Trump Administration Unveils New Cyber Strategy for America
(Alessandro Mascellino – Infosecurity Magazine) A new national cyber strategy aimed at strengthening US digital defenses, countering foreign adversaries and accelerating innovation has been released by the Trump Administration. The document, published on March 6, 2026, outlines a broad framework for addressing cyber threats through government coordination, private sector partnerships and technological investment. It sets out six policy pillars designed to guide federal cybersecurity policy and resource allocation.The strategy frames cyberspace as central to US economic strength, national security and technological leadership. It argues that hostile states and cyber-criminal groups increasingly exploit digital systems to undermine democratic institutions, disrupt essential services and steal intellectual property. According to the White House, the new approach prioritises proactive action rather than reactive defence. It emphasises using the full range of government capabilities, including offensive cyber operations, law enforcement measures and economic sanctions, to deter attacks and dismantle criminal networks. – https://www.infosecurity-magazine.com/news/usa-unveils-new-cyber-strategy/
UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source
(Danny Palmer – Infosecurity Magazine) A new Online Crime Centre is set to take the fight to cyber-crime as part of the UK government’s expanded anti-fraud strategy. In a joint announcement, the UK Home Office and the National Crime Agency said that the new unit is designed to crackdown on fraud and will combine expertise from government, intelligence agencies, the police, banks, mobile networks and major technology firms. Set to begin work in April, the Online Crime Centre is tasked with actively disrupting cyber-criminal operations including overseas scam compounds. – https://www.infosecurity-magazine.com/news/uk-new-crackdown-unit-cyber-fraud/
AI Security Startups Dominate New Cyber Innovation Awards
(Kevin Poireault – Infosecurity Magazine) US-based cybersecurity industry analyst firm IT-Harvest has announced the second cohort of its Cyber 150 awards – and 22% of winners are offering AI security products. Cyber 150 is IT-Harvest’s annual list of the fastest-growing mid-size cybersecurity companies worldwide. Introduced in January 2025, this prize awards emerging security vendors that are scaling rapidly and shaping the next generation of cybersecurity technology. – https://www.infosecurity-magazine.com/news/ai-security-startups-cyber/
TriZetto Provider Solutions Breach Hits 3.4 Million Patients
(Phil Muncaster – Infosecurity Magazine) Millions of patients have had personal and health insurance information compromised after a breach at IT firm TriZetto Provider Solutions (TPS). A breach notification disclosure posted by the Office of the Maine Attorney General revealed that over 3.4 million individuals were affected by the incident. Owned by US IT services firm Cognizant Technology Solutions, TPS provides claims management, billing services and other software for the healthcare sector – including hospitals, physician practices and insurers. – https://www.infosecurity-magazine.com/news/trizetto-provider-solutions-breach/
Russia-linked hackers target Signal, WhatsApp of officials globally
(Pierluigi Paganini – Security Affairs) Dutch intelligence agencies (MIVD and AIVD) warn of a global campaign by Russia-linked threat actors aiming to compromise Signal and WhatsApp accounts. The operation targets government officials, civil servants, and military personnel, highlighting growing cyber risks to sensitive communications among national security actors. “Russian state hackers are engaged in a large-scale global cyber campaign to gain access to Signal and WhatsApp accounts belonging to dignitaries, military personnel and civil servants. The Dutch intelligence and security services MIVD and AIVD can confirm that targets and victims of the campaign include Dutch government employees.” reads the alert by Dutch intelligence agencies. “The Dutch services also believe that other persons of interest to the Russian government, such as journalists, may possibly be targeted by this campaign.”. Russian cyber spies are tricking users into revealing verification codes to hijack Signal and WhatsApp accounts. They impersonate Signal Support or exploit the “linked devices” feature, gaining access to messages and chat groups, potentially exposing sensitive information from government and military targets. – https://securityaffairs.com/189156/intelligence/russia-linked-hackers-target-signal-whatsapp-of-officials-globally.html
Anthropic Claude Opus AI model discovers 22 Firefox bugs
(Pierluigi Paganini – Security Affairs) Anthropic discovered 22 security vulnerabilities in Firefox using its Claude Opus 4.6 AI model in January 2026. Mozilla addressed these issues in Firefox 148. The researchers state that AI models are now capable of finding high-severity software flaws independently. They identified 22 Firefox vulnerabilities in two weeks, 14 of which were high-severity, nearly a fifth of all high-severity Firefox issues fixed in 2025, demonstrating AI’s ability to rapidly detect critical security risks in complex software. – https://securityaffairs.com/189131/ai/anthropic-claude-opus-ai-model-discovers-22-firefox-bugs.html
ClickFix Attack Uses Windows Terminal to Evade Detection
(Ionut Arghire – SecurityWeek) A new variant of the ClickFix attack evades detection by instructing victims to use Windows Terminal instead of the Run dialog, Microsoft warns. Like traditional ClickFix attacks, the campaign relies on fake CAPTCHA pages, troubleshooting prompts, and verification lures to trick victims into executing malicious PowerShell commands. What sets the new campaign apart, however, is the fact that victims are instructed to open Windows Terminal directly, instead of relying on the Windows Run dialog. – https://www.securityweek.com/clickfix-attack-uses-windows-terminal-to-evade-detection/
Internet Infrastructure TLD .arpa Abused in Phishing Attacks
(Ionut Arghire – SecurityWeek) A threat actor has been abusing the internet infrastructure top-level domain (TLD) .arpa to host phishing content on domains that should not resolve to IP addresses, Infoblox reports. The .arpa TLD is designed to map IP addresses to domains, providing reverse DNS records, and should not host web content, as other TLDs do. As part of the newly uncovered campaign, however, a threat actor has been abusing DNS record management controls of certain providers to add IP address records for .arpa domains and serve phishing content to victims. – https://www.securityweek.com/internet-infrastructure-tld-arpa-abused-in-phishing-attacks/



