global threats, organisations must make methodical and extensive commitments to ensure that practical plans are in place to adapt to major changes in the near future. Employees at all levels of the organisation will need to be involved, from board members to managers in non-technical roles.
The threats listed here could significantly impact businesses operating in cyberspace at break-neck speeds, particularly as the use of the internet and connected devices spreads. Many organisations will struggle to cope as the pace of change intensifies. These threats should stay on the radar of every organisation, both small and large, even if they seem distant.

Steve Durbin, Managing Director of Information Security Forum
Further information
RECENT ARTICLES
-
AI-driven phishing surges 204% as firms face a malicious email every 19 seconds -
Deepfake celebrity ads drive new wave of investment scams -
Europe eyes Australia-style social media crackdown for children -
Europe opens NanoIC pilot line to design the computer chips of the 2030s -
Building the materials of tomorrow one atom at a time: fiction or reality? -
Universe ‘should be thicker than this’, say scientists after biggest sky survey ever -
Lasers finally unlock mystery of Charles Darwin’s specimen jars -
Women, science and the price of integrity -
Meet the AI-powered robot that can sort, load and run your laundry on its own -
UK organisations still falling short on GDPR compliance, benchmark report finds -
A practical playbook for securing mission-critical information -
Cracking open the black box: why AI-powered cybersecurity still needs human eyes -
Tech addiction: the hidden cybersecurity threat -
Parliament invites cyber experts to give evidence on new UK cyber security bill -
ISF warns geopolitics will be the defining cybersecurity risk of 2026 -
AI boom triggers new wave of data-centre investment across Europe -
Make boards legally liable for cyber attacks, security chief warns -
AI innovation linked to a shrinking share of income for European workers -
Europe emphasises AI governance as North America moves faster towards autonomy, Digitate research shows -
Surgeons just changed medicine forever using hotel internet connection -
Curium’s expansion into transformative therapy offers fresh hope against cancer -
What to consider before going all in on AI-driven email security -
GrayMatter Robotics opens 100,000-sq-ft AI robotics innovation centre in California -
The silent deal-killer: why cyber due diligence is non-negotiable in M&As -
South African students develop tech concept to tackle hunger using AI and blockchain


























