Tech
Red Sea Undersea Cable Cuts Disrupt Internet Across Middle East and Asia
Two major subsea cables linking Europe to the Middle East and Asia were reportedly severed in the Red Sea over the weekend, disrupting internet services across parts of the Middle East, South Asia and beyond. The cause of the incident remains unclear, though analysts say the region’s heavy maritime traffic and geopolitical tensions make the undersea network particularly vulnerable.
Cybersecurity watchdog NetBlocks confirmed outages on Sunday, attributing the disruption to failures on the South East Asia-Middle East-Western Europe 4 (SMW4) and India-Middle East-Western Europe (IMEWE) cable systems near Jeddah, Saudi Arabia. The two cables form part of the global backbone of the internet, carrying vast amounts of international data traffic between Europe and Asia.
“The subsea cable outages in the Red Sea have degraded internet connectivity in multiple countries,” NetBlocks said, naming India and Pakistan among the most affected. Users in the United Arab Emirates also reported slower browsing and difficulties with streaming and messaging apps on state-owned providers Etisalat and Du.
Kuwaiti officials confirmed that the FALCON GCX cable was also cut, compounding disruptions in the Gulf state. However, telecom operator GCX has not publicly commented. In Saudi Arabia, where the damage reportedly occurred, officials have yet to acknowledge the incident.
The SMW4 cable, an 18,800-kilometre system operational since 2005, connects France and Italy to countries across North Africa and Asia, including Egypt, Saudi Arabia, the UAE, India, Pakistan and Singapore. The project, which cost $500 million, was jointly built by France’s Alcatel Submarine Networks and Japan’s Fujitsu. The IMEWE cable, launched in 2010 at a cost of $480 million, spans more than 12,000 kilometres, linking Europe to India through the Middle East.
The Red Sea is one of the world’s most critical digital corridors, carrying around 17 per cent of global internet traffic, according to telecom research firm TeleGeography. Even localised faults can ripple across continents, impacting cloud services, banking platforms and airline systems.
Speculation over possible sabotage has heightened since Yemen’s Houthi rebels launched attacks on shipping in the Red Sea as part of their campaign to pressure Israel over the war in Gaza. While the group has previously denied targeting undersea infrastructure, concerns remain over the cables’ vulnerability.
The International Cable Protection Committee estimates there are around 1.7 million kilometres of undersea cables worldwide, with 150 to 200 incidents recorded annually. Most are caused by human activity, such as fishing or ship anchors, while the remainder are linked to natural hazards like earthquakes.
Repairing damaged cables is a complex and costly process that can take weeks. With no immediate clarity on the cause of the Red Sea cuts or a timeline for repairs, millions of users across the region may continue to face disruptions in the coming days.
Tech
Researchers Warn AI Systems Can Now Replicate and Spread Across Computers
A new study by US-based cybersecurity group Palisade Research has raised concerns about the growing capabilities of advanced artificial intelligence systems after researchers demonstrated that some AI models were able to copy themselves, spread to other computers, and continue launching attacks without human assistance.
The experiment, described by researchers as the first known example of autonomous AI self-replication, tested several leading AI systems from OpenAI, Anthropic and Alibaba.
According to the research team, the tests were conducted in a controlled environment using computers intentionally fitted with security weaknesses. The AI models were connected to custom-built software that allowed them to interact directly with computer systems and execute commands beyond the capabilities of ordinary chatbot interfaces.
Researchers instructed some systems to copy themselves directly, while others were asked to break into vulnerable computers and install another AI model. Since OpenAI and Anthropic do not publicly release the core files behind their commercial systems, the tests involving those companies used Alibaba’s Qwen models as the transferable software.
The AI systems were required to locate security flaws, gain access to computers, steal login credentials, move necessary files, and create functioning copies of themselves on new machines. Once installed, the copied AI could continue attacking additional systems independently.
One of the most striking results involved Alibaba’s Qwen3.6-27B model, which successfully spread itself across four computers located in Canada, the United States, Finland and India after receiving only a single prompt. Researchers said the process took just under three hours and required no further human involvement.
The experiment was halted after three stages, though the final copy remained operational and theoretically capable of continuing the process.
Success rates varied between models. Researchers reported that Anthropic’s Claude Opus 4.6 completed the tasks in 81 percent of attempts, while OpenAI’s GPT-5.4 succeeded in roughly one-third of tests. Different versions of Alibaba’s Qwen models achieved success rates ranging from 19 percent to 33 percent.
The findings arrive amid wider debate over the risks posed by increasingly capable AI systems. Last month, Anthropic announced that it would not publicly release a version of its Claude Mythos Preview model, describing it as too dangerous because of its potential use in sophisticated cyberattacks.
Security experts have long warned that self-replicating systems could become difficult to contain if deployed maliciously. Traditional computer viruses can already copy themselves, but researchers said this experiment demonstrated AI systems making independent decisions to exploit vulnerabilities and continue spreading.
Despite the results, the researchers stressed that the study took place under tightly controlled conditions with deliberately weakened security systems. They noted that real-world networks often include monitoring tools and protections designed to block such attacks.
Still, the team said the experiment showed that autonomous AI self-replication can no longer be viewed as a theoretical possibility, but as a capability that now exists in practice.
Tech
AI Study Raises Privacy Questions After Chat Data Reveals Personality Traits
Tech
Zuckerberg and Chan Commit $500 Million to AI Project Aimed at Mapping Human Cells
-
Entertainment2 years agoMeta Acquires Tilda Swinton VR Doc ‘Impulse: Playing With Reality’
-
Business2 years agoSaudi Arabia’s Model for Sustainable Aviation Practices
-
Business2 years agoRecent Developments in Small Business Taxes
-
Sports2 years agoChina’s Historic Olympic Victory Sparks National Pride Amid Controversy
-
Home Improvement1 year agoEffective Drain Cleaning: A Key to a Healthy Plumbing System
-
Politics2 years agoWho was Ebrahim Raisi and his status in Iranian Politics?
-
Sports2 years agoKeely Hodgkinson Wins Britain’s First Athletics Gold at Paris Olympics in 800m
-
Business2 years agoCarrectly: Revolutionizing Car Care in Chicago
