
Image by Racool_studio, from Freepik
U.S. Proposes New AI Chip Export Framework Amid Controversy
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Justyn Newman Former Lead Cybersecurity Editor
The Biden administration has unveiled a new framework aimed at regulating the export of advanced computer chips critical for artificial intelligence development.
In a Rush? Here are the Quick Facts!
- Biden administration proposed new rules to regulate AI chip exports for security reasons.
- 20 U.S. allies granted unrestricted chip access; others face strict limitations.
- Industry leaders fear the rules may harm U.S. competitiveness and innovation.
Announced Monday, the proposal seeks to balance national security concerns with economic interests . However, it has sparked backlash from industry leaders and international allies.
“In the wrong hands, powerful AI systems have the potential to exacerbate significant national security risks, including by enabling the development of weapons of mass destruction, supporting powerful offensive cyber operations, and aiding human rights abuses, such as mass surveillance,” the US Commerce Department said on Monday, as reported by the BBC .
Commerce Secretary Gina Raimondo emphasized the importance of preserving U.S. leadership in AI innovation. “As AI becomes more powerful, the risks to our national security become even more intense,” she said, as reported by Aljazeera .
The plan intends to safeguard AI technologies while enabling access for trusted allies. However, its global implications have raised alarm among chipmakers and foreign officials.The Semiconductor Industry Association criticized the proposal, warning it could harm U.S. competitiveness.
“The new rule risks causing unintended and lasting damage to America’s economy and global competitiveness in semiconductors and AI by ceding strategic markets to our competitors,” said SIA President John Neuffer, as reported by Aljazeera.
Nvidia, a leading chipmaker, saw its shares drop by 4% following the news, as previously noted by The Register . The company echoed concerns, stating that the restrictions could weaken innovation without improving security, as reported by the BBC.
The framework includes a 120-day comment period, allowing the incoming Trump administration to potentially reshape the policy, says Aljazeera. Jonathan Kewley, a tech legal expert, predicted: “It is absolutely sure that the Trump administration will wind back a lot of what Biden has put out there,” as reported by the BBC.
Aljazeera reports that the framework grants unrestricted chip access to 20 key allies, including Japan, the UK, and several EU nations, but imposes caps on other countries. Nations such as Mexico, Portugal, and Switzerland could face limits on the chips used for data centers and AI products.
Top European Union officials criticized the restrictions, as it reads on a statement published by European Commission’s tech and security czar Henna Virkkunen and trade chief Maroš Šefčovič-
Aljazeera says that countries subject to restrictions can apply for legal exemptions or government-to-government deals to increase their chip import limits. Despite these provisions, the policy’s potential to disrupt global supply chains remains a concern by those who see these limitations, as reported today by The Register .
Critics argue that the plan could alienate allies and inadvertently benefit competitors like China. Daniel Castro of the Information Technology and Innovation Foundation warned that pressuring nations to choose between the U.S. and China could strengthen China’s position in the AI ecosystem, as reported by the BBC.
Whether the framework will bolster U.S. security or hinder its technological edge will depend on how it navigates the complex intersection of policy, industry, and global diplomacy.

Image by Luca Bravo, from Unsplash
Researchers Warn Of Stealthy Malware Stealing Payment Information From WordPress Sites
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Justyn Newman Former Lead Cybersecurity Editor
Cybersecurity researchers at Sucuri are alerting website owners about a new type of cyberattack targeting WordPress e-commerce sites.
In a Rush? Here are the Quick Facts!
- Malware injects malicious JavaScript into WordPress database to steal payment details during checkout.
- It activates on checkout pages and captures data like credit card numbers and CVV codes.
- Stolen data is encrypted and sent to remote servers controlled by attackers.
This attack, known as a credit card skimmer campaign, is designed to secretly steal payment information from customers. The malware operates in the background, injecting malicious code into a WordPress website’s database and compromising checkout pages where customers enter their payment details.
The malware is particularly sneaky because it doesn’t rely on infecting theme files or plugins, which are typically scanned for malicious code. Instead, it hides inside the database, making it harder to detect.
Specifically, the malicious code is embedded in the “wp_options” table, a critical part of the WordPress setup, as noted by Sucuri. This allows it to avoid detection by common security tools and remain on infected sites undisturbed.
Once the malware is activated, it targets the checkout page, where users enter their credit card numbers, expiration dates, and CVV codes. The malicious code looks for the word “checkout” in the web address to ensure it only runs on the payment page, preventing it from being triggered on other parts of the site.
It either adds a fake payment form or hijacks the existing one, making it appear as if users are entering their details on a legitimate payment processor’s form, such as Stripe.
As customers input their credit card information, the malware captures it in real time. To make the stolen data harder to detect, the malware scrambles the information using encoding and encryption techniques, then sends it to remote servers controlled by the attacker.
This process is done quietly, so customers won’t notice anything unusual while completing their purchases.The stolen data is then sold on underground markets or used for fraudulent transactions, putting both customers and businesses at risk.
What makes this attack particularly dangerous is that it operates without disrupting the checkout process, so users are unaware their data is being stolen.
The researchers say that website owners can protect themselves by regularly checking for suspicious code in the WordPress admin panel, specifically under the “Widgets” section. They should look for unfamiliar JavaScript code that could indicate the presence of malware.