Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

UK and China reach out across cyber no-man’s land | Computer Weekly

By Computer Weekly by By Computer Weekly
January 21, 2026
Home Uncategorized
Share on FacebookShare on Twitter


The British and Chinese authorities have reached out to one another to explore setting up a cyber security forum between the two countries, according to reports.

The so-called ‘Cyber Dialogue’ will supposedly help manage cyber threats to both country’s national security, revealed Bloomberg, which was first to reported the move citing anonymous sources with knowledge of the forum, 

It claimed that the forum will improve communication, enable private discussions, and deescalate tensions. It also establishes a direct line between London and Beijing to enable senior officials to discuss ongoing cyber incidents.

The officials concerned allegedly told Bloomberg that while they did not expect the forum to put an end to Chinese cyber attacks on UK targets, it may at least help mitigate the potential dangers.

Chinese relations

Computer Weekly understands the UK government has declined to comment on the existence of any such initiative, but the reports come at an important time for the UK’s relations with China – hot on the heels of Westminster’s approval of China’s new ‘mega-embassy’ in London, and ahead of a planned visit by the Prime Minister to Beijing.

On the global stage, the news also lands against the backdrop of a geopolitical reset that threatens to upend the international rules-based systems which have prevented a conflict akin to the Second World War for the past 80 years.

However, it would be naïve in the extreme to think it means that the UK and China are seeking to wage peace in cyberspace.

The UK’s National Cyber Security Centre (NCSC), which is embedded within Britain’s national security apparatus as a branch of GCHQ, continues to regard China as a “highly sophisticated and capable threat actor”.

Although perhaps not as noisy a threat as the financially-motivated cyber attacks against the likes of Marks & Spencer or Jaguar Land Rover, threat actors linked to the Chinese state are known to frequently target individuals of interest to Beijing’s intelligence-gathering goals, and organisations in sectors such as defence, government and telecoms.

Just last month, the UK government exposed and sanctioned two Chinese companies, named as Integrity Technology Group Incorporated and Sichuan Anxun Information Technology Co. Ltd, for their role in a series of “reckless and indiscriminate cyber attacks” against over 80 Western targets, including UK public sector IT systems.

At the time, the NCSC said it was “almost certain” that such companies, which often operate as private sector cyber security companies and data brokers, are little more than a front for Chinese state cyber ops.

“Pragmatic”

Michael Bell, founder and CEO of Suzu Labs, a security services provider, described the dialogue as a pragmatic move on the part of both countries.

 “Cyber operations exist in a grey zone. They’re not acts of war, but they’re not peacetime activity either. Without communication channels, an incident response could be misread as aggression. Escalation becomes more likely when neither side understands the other’s red lines,” said Bell

He noted that the administration of president Obama established its own short-lived cyber hotline between Washington DC and Beijing back in 2015.

“[The UK is] not pretending the threat doesn’t exist. They publicly attributed attacks, imposed sanctions, and issued warnings about Volt Typhoon pre-positioning in critical infrastructure. Now they’re opening a channel to discuss deterrence and prevent miscalculation,” he said.

 “Whether it works depends on whether both sides actually use it. The 2015 US-China agreement produced results until it didn’t.

“But having the channel is better than not having it…. The alternative, pure confrontation without communication, creates its own risks. In cyber space, those risks are harder to see until they materialise,” said Bell.



Source link

By Computer Weekly

By Computer Weekly

Next Post
North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

Recommended.

Danny Moses of ‘The Big Short’ says the market is underestimating DOGE’s negative impact on the economy

Danny Moses of ‘The Big Short’ says the market is underestimating DOGE’s negative impact on the economy

March 20, 2025
Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

August 26, 2025

Trending.

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

July 18, 2025
Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

September 4, 2025
Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio