CyberSecurity Knuggets
Feb 01, 2026
Email 1:
Subject: 🚨WK 05: Microsoft Zero-Day Exploited, EU Warns Europe Is “Losing” to Hackers, FBI Seizes Ransomware Forum, Power Grid Disrupted…
Summary:
– The European Commission has proposed updates to the EU Cybersecurity Act to strengthen cyber resilience, harmonize certification, ease compliance, and enhance supply-chain security. The revision strengthens ENISA’s role and aligns with NIS2 Directive updates.
– A malware and vulnerabilities attack targeted Poland’s power grid communication devices at about 30 sites, raising concerns about critical infrastructure security.
– Microsoft released an emergency patch for an Office zero-day vulnerability actively exploited in the wild, highlighting the urgency for rapid patching.
– eScan suffered a supply-chain attack compromising antivirus updates, impacting enterprise customers.
– South Korea plans to notify citizens about suspected data leaks, not just confirmed breaches.
– Ireland’s Data Protection Commission has over €4 billion in unpaid GDPR fines.
– ShinyHunters are linked again to breaches involving Match Group.
– Manage My Health breach has led to targeted phishing campaigns.
– Apple issued security updates across iOS, macOS, and watchOS addressing multiple vulnerabilities.
– US intelligence warns of hacking and disinformation threats linked to election security.
– EU’s top cyber official warned that fragmented defenses and underinvestment are causing Europe to lose massively against hackers.
– Google disrupted a major residential proxy network used for fraud and anonymized attacks.
– Iranian APT activity expanded across sectors, including government and critical infrastructure.
– CISA is evaluating AI use and risks within its operations.
– Google agreed to pay $135M to settle an Android data privacy lawsuit.
– FBI seized infrastructure linked to the Ramp ransomware cybercrime forum.
– Spain closed its Pegasus spyware probe citing lack of cooperation from Israel.
– An analysis of Scattered Lapsus$ Hunters campaign exposed sophisticated vishing and attacker-in-the-middle phishing attacks, bypassing MFA and email defenses by impersonating IT support calls.
– An exclusive WhatsApp group has been launched for cybersecurity discussions.
Email 2:
Subject: Best infosec-related long reads for the week of 1/24/26
Summary:
– A detailed Wired exposĂ© by Andy Greenberg reveals the inside of a Southeast Asian crypto scam compound through a whistleblower “Red Bull,” including evidence gathering via Signal and the structure and culture inside the scam operation.
– Former US National Security Advisor Jake Sullivan and Tal Feldman discuss AI as a core geopolitical power, laying out a framework analyzing AI progress, ease of technology catch-up, and China’s AI strategy—crucial for US policy in AI competition.
– Jason Healey of Columbia University argues for modernizing cyber regulation by adopting AI automation, machine-readable standards, and continuous testing, moving beyond slow, checkbox compliance to foster true security agility.
– Academic researchers describe the evolution toward cybersecurity “superintelligence,” where AI transforms security expertise, dramatically speeding up attack surface enumeration and requiring new supervisory human skills while launching an algorithmic arms race.
– A comprehensive survey examines how AI’s dual-use capabilities are transforming cybersecurity threats, including deepfakes, adversarial AI, automated malware, and AI-powered social engineering, emphasizing the need for explainable, interdisciplinary AI defense systems.
– Metacurity invites readers to upgrade subscriptions and participate, including sponsorship opportunities.
– The newsletter’s mission is to deliver deep analysis and the best infosec long reads weekly.
These summaries include key insights, emerging threats, regulatory updates, geopolitical perspectives on AI, in-depth investigative journalism on cybercrime operations, and strategic thinking for future cybersecurity challenges.
Stay Well!
