close

Protecting our ‘cloud’

By Editorial Board
May 14, 2026
A representational image showing a padlock with cyber security and binary code written in the background in this illustration on February 1, 2022. — Reuters
A representational image showing a padlock with cyber security and binary code written in the background in this illustration on February 1, 2022. — Reuters

To say we live in a digitally connected world is no understatement. Over the past decade, technological advancements have reshaped almost every sector. This world of bytes and cloud has its own challenges. Almost a year ago, a shocking news report rattled governments. The database of 184 million records, including government agency data from across the world, was lying unmanned on the web, inches away from a cyberattack. While it was quickly taken down, it exposed how vulnerable governments are. Now, Pakistan’s National Cyber Emergency Response Team (CERT) has warned that the threat of enemy cyberattacks on government websites and digital platforms has increased, and has recommended shifting all government websites to ‘read-only’ mode. It has also directed authorities to immediately limit website modification requests, disable forms and logins and tighten database security as part of urgent protective measures. In an advisory, CERT says the read-only mode will help prevent unauthorised attacks, propaganda and ensure the security of digital infrastructure.

This has been followed by Google’s parent company, Alphabet, disclosing that hackers from a prominent cybercrime group used artificial intelligence to uncover a previously unknown software flaw and an exploit to take advantage of it for the first time. The report also detailed how hackers are beginning to hand parts of their cyber operations to artificial intelligence (AI), using it to autonomously hunt for software flaws and help build malware. These developments are serious, especially in Pakistan’s context. In 2025, we went to war with India and our ties have soured since then. That war showed that while well-equipped infantry is important, future wars will be fought over cloud (both the tangible and the intangible). Any vulnerability in our software can lead to a disaster. During the May 2025 war, a couple of government X accounts were hacked and used to spread misinformation. While one was restored, one had to be deactivated.

Before that, ever since October 2023, Israel has been using software like Lavendar and Where’s Daddy? to locate targets in Gaza. Some messaging apps have also been accused of sharing data with Israel. In February 2026, we saw how the US and Israel relied on critical live data from Iran to attack the Supreme Leader. Shortly after that, Pakistan’s popular news channel was hacked and incendiary messages were broadcast. This should move us to build impenetrable systems. And for that, it is important for Pakistan to have an indigenous digital infrastructure – as much as possible. Pakistan has a habit of depending on external partners for much of its infrastructure. The talented pool currently working for overseas companies should be engaged to build indigenous models that can operate independently. And if such systems cannot be manufactured for commercial use, the authorities should focus on building separate systems for government institutions with strict authentication requirements. As the global order changes, it is time to focus more on our defence strategies. And defending our digital environment is as crucial as defending our boundaries.