Russia’s CyberWarfare on Europe: Why Cybersecurity improvements are imperative

17

September

2025

5/5 (2)

Russian hackers breached a Norwegian dam earlier this April, taking control of its operation for over 4 hours before detection. They opened a floodgate, releasing water at over 500 liters per second. (Bryant, 2025)

Even though damage was limited, this cyberattack, like many others, serves as a tool to spread fear and chaos among populations. These aggressive operations have expanded from espionage or political coercion to vital infrastructures across industries. 

Norway’s dam was not energy-producing; it was used for fish farming. This matters because Europe’s lifeline infrastructure is based on dams, hydropower stations, and energy systems. By manipulating even a small dam, Russia exposed weakness, signaling: ‘We can reach your energy systems too.’ 

Just yesterday, hackers targeted hospitals and urban water supplies in one of Poland’s largest cities. Dariusz Standerski, deputy minister for digital affairs, confirmed that the government is allocating €80mn this month to strengthen the cyber defenses of water management systems (Milne, 2025).

Beyond physical damage, Russian cyberattacks also aim at eroding trust in government. Liverpool City Council has revealed that, for the past two years, its IT infrastructure has been under relentless attack from the Russian state-funded group Noname057(16). Several other UK councils have faced similar assaults during the same period. (Waddington, 2025)

These incidents highlight a broader truth: cyberwarfare represents digital disruption in its most dangerous form (Weill & Woerner, 2015). Europe’s safety is now threatened by its digital vulnerabilities, and thus the bloc needs a swift response. AI-driven monitoring and anomaly detection offer ways to anticipate and neutralize attacks in real time (Zhao et al., 2023; Li, 2023). Moreover, as Furr & Shipilov (2019) argue, building resilience does not require disruption; it can come from incremental adaptation. Europe should add layers of protective systems over its old infrastructure without crippling operations (Birkinshaw & Lancefield, 2023). 

In practice, Europe must move past reactive spending and focus on building a reliable, AI-integrated cybersecurity strategy across vital infrastructure. The battleground is no longer just physical or near the Russian border. It is increasingly digital and affects everyday lives across the continent. 

This raises the question: Should cybersecurity be treated as a matter of national defense, or as an EU-wide responsibility shared across borders?

Sources:

  • Bryant, M. (2025, August 15). Russian hackers seized control of Norwegian dam, spy chief says. The Guardian. https://www.theguardian.com/world/2025/aug/14/russian-hackers-control-norwegian-dam-norway
  • Birkinshaw, J., & Lancefield, D. (2023). How professional services firms dodged disruption. MIT Sloan Management Review, 64(4), 34–39. 
  • Furr, N., & Shipilov, A. (2019). Digital doesn’t have to be disruptive: The best results can come from adaptation rather than reinvention. Harvard Business Review, 97(4), 94–104. 
  • Milne, R. (2025, September 12). Russian hackers target Polish hospitals and city water supply. Financial Times. https://www.ft.com/content/3e7c7a96-09e7-407f-98d7-a29310743d28 
  • Waddington, M. (2025, September 17). Liverpool City Council under “increasing” Russian hack bot attack. https://www.bbc.com/news/articles/cgj18z99dx0o
  • Weill, P., & Woerner, S. L. (2015). Thriving in an increasingly digital ecosystem. MIT Sloan Management Review, 56(4), 27–34. 
  • Zhao, W. X., Zhou, K., Li, J., Tang, T., Wang, X., Hou, Y., Min, Y., Zhang, B., Zhang, J., Dong, Z., & Du, Y. (2023). A survey of large language models. arXiv preprint arXiv:2303.18223. https://doi.org/10.48550/arXiv.2303.18223

Please rate this

Will tomorrow’s smart living room be a spy in your house?

16

October

2019

5/5 (1) Nowadays, smart home devices are becoming more and more popular among households. In the future, around 30 million U.S. households will add smart home technology to their house (Mordorintelligence, 2019). Furthermore, the growth rates of smart home markets in North America and Europe are prospected to be high. Tech giants like Google and Amazon have brought different types of smart home devices on the market, that are most often voice-controlled devices. Examples are Google Home and Amazon Echo (Alexa). These devices are driven by IoT (Internet of Things), in which the smart home device is interconnected with all kinds of other devices in your home. These days, smart home devices are connected to your TV, music system, thermostat, doorbells, and in the near future with your fridge, oven, and kettle (Luimstra, 2019). These will be all controllable with simple questions and commands given by the customer.

Obviously, the implementation of a smart home device could give the customer various advantages. At first, the customer will be given more convenience in and outside the house. Several devices in your household will be more easily being controlled, often with small voice commands. Whether you want to know the best route to your destination when leaving your house, or you want to arrive in a house that’s heated up, or you want to know what movie to watch after the serie you’re almost done with: it’s all possible with a smart home device (Marr, 2019). Secondly, since many voice-assisted home devices are connected with your energy regulator, smart home devices are an ideal way to save on your future energy expenses. According to your preferences, preprogrammed temperatures and lighting schedules can be implemented, which are also easy to modify after. Lastly, smart home devices tend to increase the safety of your house. Smart doorbells are able to livestream the person that’s at your door, which gives a customer more information about people with possible bad intentions (Luimstra, 2019).

However, the safety of smart home devices (and mainly the voice-controlled ones) has been criticised lately. All information that smart home devices need are saved in the cloud (Marr, 2019). While this is convenient, it also creates an easy point for abuse of your personal information. Voice-assistant devices are known to be easily activated by a so-called ‘wake word’, like the word ‘Alexa’ for Amazon’s voice assistant (Karch, 2019). If activated, all information is recorded and saved in the cloud, and is therefore also accessible for hackers or other wrongdoers. Furthermore, the smart home devices have voices that are increasingly sounding like a normal human voice (Weinberger, 2019). Since we emotionally attach value to voices, this could become a problem when a voice-controlled smart home device will talk to outsiders or family people. So, while the positive aspects of smart home devices are obviously present, its negative threats related to security and trust into these systems may not be neglected. Will voice-controlled smart home devices become almost 100% safe? Are we able to distinguish between voices of smart home devices and the voice of one of our relatives? These question are ripe for future discussion.

References:
Karch, M. (2019). Is Your Smart Device Spying on You? How Can You Stop It?. [online] Lifewire. Available at: https://www.lifewire.com/is-your-smart-device-spying-on-you-4141166 [Accessed 15 Oct. 2019].

Luimstra, J. (2019). De slimme IoT-huiskamer: groot goed, of potentiële spionage?. [online] Sprout. Available at: https://www.sprout.nl/artikel/technologie/de-slimme-iot-huiskamer-groot-goed-potentiele-spionage [Accessed 15 Oct. 2019].

Marr, B. (2019). The 7 Most Dangerous Technology Trends In 2020 Everyone Should Know About. [online] Forbes.com. Available at: https://www.forbes.com/sites/bernardmarr/2019/09/23/the-7-most-dangerous-technology-trends-in-2020-everyone-should-know-about/#16a928687780 [Accessed 15 Oct. 2019].

Mordorintelligence. (2019). Smart Homes Market | Growth, Trends, and Forecast (2019 – 2024). [online] Available at: https://www.mordorintelligence.com/industry-reports/global-smart-homes-market-industry [Accessed 15 Oct. 2019].

Weinberger, D. (2019). Can We Trust Machines that Sound Too Much Like Us?. [online] Harvard Business Review. Available at: https://hbr.org/2019/05/can-we-trust-machines-that-sound-too-much-like-us [Accessed 15 Oct. 2019].

Please rate this