UK government's Vulnerability Monitoring System is working - fixes flow far faster

The UK government's Vulnerability Monitoring System has significantly accelerated the patching of DNS vulnerabilities in the public sector. This automated scanning system, implemented as part of a program launched last year, has reduced fix times by 84 percent. The article also briefly mentions Firefox enhancing XSS protection, leadership changes at CISA, and FTC exemptions for certain data collection.

Samsung TVs to stop collecting Texans’ data without express consent

Samsung has agreed to a settlement with the State of Texas following allegations of unlawfully collecting content-viewing data from smart TVs without explicit consent. This agreement requires Samsung to obtain express consent before collecting such data and to provide clear privacy notices to Texans.

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

The U.S. Department of Defense has designated AI company Anthropic as a "supply chain risk" due to disagreements over the lawful use of its AI model, Claude. The dispute centers on Anthropic's refusal to allow its AI for mass domestic surveillance of Americans and fully autonomous weapons.

Europol-led crackdown on The Com hackers leads to 30 arrests

A Europol-coordinated operation, "Project Compass", targeting the online cybercrime collective known as "The Com" has resulted in 30 arrests and implicated 179 suspects. The Com specifically targets children and teenagers with cybercrime activities.

The Case for Why Better Breach Transparency Matters

The article discusses the lack of transparency in data breach disclosures by organizations. It argues that disclosing the bare minimum, or not disclosing at all, has become a common practice.

One of the ‘most influential cybersecurity’ roles will pay under $175,000

A job posting by the UK's GCHQ for a Chief Information Security Officer, described as a highly influential role, offers a maximum salary of £130,000 (approximately $175,000). This salary is considered low compared to industry standards for similar positions, especially considering the responsibilities involved in securing a nation from cyber threats.

Why Tehran’s Two-Tiered Internet Is So Dangerous

The article discusses Iran's internet shutdown in January 2026, which was more severe than previous shutdowns. Unlike prior incidents, even the National Information Network (NIN), Iran's domestic intranet, was affected, impacting banking and administrative sectors.

US authorities punish sellers of malware and spyware

US authorities sentenced Peter Williams to 87 months in prison for selling sensitive cyber-exploit components to a Russian company. Simultaneously, the Department of the Treasury sanctioned Sergey Sergeyevich Zelenyuk and Matrix LLC (Operation Zero) for acquiring and distributing cyber tools harmful to US national security, including exploits for US products.

Victory! Tenth Circuit Finds Fourth Amendment Doesn’t Support Broad Search of Protesters’ Devices and Digital Data

The U.S. Court of Appeals for the Tenth Circuit overturned a lower court’s dismissal of a challenge to sweeping warrants that allowed police to search a protester’s devices and digital data, as well as a nonprofit’s social media data. The court found the warrants to be overbroad and lacking in particularity, violating the Fourth Amendment.

Marquis v. SonicWall Lawsuit Ups the Breach Blame Game

A FinTech company is suing SonicWall after suffering a breach, raising questions about the responsibility of third-party security vendors when their products fail to prevent attacks. The lawsuit highlights the complex issue of liability in cybersecurity incidents involving multiple parties.

EPIC, OTI Urge FTC Not to Ignore Full Scope of Data-Driven Harms

EPIC and the Open Technology Institute (OTI) have urged the Federal Trade Commission (FTC) to consider a broader range of harms stemming from unlawful data practices. The organizations emphasize the need for the FTC to expand its understanding of privacy injuries, encompassing both quantitative and qualitative aspects, to effectively protect consumers.

Apple iPhone and iPad Cleared for Classified NATO Use

Apple's iPhones and iPads have been cleared for classified use by NATO. These devices have been added to the NATO Information Assurance Product Catalogue (NIAPC), indicating they meet the security requirements for handling classified information within the alliance.

Four Risks Boards Cannot Treat as Background Noise

This SecurityWeek article discusses four cybersecurity risks that boards of directors should prioritize and not ignore. The emphasis is on business continuity and resilience in the face of inevitable successful attacks, rather than focusing solely on prevention.

Expert Recommends: Prepare for PQC Right Now

An expert recommends preparing for Post-Quantum Cryptography (PQC) now due to the increasing threat of adversaries stealing encrypted data today to decrypt it in the future when quantum computers become more powerful. The rise of ransomware and cloud computing are also contributing factors to the need for PQC.

New York sues Valve for promoting illegal gambling via game loot boxes

New York Attorney General Letitia James is suing Valve Corporation, alleging the company facilitates illegal gambling among minors through game loot boxes. The lawsuit claims Valve knowingly profits from the sale of these loot boxes, which resemble gambling by offering randomized in-game items.

US Sanctions Russian Exploit Broker Operation Zero

The United States has sanctioned Russian exploit broker Operation Zero. The broker acquired zero-day exploits from a US defense contractor executive who was jailed for his actions.

How to Justify Your Security Investments [DE]

The article discusses how CISOs can justify security investments to boards of directors. It emphasizes the importance of framing security spending in terms of revenue generation, risk mitigation, and shareholder value, rather than simply as technical upgrades. The article also advises CISOs to link technology investments to strategic priorities, such as entering new markets, improving margins, increasing resilience, and ensuring compliance.

Srsly Risky Biz: Is Claude Too Woke For War?

This edition of Risky Business News discusses the potential risks and security implications of using AI models like Claude in sensitive environments, particularly in the context of war and conflict. It explores whether the model's design and biases could lead to unintended consequences or vulnerabilities.

☺️ Trust Us With Your Face | EFFector 38.4

EFF's EFFector newsletter discusses the dangers of online age verification laws and the fight for privacy and free speech online. This issue covers Discord's mandatory age verification, a leaked Meta memo on face-scanning smart glasses, and a Super Bowl surveillance ad.

Ex-L3Harris exec jailed 7 years for selling exploits to Russia

A former general manager of L3Harris's cyber division, Trenchant, has been sentenced to seven years in prison for selling cyber tools and exploits reserved for the US to Russia. The individual profited millions from these illegal sales.

Ex-US Defense Contractor Executive Jailed for Selling Exploits to Russia

Peter Williams, a former executive at a U.S. defense contractor, has been sentenced to 87 months in prison for selling cyber exploits to a Russian broker. The case highlights the serious consequences for individuals who compromise national security by providing sensitive information to foreign adversaries.

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA added two new vulnerabilities, CVE-2022-20775 and CVE-2026-20127, to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. These vulnerabilities affect Cisco Catalyst SD-WAN and pose significant risks, especially to the federal enterprise. CISA urges all organizations to prioritize remediation of KEV Catalog vulnerabilities.

Manual Processes Are Putting National Security at Risk

A report indicates that over half of national security organizations still use manual processes for sensitive data transfers. This reliance on manual processes is flagged as inefficient and a systemic risk to security.

US sanctions Russian broker for buying stolen zero-day exploits

The U.S. Treasury Department has sanctioned a Russian exploit broker, Aleksandr Gennadievich Ermakov, for procuring stolen hacking tools. Ermakov purchased these tools, including zero-day exploits, from a former executive of a U.S. defense contractor, contributing to potential cybersecurity risks.

Operation Red Card 2.0 Leads to 651 Arrests in Africa

Operation Red Card 2.0 resulted in the arrest of 651 individuals involved in cybercrime across Africa. The operation, a collaboration between African law enforcement, Interpol, and cybersecurity companies, recovered over USD 4.3 million.

Boards don’t need cyber metrics — they need risk signals

The article discusses the disconnect between the cybersecurity metrics that security teams track and the risk signals that boards of directors need to effectively govern risk. It argues that boards are less interested in technical metrics like "mean time to detect" and more interested in metrics that directly map to financial consequences, regulatory exposure, and operational disruption. Experts suggest focusing on metrics like detection and containment speed, which function as proxies for business loss avoided.

How AI is Changing Your GRC Strategy [DE]

The article discusses how companies need to revise their GRC (Governance, Risk & Compliance) processes to account for the increasing use and risks of generative and agentic AI. It highlights the challenges CISOs face in balancing innovation with securing AI deployments and the need to integrate AI risk management into GRC frameworks.

Tech Companies Shouldn’t Be Bullied Into Doing Surveillance

The Department of Defense is pressuring AI company Anthropic to lift restrictions on how their technology is used, particularly regarding autonomous weapons systems and surveillance. Anthropic is resisting, citing their principles against using their AI for surveillance against US persons and autonomous weapons systems, leading to potential repercussions such as being labeled a "supply chain risk."

EPIC Joins Groups Urging FTC to Crack Down on Hidden Surveillance Pricing

EPIC and other consumer protection groups are urging the FTC to create a rule requiring companies to disclose when they use "surveillance pricing." This practice involves companies collecting and analyzing consumer data to personalize pricing, often without the consumer's knowledge or consent.

UK fines Reddit $19 million for using children’s data unlawfully

The UK Information Commissioner's Office (ICO) has fined Reddit £14.47 million (over $19.5 million) for violating data protection laws. Reddit is accused of collecting and using the personal information of children under 13 without proper safeguards, a breach of the UK's data protection regulations.

Is AI Good for Democracy?

The article discusses the use of AI in various domains, particularly its potential impact on democracy. It highlights concerns about AI-generated content flooding academic journals and influencing public opinion, suggesting an ongoing arms race where AI is the weapon of choice.

CISA Adds One Known Exploited Vulnerability to Catalog

CISA added CVE-2026-25108, a Soliton Systems K.K. FileZen OS Command Injection Vulnerability, to its Known Exploited Vulnerabilities (KEV) Catalog. This vulnerability is actively exploited and poses a significant risk, especially to the federal enterprise. CISA urges all organizations to prioritize remediation of KEV Catalog vulnerabilities.

Celebrating Two Years of CSF 2.0!

The NIST Cybersecurity Framework (CSF) 2.0 is celebrating its second anniversary. Published in 2024, CSF 2.0 included an updated framework with an added Govern Function, emphasizes supply chain risk management, and new categories/subcategories addressing current threat and technology shifts.

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

The article discusses the flawed approach of prioritizing identity management tasks based on volume or control checks, arguing that modern enterprises require a risk-based approach considering control posture, hygiene, business context, and intent. It suggests that traditional IT ticketing methods are inadequate for managing identity risks in increasingly complex environments.

Anonymous Fénix Members Arrested in Spain

Spanish authorities have arrested additional members of the Anonymous Fénix group. The group's administrator and moderator were previously arrested last year, followed by the arrest of two more members this month.

Billions in Bitcoin from Pirated Content Portal Targeted by Justice System [DE]

A trial has begun in Leipzig regarding the illegal streaming service 'movie2k.to' and billions of euros in Bitcoin profits. The main defendant is accused of commercial money laundering for illegally distributing copyrighted material and generating revenue through advertising, which was then used to acquire Bitcoins. The court will also decide on the fate of approximately 2.64 billion euros derived from the defendant's Bitcoin assets.

Euro allies aiming to rapidly build low-cost air defense weapons

Several European nations, including Britain, are collaborating to develop low-cost air defense systems, including autonomous drones and missiles, with a target delivery date as early as 2027. The initiative focuses on affordable surface-to-air weaponry for defense purposes.

It’s time to rethink CISO reporting lines

The article discusses the reporting structure of CISOs, highlighting that a majority still report to IT, specifically the CIO or CTO. Experts argue that this structure can create a conflict of interest, as the CIO is incentivized to cut costs, while the CISO is responsible for identifying risks that require spending, and suggests that CISOs should ideally report to the CEO or general counsel.

Preparing for Russia’s New Generation Warfare in Europe

The article discusses Russia's escalating hybrid warfare tactics against NATO, characterized by a blend of cyberattacks, sabotage, and influence operations. It emphasizes the need for organizations to understand and prepare for this "New Generation Warfare."

More Than Dashboards: AI Decisions Must Be Provable

The article emphasizes the importance of transparency and provability in AI decision-making processes. It argues that AI systems should maintain a clear record of their actions and reasoning to enhance accountability and trust.