logo
Malaysia and China forge groundbreaking AI, cloud tech partnerships

Malaysia and China forge groundbreaking AI, cloud tech partnerships

Yahoo10-04-2025
Several Malaysian and Chinese technology companies and educational institutions will join forces in artificial intelligence (AI), cloud computing, and next-generation digital infrastructure.
Six memoranda of understanding (MoUs) were exchanged earlier today, marking a significant chapter in digital collaboration involving major tech players and academic hubs from both nations.
The event also underscores the commitment of both nations to advancing digital technologies while fostering stronger ties in the digital economy.
Present to witness the exchange of MoUs at Pullman Kuala Lumpur City Centre were Digital Minister Gobind Singh Deo and His Excellency Lan Tianli, the Governor of China's Guangxi Zhuang Autonomous Region.
'These MoUs will deploy advanced AI and cloud solutions to transform e-commerce platforms, logistics networks, government services and the digital infrastructure in Malaysia,' said Gobind.
'The exchange of knowledge and resources in digital technology and innovation is crucial for Malaysia's growth. It will significantly benefit our nation's digital agenda by enhancing our capabilities, fostering innovation and driving economic progress.'
The six MoUs cover various AI initiatives and include the creation of a sovereign AI cloud infrastructure.
This collaboration between Huawei Technologies (Malaysia) Co., Ltd and Skyvast Cloud Sdn Bhd will use Huawei's Ascend Graphic Processing Units, Kunpeng servers, cloud platforms, and networking solutions.
Skyvast will lead the business development, application use case insights and go-to-market strategies within Malaysia and Asean markets.
In creating smart logistics, Huawei Malaysia and Tiong Nam Logistics Solutions Sdn Bhd will integrate AI and cloud technologies into warehousing and supply chain operations.
Tiong Nam will oversee the design, construction and operations of logistics technology solutions, supported by Huawei Malaysia's cloud infrastructure and AI computing capabilities.
The other MoU will see TOGL Technology Sdn Bhd and Huawei Malaysia developing an AI-powered e-commerce and loyalty platform, combining TOGL's industry demand insights with Huawei's AI platform and advanced technological solutions.
Huawei Malaysia also inked a three-way MoU with HeiTech Padu Bhd and MY E.G. Services to explore AI-driven digital services for government functions, such as immigration and transportation.
The remaining two MoUs will see the construction of a China-Asean Spatiotemporal Intelligence Joint Information Technology Laboratory (between Guilin University of Electronic Technology and Universiti Malaysia Pahang Al-Sultan Abdullah); and an International Cooperation Joint Laboratory of AI (between Guangxi Minzu University and Tunku Abdul Rahman University).
Earlier, Lan and his delegation paid a courtesy call on Gobind and other ministry officials. Their discussions included cooperation and more partnerships in AI, big data, and developing AI talents.
'We are confident that this visit will pave the way for deeper friendship and fruitful cooperation between Malaysia and Guangxi. Let us work hand-in-hand to shape a future where AI serves the people, strengthens our economies, and uplifts the region as a whole,' said Gobind.
Such partnerships are in line with the Madani Government's agenda to accelerate AI adoption across all sectors en route to transforming Malaysia into a digital nation and a leading tech hub in Southeast Asia.
Sam Majid, Head of the National AI Office (NAIO), said AI is a cornerstone of Malaysia's digital transformation strategy.
'Through NAIO, we are cultivating a robust and responsible AI ecosystem. This collaboration supports that ambition by fostering innovation, research excellence, and cross-border knowledge transfer in critical areas like AI in healthcare, data governance, and smart education,' he said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Amazon closes Shanghai AI research lab in latest cost-cutting move
Amazon closes Shanghai AI research lab in latest cost-cutting move

CNBC

time7 minutes ago

  • CNBC

Amazon closes Shanghai AI research lab in latest cost-cutting move

Amazon is shuttering its research lab in Shanghai focused on artificial intelligence development, the latest belt-tightening move by the e-commerce and cloud computing giant. Wang Minjie, an applied scientist at the lab, wrote in a WeChat post earlier this week that Amazon disbanded the team due to "strategic adjustments amid U.S.-China tensions." Amazon spokesperson Brad Glasser said in a statement that the company "made the difficult business decision to eliminate some roles across particular teams" in its Amazon Web Services unit. The Financial Times was first to report on the lab closure. Amazon announced layoffs at AWS last week, with U.S. teams focused on marketing and training and certification among those that were impacted. Geopolitical tensions between the world's two largest economies have pushed a growing number of American corporations to reduce or discontinue their operations in China. President Donald Trump's aggressive tariff policies have accelerated that shift, while the Chinese government has called for self-sufficiency in AI and technology development. The U.S. has also placed restrictions on China, limiting its ability to buy chips and chip-making equipment, including from companies like Nvidia and Advanced Micro Devices, that can be used to train AI models. Some of those restrictions have since eased. AWS established the Shanghai lab in 2018 with a focus on areas like natural language processing and machine learning. The company has retreated from China over the past several years. In 2022, Amazon discontinued its Kindle e-book store in the region, after shuttering its e-commerce marketplace in China in 2019.

Fully Chinese-made drone found in Ukraine for first time
Fully Chinese-made drone found in Ukraine for first time

Yahoo

time13 minutes ago

  • Yahoo

Fully Chinese-made drone found in Ukraine for first time

A new Russian decoy drone used to spoof Ukrainian air defences is made up entirely of Chinese parts, it has been revealed. The discovery, by Ukrainian intelligence, marks the first time that Russia has deployed weapons made only with Chinese components. It shows the latest sign of cooperation between Beijing and Moscow, despite Xi Jinping insisting that China does not supply lethal aid to either side of the war in Ukraine. While Chinese technology has been found in other Russian weapons, it had always been combined with components from other countries. Ukrainian intelligence said it was able to recover two of the new unmanned aerial vehicles (UAVs) and take them apart. The UAV CBTS.611000 drone is primarily used for reconnaissance and as a decoy, but it can also carry a warhead weighing up to 15kg. Nearly half the components of one of the drones were manufactured by CUAV Technology, a company based in Guangdong province that advertises itself as an 'open source drone solution supplier.' These parts included a flight controller with autopilot, navigation modules and antennas, airspeed sensor and a pitot tube. In 2022, the company announced that it would implement restrictions on the export of its products to Russia and Ukraine to prevent military use. However, the recently discovered drones are not the first time that products from CUAV Technology have been found in Russia. In 2023, Moscow used a vertical take-off UAV, which it alleged was its own design, that included a CUAV Technology product available on AliExpress, a popular online Chinese retailer. In addition to CUAV Technology, Ukrainian intelligence also said the Chinese drones contained an engine and electronic ignition module from Mile Haoxiang Technology, a first person view camera from Foxeer Technology and a Chinese-made copy of the Australian RFD900X data transmission module from RFDesign, which can transmit data up to 40km (25 miles). 'This system enables the creation of a data transmission channel from the UAV to its ground station or between UAVs, thereby enhancing its reconnaissance capabilities,' said Ukraine's intelligence service. The agency had previously estimated that 80 per cent of the electronics used in Russian drones originated in China, which was backed up by the US state department. China has repeatedly denied that it is supplying any lethal weapons 'to any party in the conflict' and claimed that it 'strictly controls dual-use items'. In a post on its Telegram, Ukraine's intelligence agency said the drones have a delta-wing fuselage, which is similar to the Shahed-136 drones, but is smaller in size. Shahed drones, known in Russia as Geran-2, are a type of exploding kamikaze UAV, which Moscow has used extensively in its war against Ukraine. Earlier this month, images of a damaged Geran-2 revealed that parts of the drone had also been manufactured by a machining company in Suzhou province in China. Broaden your horizons with award-winning British journalism. Try The Telegraph free for 1 month with unlimited access to our award-winning website, exclusive app, money-saving offers and more. Solve the daily Crossword

Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency
Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency

New York Post

time36 minutes ago

  • New York Post

Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency

Microsoft has warned that Chinese state-sponsored hackers have breached its SharePoint software used by the US agency responsible for maintaining and modernizing the nation's stockpile of nuclear weapons, according to a report. The National Nuclear Security Administration, a semi-autonomous agency that operates under the auspices of the Department of Energy, was among the targets of a hack allegedly carried out by Chinese-backed cybercriminals, according to Bloomberg News. A Dutch cybersecurity company estimates that around 400 government agencies in the US, Mauritius, Jordan, South Africa and the Netherlands were impacted by the hack, according to Bloomberg News. Advertisement 4 A US government agency responsible for maintaining the nation's stockpile of nuclear weapons was reportedly targeted in a hack by Chinese-backed cybercriminals. U.S. DepartmentofDefense The Dutch firm, Eye Security, previously estimated that just 60 entities were impacted. A source familiar with the situation told the financial news site on Tuesday that no sensitive or classified information was known to have been stolen in the hack, which was made possible by exploiting a flaw in Microsoft's SharePoint document management software. 'On Friday, July 18th, the exploitation of a Microsoft SharePoint zero-day vulnerability began affecting the Department of Energy,' an agency spokesman told Bloomberg News. Advertisement 'The department was minimally impacted due to its widespread use of the Microsoft M365 cloud and very capable cybersecurity systems. A very small number of systems were impacted. All impacted systems are being restored.' The breaches have been ongoing since at least July 7, according to Adam Meyers, senior vice president at CrowdStrike, the cybersecurity firm that has partnered with Microsoft to ward off potential cyber threats. 'The early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that 'looks like China',' Meyers told Bloomberg News. CrowdStrike's investigation into the campaign remains ongoing. Advertisement 4 In a blog post, Microsoft identified two reputed cybercriminal organizations, Linen Typhoon and Violet Typhoon, in the alleged scheme. Bloomberg via Getty Images The Post has sought comment from the NNSA, Microsoft, CrowdStrike and Eye Security. In a blog post, the tech giant identified two reputed cybercriminal organizations, Linen Typhoon and Violet Typhoon, in the alleged scheme to exploit flaws in Microsoft's software that is used by customers on their own networks rather than in the more secure cloud. These customers are at risk of having their data compromised by the hackers, according to Microsoft, which also fingered a third Chinese-based organization, Storm-2603, as doing the same. Advertisement Every morning, the NY POSTcast offers a deep dive into the headlines with the Post's signature mix of politics, business, pop culture, true crime and everything in between. Subscribe here! Microsoft SharePoint is a platform used to store, organize, share and manage internal web content across an organization — similar to intranets. The NNSA wasn't the only agency that was targeted in the alleged cyberattack. Among the victims are the US Department of Education, Florida's Department of Revenue and the Rhode Island General Assembly, which is the Ocean State's legislative body. Internationally, governments in Europe and the Middle East have also been targeted. Cybersecurity researchers have detected breaches on more than 100 servers, representing at least 60 victims across various sectors, including energy, consulting and academia. 4 The National Nuclear Security Administration is a semi-autonomous agency that operates under the auspices of the Department of Energy. Jarretera – Microsoft has patched the vulnerabilities in recent days, but the company expressed concern that hackers will continue to exploit these flaws in future attacks. 'We have high confidence that threat actors will continue to integrate them into their attacks,' Microsoft stated in its blog post. Advertisement 'China opposes and fights hacking activities in accordance with the law. At the same time, we oppose smears and attacks against China under the excuse of cybersecurity issues,' a spokesperson for the Chinese embassy said in a statement. Cybersecurity experts have expressed grave concerns about the severity of the threat. Michael Sikorski, chief technology officer and head of threat intelligence for Unit 42 at Palo Alto Networks Inc., described the situation as a 'high-severity, high-urgency threat.' Advertisement He emphasized the risks posed by SharePoint's deep integration with Microsoft's ecosystem, which includes services like Office, Teams, OneDrive and Outlook — all of which contain valuable data for attackers. 4 This archive picture shows the first B61-13 HiFi nuclear bomb unit completed at Sandia National Labs in Albuquerque earlier this year. Craig Fritz/Sandia National Labs / SWNS Eye Security reported that the flaws allow hackers to access SharePoint servers and steal authentication keys, enabling them to impersonate users or services even after patches are applied. 'We estimate that the real number might be much higher as there can be many more hidden ways to compromise servers that do not leave traces,' Eye Security's co-owner Vaisha Bernard said in an email to Bloomberg News. Advertisement 'This is still developing, and other opportunistic adversaries continue to exploit vulnerable servers.' Despite Microsoft's efforts to bolster its security measures, including hiring executives from government agencies and holding weekly security meetings, the recent breaches have drawn renewed scrutiny. The US government issued a report last year that was critical of Microsoft's lax security culture.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store