<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Canadian Cyber in Context]]></title><description><![CDATA[News, research and analysis focusing on Canadian federal cyber defence policy and procurement.]]></description><link>https://www.cyberincontext.ca</link><image><url>https://substackcdn.com/image/fetch/$s_!xNeN!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png</url><title>Canadian Cyber in Context</title><link>https://www.cyberincontext.ca</link></image><generator>Substack</generator><lastBuildDate>Thu, 30 Apr 2026 02:28:25 GMT</lastBuildDate><atom:link href="https://www.cyberincontext.ca/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Canadian Cyber in Context]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[canadiancyber@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[canadiancyber@substack.com]]></itunes:email><itunes:name><![CDATA[Alexander Rudolph]]></itunes:name></itunes:owner><itunes:author><![CDATA[Alexander Rudolph]]></itunes:author><googleplay:owner><![CDATA[canadiancyber@substack.com]]></googleplay:owner><googleplay:email><![CDATA[canadiancyber@substack.com]]></googleplay:email><googleplay:author><![CDATA[Alexander Rudolph]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Canadian Cyber News Rewire - 25/04/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending April 25]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426</guid><pubDate>Mon, 27 Apr 2026 14:04:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fb2a1855-f30b-4f41-aadf-7ca91686dc18_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426/comments"><span>Leave a comment</span></a></p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>. </p></li></ul></li><li><p>Microsoft invited me and other academics, privacy experts, and various business/tech/thought leaders to try to convince us they&#8217;re good at protecting Canadian digital sovereignty. I trust them less now. New paper on this soon.</p></li></ul><div><hr></div><h6 style="text-align: center;"><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://archive.ph/hAKDC#selection-3827.26-3827.132">A network of YouTube accounts is promoting U.S. annexation to Albertans, researchers say. It has 40M views</a></strong></p><ul><li><p><strong><a href="https://www.cbc.ca/news/canada/alberta-separatist-youtube-channels-netherlands-9.7174719">Dutch YouTube creators behind Alberta separatist videos getting millions of views</a></strong></p><ul><li><p>Some additional research and coverage by CBC</p></li></ul></li></ul></li><li><p><strong><a href="https://betakit.com/canadas-new-us-economic-advisory-committee-draws-backlash-from-tech-leaders/">Canada&#8217;s new US economic advisory committee draws backlash from tech leaders</a></strong></p><ul><li><p>This is not surprising. When you have Evan Solomon as your Minister for AI and Emerging Tech, it means you have a cabinet who is illinformed on emerging technology. You need those with knowledge about IP, emerging technology, data, and more. This cabinet has shown that it is illequipped to understand emerging technology and are relying heavily on the bureaucracy, which can only do so much without political leadership.</p></li></ul></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/20/news/kevin-oleary-pins-water-licence-70-billion-data-centre-project-small-alberta">Kevin O&#8217;Leary pins water licence for $70-billion data centre project on a small Alberta municipality</a></strong></p><ul><li><p>Canadian con-man continues to grift Alberta and Canada. Also, water is wet. The municipality declared an agricultural emergency in 2025, so there is a risk they will be unable to secure water rights.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/">Surveillance vendors caught abusing access to telcos to track people&#8217;s phone locations, researchers say</a></strong></p><ul><li><p>This is coverage of <a href="https://citizenlab.ca/research/uncovering-global-telecom-exploitation-by-covert-surveillance-actors/">University of Toronto&#8217;s Citizen Lab report</a>. Telcos have been abused for a long time and Canadian telcos are not immune to this.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/programs/defence-ideas/element/competitive-projects/challenges/multi-modal-ai-for-advanced-situational-decisions.html">New IDEaS Challenges: </a></strong></p><ul><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/programs/defence-ideas/element/competitive-projects/challenges/multi-modal-ai-for-advanced-situational-decisions.html">Multi-modal AI for advanced situational decisions</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/programs/defence-ideas/element/innovation-networks/challenge/cognition-and-trust-real-time-dynamic-calibration-for-human-autonomy-teams.html">Cognition and trust: Real-time dynamic calibration for human-autonomy teams</a></strong></p></li><li><p>For those unfamiliar, Innovation for Defence Excellence and Security (IDEaS)</p></li><li><p>Rather than force you into initial lower level funding as a gate to higher level funding, IDEaS is now allowing you to apply to greater levels of funding based on the TRL of the solution..</p></li></ul></li><li><p><strong><a href="https://betakit.com/cohere-to-acquire-germanys-aleph-alpha-in-sovereign-ai-play/">Cohere to acquire Germany&#8217;s Aleph Alpha in sovereign AI play</a></strong></p><ul><li><p>Major news in Canada, and likely Germany. Cohere has been a Canadian AI darling, building organization-specific tools and LLMs, of which I have generally heard positive things. And at the very least I haven&#8217;t heard anything negative. </p></li><li><p>This is being described as a merger, but Cohere is coming out with a bigger edge here and sources tell Betakit that Cohere is buying Alph Alpha, so it is not a merger at all. They are likely playing up the merger angle to keep EU and German regulators and shareholders happy. While there are obvious mercantalist concerns about the Canadian-ness or German-ness of the company as nationalism and sovereignty in commerce continue to rise, this could be a significant boon for Canada and the EU to counter the dominance of US-based AI companies. </p></li></ul></li><li><p><strong><a href="https://betakit.com/bdcs-new-500-million-loan-program-will-help-smaller-businesses-adopt-ai/">BDC&#8217;s new $500-million loan program will help smaller businesses adopt AI</a></strong></p><ul><li><p>&#8220;$500-million LIFT initiative (which stands for &#8220;Lead with Innovation and Focus on Technology&#8221;) connects SMEs with consultants who will help them figure out where AI can best be integrated into their businesses, then provides a loan to get it done.&#8221;</p></li><li><p>Sounds like a big cash grab for consultants.</p></li></ul></li><li><p><strong><a href="https://www.ctvnews.ca/canada/article/cybersecurity-incident-at-canada-life-reportedly-impacts-thousands/">Cybersecurity incident at Canada Life reportedly impacts thousands</a></strong></p><ul><li><p>As I highlighted last week, a cybersecurity incident at Canada Life is now making Canadian news.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/competition-bureau/news/2026/04/data-portability-and-interoperability-are-key-to-competition-in-the-digital-health-care-sector.html">Data portability and interoperability are key to competition in the digital health care sector</a></strong></p><ul><li><p>These are remarks by Brad Callaghan, Associate Deputy Commissioner of the Policy, Planning and Advocacy Directorate before the Senate Standing Committee on Social Affairs, Science and Technology</p></li></ul></li><li><p><strong><a href="https://www.newswire.ca/news-releases/the-canadian-centre-for-cyber-defence-launched-to-strengthen-canada-s-digital-security-posture-882122318.html">369 Global Launches The Canadian Centre for Cyber Defence to Strengthen Canada&#8217;s Digital Security Posture</a></strong></p><ul><li><p>A non-profit launched by a consulting group to function as a &#8220;cybersecurity innovation hub.&#8221; The website is full of buzzword bingo, but I remain optimistic about what they intend to accomplish if they are genuine. I&#8217;m also not a fan of them specifically taking a name so similar to the government&#8217;s Canadian Centre for Cyber Security.</p></li></ul></li><li><p><strong><a href="https://globalnews.ca/news/11813885/toronto-police-arrest-cyber-attack/">Toronto police make arrests in text-message cyberattack, 13M disruptions reported</a></strong></p><ul><li><p>I&#8217;m actually a bit surprised this is the first time. SMS blasting is a pretty low-level, easy thing to do, but it&#8217;s also pretty easy to get caught in most cases.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/news/2026/04/canadian-armed-forces-to-conduct-inaugural-active-participation-in-exercise-balikatan.html">Canadian Armed Forces to conduct inaugural active participation in Exercise BALIKATAN</a></strong></p><ul><li><p>United States- and Philippines-led exercise in which CAF Cyber Command will participate.</p></li></ul></li><li><p><strong><a href="https://halifax.citynews.ca/2026/04/24/bring-military-spy-agencies-under-federal-whistleblower-law-federal-review-report/">Bring military, spy agencies under federal whistleblower law, review report urges</a></strong></p><ul><li><p>There are certain reporting gaps, especially related to CAFCYBERCOM.</p></li></ul></li><li><p><strong><a href="https://www.justice.gc.ca/eng/csj-sjc/pl/charter-charte/c22_2.html">Bill C-22: An Act respecting lawful access - Charter Statement</a></strong></p><ul><li><p>Government releases charter statement regarding Bill C-22. They&#8217;re glossing over a lot of issues with this and many privacy experts are not happy.</p></li></ul></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/24/news/avi-lewis-ndp-surveillance-pricing">Avi Lewis is smart to shed light on surveillance pricing</a></strong></p><ul><li><p>This is an opinion article, but as I have not included anything on the surveillance pricing discussions so far, I felt this was a good introduction. </p></li></ul></li><li><p><strong><a href="https://archive.ph/1lYUC#selection-2565.0-2565.93">OpenAI&#8217;s Altman &#8216;deeply sorry&#8217; company didn&#8217;t flag Tumbler Ridge shooter&#8217;s messages to police</a></strong></p><ul><li><p>Wrote in a letter, which feels very disingenuine. </p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/saskatchewan/bell-ai-data-centre-sask-analysis-9.7173697">Checking out the political optics of Bell&#8217;s AI data centre near Regina</a></strong></p><ul><li><p>The project has a lot of political support, but the community support appears unclear.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/manitoba/manitoba-social-media-age-restrictions-9.7177470">Manitoba to ban social media, AI chatbots for youth, premier says</a></strong></p><ul><li><p>All actors involved are trying to pass the buck on actually managing such bans that inadequate systems are put in place and the average person will lose their privacy.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/04/government-of-canada-invests-238-million-to-help-youth-build-the-skills-necessary-for-the-evolving-digital-economy.html">Government of Canada invests $23.8 million to help youth build the skills necessary for the evolving digital economy</a></strong></p><ul><li><p>A few similar programs have ended in the last few years, so it is good there is new funding.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/prairies-economic-development/news/2026/04/government-of-canada-investing-in-winnipeg-industry-to-strengthen-canadas-defence-capacity.html">Government of Canada investing in Winnipeg industry to strengthen Canada&#8217;s defence capacity</a></strong></p><ul><li><p>Part of this funding goes to StandardAero, which is &#8220;[integrating] advanced digital technologies.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/prairies-economic-development/news/2026/04/government-of-canada-strengthening-our-economy-and-military-readiness-through-new-defence-investments-in-saskatchewan.html">Government of Canada strengthening our economy and military readiness through new defence investments in Saskatchewan</a></strong></p><ul><li><p>Includes funding for Saskatchewan Polytechnic&#8217;s Digital Integration Centre of Excellence.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/fednor/news/2026/04/government-of-canada-invests-976650-to-help-more-northern-ontario-business-diversify-and-expand-into-the-defence-sector.html">Government of Canada invests $976,650 to help more Northern Ontario business diversify and expand into the defence sector</a></strong></p><ul><li><p>Looks like at least some of this is going towards cybersecurity.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/northern-economic-development/news/2026/04/backgrounder-cannor-invests-in-projects-to-strengthen-nunavuts-economy-infrastructure-and-arctic-security.html">Backgrounder: CanNor invests in projects to strengthen Nunavut&#8217;s economy, infrastructure and Arctic security</a></strong></p><ul><li><p>Some of the funding is going to support the <a href="https://www.cbc.ca/news/canada/manitoba/kivalliq-hydro-fibre-link-nunavut-9.6931778">Kivalliq Hydro-Fibre Link</a>.</p></li></ul></li><li><p><strong><a href="https://www.securityweek.com/locked-shields-2026-41-nations-strengthen-cyber-resilience-in-worlds-biggest-exercise/">Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World&#8217;s Biggest Exercise</a></strong></p><ul><li><p>Canada participated in NATO cyber exercise Locked Shields.</p></li></ul></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, this section is for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section, which is 100% focused on Canada</h6><ul><li><p><strong><a href="https://therecord.media/cloud-platform-vercel-says-company-breached-through-ai-tool">Cloud platform Vercel says company breached through third-party AI tool</a></strong></p><ul><li><p>An employee&#8217;s use of compromised context.ai that allowed the threat actor to access Vercel via the employee&#8217;s google workspace account. This appears to be significant enough to warrant inclusion in this section.</p></li></ul></li><li><p><strong><a href="https://www.theverge.com/policy/915237/palantir-manifesto">We translated the Palantir manifesto for actual human beings</a></strong></p><ul><li><p>A good breakdown of Palantir&#8217;s fascist manifesto. Palantir operates in Canada, and Canadians should be careful.</p></li></ul></li><li><p><strong><a href="https://www.thatprivacyguy.com/blog/anthropic-spyware/">Anthropic secretly installs spyware when you install Claude Desktop</a></strong></p></li><li><p><strong><a href="https://washingtonmonthly.com/2026/04/20/how-amazons-ai-algorithms-raise-the-prices-you-pay/">How Amazon&#8217;s AI Algorithms Raise the Prices You Pay</a></strong> </p></li><li><p><strong><a href="https://femtechdesigndesk.substack.com/p/your-period-tracking-app-has-been">Your period tracking app has been yapping about your flow to Meta</a></strong></p><ul><li><p>The sharing of women&#8217;s health data via apps like this has been going on for years now, so this is an evolution of it to show how major corporations are involved in accessing and hoarding your data.</p></li></ul></li><li><p><strong><a href="https://archive.ph/CzQMS#selection-1035.0-1035.98">Exclusive: SpaceX says unproven AI space data centers may not be commercially viable, filing shows</a></strong></p><ul><li><p>Anyone with a cursory understanding could tell you this. Stop listening to these people who are just perpetually scamming everyone.</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/new-gas-powered-data-centers-could-emit-more-greenhouse-gases-than-entire-nations/">New Gas-Powered Data Centers Could Emit More Greenhouse Gases Than Entire Nations</a></strong></p><ul><li><p>All the work that went into power efficiencies in data centres is going out the window.</p></li></ul></li><li><p><strong><a href="https://archive.ph/sa3CG#selection-703.0-703.52">Meta Is Sued Over Scam Ads on Facebook and Instagram</a></strong></p><ul><li><p>Canadians should pay attention to this. It is unclear if Canadians have also been targeted for this from the article itself, but Canadians are often also exposed to the same scams as Americans and could potentially make Meta liable in Canada.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al25-012-vulnerabilities-impacting-cisco-asa-ftd-devices-cve-2025-20333-cve-2025-20362-cve-2025-20363">Alert - AL25-012 - Vulnerabilities impacting Cisco ASA and FTD devices &#8211; CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363 &#8211; Update 1</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://www.greynoise.io/blog/the-internet-changes-before-the-advisory-drops">The Internet Changes Before the Advisory Drops</a> (h/t Catalin Cimpanu)</strong></p><ul><li><p>Mass-interenet scanning activity now often precedes vulnerability disclosures. This is not a big surprise, but some great data to confirm these indicators.</p></li></ul></li><li><p><strong><a href="https://www.microsoft.com/en-us/security/blog/2026/04/21/detection-strategies-cloud-identities-against-infiltrating-it-workers/">Detection strategies across cloud and identities against infiltrating IT workers</a></strong></p><ul><li><p>These days we instantly think North Korea, but </p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><ul><li><p><strong><a href="https://www.wired.com/story/fast16-malware-stuxnet-precursor-iran-nuclear-attack/">Newly Deciphered Sabotage Malware May Have Targeted Iran&#8217;s Nuclear Program&#8212;and Predates Stuxnet</a></strong></p><ul><li><p>For cyber conflict historians and analysts this is major news. Gives some additional insight into early/mid-2000s doctrinal and behavioural dynamics of US cyber operations.</p></li><li><p><strong><a href="https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/">Full write up here by SentinelLabs</a></strong></p></li></ul></li><li><p><strong>Op-ed: <a href="https://www.newstatesman.com/comment/2026/04/we-cant-trust-palantir-with-our-nhs-data">We can&#8217;t trust Palantir with our NHS data</a></strong></p><ul><li><p>Palantir just said it doesn&#8217;t want democracy, so can they be trusted in a democracy?</p></li></ul></li><li><p><strong><a href="https://citizenlab.ca/research/uncovering-global-telecom-exploitation-by-covert-surveillance-actors/">Citizen Lab Research: Bad Connection: Uncovering Global Telecom Exploitation by Covert Surveillance Actors</a></strong></p></li><li><p><strong><a href="https://www.chipsnorth.com/">Event, May 4-5 Ottawa: Chips North Executive Summit</a></strong></p><ul><li><p>&#8220;Designed as a working summit, CHIPS NORTH is built for alignment on priorities, candid examination of trade-offs, and informed decision-making on the issues shaping the semiconductor sector. The 2026 program brings together strategic plenary sessions and focused, action-oriented discussions to move conversations toward real-world outcomes beyond the event itself.&#8221;</p></li></ul></li><li><p>Video: <strong><a href="https://cybersecurecatalyst.ca/defence-procurement-101-webinar/?submissionGuid=41124f2a-a911-45c7-a41c-48cbeb405911">Canadian Defence Procurement 101</a></strong></p><ul><li><p>Roger Cybersecure Catalyst held a Defence Procurement 101 session with Caleb Walker from 123 Cyber and Randy Purse, one of the Catalyst&#8217;s senior traners. This has a focus on helping SMEs, particularly cyber or cyber-adjacent, to participate in defence procurement.</p></li></ul></li><li><p><strong><a href="https://warontherocks.com/seeing-the-cyber-in-economic-statecraft/">Seeing the Cyber in Economic Statecraft</a></strong></p><ul><li><p>By Jason Blessing, who does great research and whose PhD research influenced mine. A state&#8217;s ability to engage in cyber statecraft and cyber defence requires an industry which can support it.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://www.nextgov.com/cybersecurity/2026/04/former-fbi-official-proposes-terror-designations-ransomware-hackers-targeting-hospitals/413002/">Former FBI official proposes terror designations for ransomware hackers targeting hospitals</a></strong></p></li><li><p><strong><a href="https://www.axios.com/2026/04/21/cisa-anthropic-mythos-ai-security">Scoop: CISA lacks access to Anthropic&#8217;s Mythos</a></strong></p></li><li><p><strong><a href="https://www.nextgov.com/cybersecurity/2026/04/cyber-command-carried-out-over-8000-missions-2025-director-says/413035/?">Cyber Command carried out over 8,000 missions in 2025, director says</a></strong></p><ul><li><p>This is a 25% increase. </p></li></ul></li><li><p><strong><a href="https://cyberscoop.com/cisa-director-pick-sean-plankey-withdraws-his-nomination/">CISA director pick Sean Plankey withdraws his nomination</a></strong></p><ul><li><p>Of all the nominations to oppose and stall, this is the one? CISA is an absolute and complete mess and has lost most of its talent and is barely functional from what I hear.</p></li></ul></li><li><p><strong><a href="https://arstechnica.com/space/2026/04/us-space-command-russia-is-now-operationalizing-co-orbital-asat-weapons/">US Space Command: Russia is now operationalizing co-orbital ASAT weapons</a></strong></p></li><li><p><strong><a href="https://knightcolumbia.org/content/knight-institute-says-state-department-memo-confirms-unbounded-scope-of-trump-immigration-policy">US State Department Cancels Visas and Green Cards of Researchers who study Social Media Platforms and Tech Regulators</a></strong></p></li><li><p><strong><a href="https://www.justice.gov/opa/pr/florida-man-working-ransomware-negotiator-pleads-guilty-conspiracy-deploy-ransomware-and">Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victims</a></strong></p><ul><li><p>There are increasing amount of negotiators being linked to criminals. Or at least more are being identified.</p></li></ul></li><li><p><strong><a href="https://futurism.com/artificial-intelligence/national-today-ai-plagiarizing">A Prominent PR Firm Is Running a Fake News Site That&#8217;s Plagiarizing Original Journalism at Incredible Scale</a></strong></p><ul><li><p>This has been occurring for a couple years now, but the fact that major corporations and PR firms are actively trying to degrade our information environment should be a major cause for concern and lawsuits.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/20/anthropic-takes-5b-from-amazon-and-pledges-100b-in-cloud-spending-in-return/">Anthropic takes $5B from Amazon and pledges $100B in cloud spending in return</a></strong></p><ul><li><p>Tech ouroboros.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/24/google-to-invest-up-to-40b-in-anthropic-in-cash-and-compute/">Google to invest up to $40B in Anthropic in cash and compute</a></strong></p><ul><li><p>Tech ouroboros.</p></li></ul></li><li><p><strong><a href="https://www.reuters.com/sustainability/boards-policy-regulation/meta-start-capturing-employee-mouse-movements-keystrokes-ai-training-data-2026-04-21/">Exclusive: Meta to start capturing employee mouse movements, keystrokes for AI training data</a></strong></p><ul><li><p>Meta continues to show how depraved it is.</p></li></ul></li><li><p><strong><a href="https://therecord.media/pentagon-grapples-with-securing-ai-as-it-moves-towards-autonomous-warfare">Pentagon grapples with securing AI as it moves toward autonomous warfare</a></strong></p><ul><li><p>Drones and AI are one massive attack vector if not handled correctly.</p></li></ul></li><li><p><strong><a href="https://mashable.com/article/fcc-wifi-router-ban-hotspot-expanded">FCC expands WiFi router ban. What it means for you.</a></strong></p><ul><li><p>US shakedown of router makers continues.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://www.politico.eu/article/u-k-intelligence-100-nations-have-spyware-that-can-hack-britain/">UK intelligence: 100 nations have spyware that can hack Britain</a></strong></p><ul><li><p>This is the first source to comment on the scale of the issue that could likely be accurate. Researchers have known for a while this is a growing problem, but the scale has not been fully known.</p></li></ul></li><li><p><strong><a href="https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/investigation-into-the-provider-of-telegram-and-its-compliance-with-duties-to-protect-users-from-illegal-content-under-the-online-safety-act-2023">Investigation into the provider of Telegram and its compliance with duties to protect users from illegal content under the Online Safety Act 2023</a></strong></p><ul><li><p>Investigation into Telegram for allegedly hosting CSAM materials.</p></li></ul></li><li><p><strong><a href="https://www.scmp.com/news/china/diplomacy/article/3350763/china-threatens-eu-firms-over-cybersecurity-plans-targeting-chinese-companies">China threatens EU firms over cybersecurity plans targeting Chinese companies</a></strong></p><ul><li><p>Country who legally requires all zero-days to be reported to the government have issues with countries not trusting their cybersecurity firms. China would be taken more seriously if it just acknowledged why people don&#8217;t trust them or its companies.</p></li></ul></li><li><p><strong><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_833">Commission awards &#8364;180 million tender for sovereign cloud to four European providers</a></strong></p><ul><li><p>Canada is watching what Europe does very closely. I would say the EU&#8217;s cloud capacity is better than Canada&#8217;s, but there is significant potential in Canada. </p></li></ul></li><li><p><strong><a href="https://therecord.media/UK-cyberattacks-ncsc-china">UK cyber agency handling four major incidents a week as nation-state attacks surge</a></strong></p><ul><li><p>This is pretty signficant.</p></li></ul></li><li><p><strong><a href="https://www.ncsc.gov.uk/news/world-first-ncsc-engineered-device-secures-vulnerable-display-links">World-first NCSC-engineered device secures vulnerable display links</a></strong></p><ul><li><p>Cool new plug-and-play device that sits between a monitor and computer and protects from malicious connections. </p></li></ul></li><li><p><strong><a href="https://therecord.media/china-cyber-capabilities-match-us-dutch-intel-says">China&#8217;s cyber capabilities now equal to the US, warns Dutch intelligence</a></strong></p><ul><li><p>After completing my dissertation chapter on China last year I would argue that China&#8217;s capabilities likely surpass the United States. It all matters on how you measure cyber capabilities, and Dutch intelligence&#8217;s assessment is a cautious one.</p></li></ul></li><li><p><strong><a href="https://united24media.com/latest-news/ukraines-cyber-division-infiltrates-russian-military-satellite-comms-gonets-in-multi-year-breach-18099">Ukraine&#8217;s Cyber Division Infiltrates Russian Military Satellite Comms &#8220;Gonets&#8221; in Multi-Year Breach</a></strong></p></li><li><p><strong><a href="https://www.politico.eu/article/hackers-attack-phone-of-german-parliament-president-julia-klockner/">President of German parliament hit by Signal hack, report says</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/04/22/france-confirms-data-breach-at-government-agency-that-manages-citizens-ids/">France confirms data breach at government agency that manages citizens&#8217; IDs</a></strong></p><ul><li><p>&#8220;data stolen in the breach could include full names, dates and places of birth, mailing and email addresses, and phone numbers on an undisclosed number of citizens.&#8221;</p></li></ul></li><li><p><strong><a href="https://therecord.media/italian-regulator-fines-postal-service-orgs-15-million-privacy">Italian regulator fines national postal service orgs $15 million for data privacy violations</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/04/24/another-spyware-maker-caught-distributing-fake-android-snooping-apps/">Another spyware maker caught distributing fake Android snooping apps</a></strong></p><ul><li><p>This time an Italian spyware maker.</p></li></ul></li><li><p><strong>(Google Translated) <a href="https://www.lemonde.fr/pixels/article/2026/04/23/un-hackeur-mis-en-examen-et-ecroue-apres-plusieurs-cyberattaques-visant-notamment-des-federations-sportives_6682831_4408996.html">A hacker, nicknamed &#8220;HexDex,&#8221; has been charged and imprisoned after several cyberattacks targeting, among others, sports federations.</a></strong></p><ul><li><p>Individual responsible for a string of cyber attacks in 2025 was arrested.</p></li></ul></li><li><p><strong><a href="https://www.theregister.com/2026/04/22/high_court_gives_thumbs_up">Scotland Yard can keep using live facial recognition on people in London, say judges</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://www.newswire.lk/2026/04/22/sri-lanka-finance-ministry-confirms-cyber-hackers-stole-funds/">Sri Lanka Finance Ministry confirms cyber hackers stole funds</a> (H/t Catalin Cimpanu)</strong></p><ul><li><p>Threat actors stole $2.5 USD that was diverted during a foreign debt repayment.</p></li></ul></li><li><p><strong><a href="https://therecord.media/hackers-venezuela-wiper-malware-oil">Hackers deployed wiper malware in destructive attacks on Venezuela&#8217;s energy sector</a></strong></p><ul><li><p>Criminal groups generally don&#8217;t use wiper malware. This is usually the action of a state/APT.</p></li></ul></li><li><p>(Iranian Source) <strong><a href="https://www.entekhab.ir/fa/news/917640/%D9%81%D8%A7%D8%B1%D8%B3-%D8%B7%DB%8C-%D8%A7%D8%AA%D9%81%D8%A7%D9%82%DB%8C-%D8%B9%D8%AC%DB%8C%D8%A8-%D9%88-%D9%87%D8%B4%D8%AF%D8%A7%D8%B1-%D8%AF%D9%87%D9%86%D8%AF%D9%87-%D8%AC%D8%B9%D8%A8%D9%87%E2%80%8C%D9%87%D8%A7%DB%8C-%D8%B3%DB%8C%D8%A7%D9%87-%D8%A2%D9%85%D8%B1%DB%8C%DA%A9%D8%A7%DB%8C%DB%8C-%D8%AF%D8%B1-%D8%B3%D8%A7%D8%B9%D8%AA-%D8%B5%D9%81%D8%B1-%D8%AD%D9%85%D9%84%D9%87-%D8%A8%D9%87-%D8%A7%D8%B5%D9%81%D9%87%D8%A7%D9%86-%D8%A7%D8%B2-%DA%A9%D8%A7%D8%B1-%D8%A7%D9%81%D8%AA%D8%A7%D8%AF%D9%86%D8%AF-%D8%A7%DB%8C%D9%86-%D8%A7%D8%AE%D8%AA%D9%84%D8%A7%D9%84-%D8%AF%D8%B1-%D8%B4%D8%B1%D8%A7%DB%8C%D8%B7%DB%8C-%D8%B1%D8%AE-%D8%AF%D8%A7%D8%AF-%DA%A9%D9%87-%DA%AF%DB%8C%D8%AA%E2%80%8C%D9%88%DB%8C%E2%80%8C%D9%87%D8%A7%DB%8C-%D8%A8%DB%8C%D9%86%E2%80%8C%D8%A7%D9%84%D9%85%D9%84%D9%84-%D8%B9%D9%85%D9%84%D8%A7%D9%8B-%D9%85%D8%B3%D8%AF%D9%88%D8%AF-%D8%A8%D9%88%D8%AF%D9%86%D8%AF-%D8%A8%D9%86%D8%A7%D8%A8%D8%B1%D8%A7%DB%8C%D9%86-%D9%81%D8%B1%D9%88%D9%BE%D8%A7%D8%B4%DB%8C-%D9%85%D8%B0%DA%A9%D9%88%D8%B1-%D9%86%D8%B4%D8%A7%D9%86-%D8%A7%D8%B2-%DB%8C%DA%A9-%D8%AE%D8%B1%D8%A7%D8%A8%DA%A9%D8%A7%D8%B1%DB%8C-%D8%B9%D9%85%DB%8C%D9%82-%D8%AF%D8%A7%D8%B1%D8%AF-%D8%B3%D9%86%D8%A7%D8%B1%DB%8C%D9%88%DB%8C-%D8%AE%D8%B7%D8%B1%D9%86%D8%A7%DA%A9-%D8%AF%D8%B3%D8%AA%DA%A9%D8%A7%D8%B1%DB%8C-%D8%AF%D8%B1-%D9%85%D8%A8%D8%AF%D8%A3-%D8%AA%D9%88%D9%84%DB%8C%D8%AF-%D8%A7%D8%B3%D8%AA-%D8%A7%DA%AF%D8%B1-%D9%81%D8%A7%DB%8C%D9%84%E2%80%8C%D9%87%D8%A7%DB%8C-%D9%86%D8%B5%D8%A8%DB%8C-%D9%82%D8%A8%D9%84-%D8%A7%D8%B2-%D9%88%D8%B1%D9%88%D8%AF-%D8%A8%D9%87-%D8%A7%DB%8C%D8%B1%D8%A7%D9%86-%D8%A2%D9%84%D9%88%D8%AF%D9%87-%D8%B4%D8%AF%D9%87-%D8%A8%D8%A7%D8%B4%D9%86%D8%AF-%D8%AD%D8%AA%DB%8C-%D8%AA%D8%B9%D9%88%DB%8C%D8%B6-%D8%B3%DB%8C%D8%B3%D8%AA%D9%85-%D8%B9%D8%A7%D9%85%D9%84-%D9%87%D9%85-%D9%85%D8%B4%DA%A9%D9%84-%D8%B1%D8%A7-%D8%AD%D9%84-%D9%86%D9%85%DB%8C%E2%80%8C%DA%A9%D9%86%D8%AF">Networking equipment mysteriously malfunctioned at Iranian nuclear site before US/Israeli Strikes</a></strong> (H/t Risky Business)</p><ul><li><p>Not a big surprise if true. Iran is one of the most targeted countries for cyber operations by Israel and the United States.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Media of the Week</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Spqj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Spqj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 424w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 848w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 1272w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Spqj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp" width="677" height="865" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:865,&quot;width&quot;:677,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Spqj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 424w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 848w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 1272w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Program for Cyber Security Certification (CPCSC): Evaluation Findings Explained]]></title><description><![CDATA[What can the evaluation tell us about the initial roll out of the CPCSC?]]></description><link>https://www.cyberincontext.ca/p/canadian-program-for-cyber-security-bb9</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-program-for-cyber-security-bb9</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Tue, 21 Apr 2026 10:01:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5a6ab90d-ed50-4b03-a8a9-d62f6dd83ecd_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><strong>Canadian Cyber in Context is sponsored by</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.123cyber.ca/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png" width="442" height="170.30357142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:561,&quot;width&quot;:1456,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:26108,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.123cyber.ca/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">123 Cyber Inc.</figcaption></figure></div><h6><strong>All views expressed belong to Canadian Cyber in Context and do not reflect the position of any sponsor.</strong></h6><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><p>In 2025, Public Services and Procurement Canada (PSPC) conducted an evaluation of the Canadian Program for Cyber Security Certification (CPCSC). Luckily for us, the <a href="https://www.canada.ca/en/public-services-procurement/corporate/transparency/evaluation-report/2025-2026/evaluation-cyber-security-certification.html">full report and management action plan</a> were released to the public early this year.</p><p>The evaluation covered the period from April 2023 to June 2025, which includes the soft launch in early 2025. This means this only covers the initial preparation and phase 1 of implementation for CPCSC, and roughly a year of CPCSC activity is not covered by this report. Despite this gap, we get some interesting insights into program&#8217;s organization and the delays that occurred during this time. In particular, the report confirms much of what has been unspoken about CPCSC and the program's direction since January 2025.</p><p>Although this evaluation focuses on a period approximately a year ago, note that it was conducted specifically to improve the program, and a management action plan was developed in response. As a result, we can use the report and the management action plan to understand the CPCSC's current operations and direction.</p><p>With that said, the CPCSC Secretariat officially released CPCSC level 1, including the <a href="https://cyberpostureassessments.ops.cyber.gc.ca/Interview/9792cec1-383e-405a-abe5-4cbd3bb4de29">level 1 self-assessment tool</a> and <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada/meet-level1-certification-requirements/scoping-guide.html">scoping guide</a>. As much as this evaluation can inform us about the program itself and how it is developing, the program itself is continuing and making progress. Despite this major progress and milestones, the program still needs ongoing industry and stakeholder feedback on its activities, as this evaluation found. </p><p><a href="https://www.linkedin.com/in/altechguy/">Andrew Laliberte</a> and I are underway with reviewing the new materials and hope to have a lot more out soon about CPCSC level 1, so make sure you are subscribed. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-program-for-cyber-security-bb9?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-program-for-cyber-security-bb9?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>What is the Evaluation?</h3><p>PSPC&#8217;s Departmental Evaluation Plan for 2024-2025 to 2026-2030 included a mandatory evaluation of CPCSC, which was conducted by the Evaluation Services Directorate between April and June 2025. The evaluation focused on <em>&#8220;assessing stakeholder engagement and its contribution to CPSCC implementation, the extent to which risk management practices have been employed, as well as the prioritization of activities and available resources.&#8221;</em><strong> </strong>To assess these variables, the evaluators reviewed documents, conducted interviews and surveys.</p><p>As noted, the evaluation was conducted to improve the program, in particular, to ensure that the CPCSC program, as it is being rolled out, is in line with the priorities of the Government of Canada, to assess PSPC&#8217;s support of the program, and the inclusion/role of other departments in the implementation of the CPCSC.</p><p>In response to the report, PSPC developed a Management Action Plan, which will be reviewed at the end of this article.</p><div><hr></div><h3>Key Findings</h3><p>The key findings of the evaluation are divided into three categories: relevance, effectiveness, and delivery.</p><h4>Issue 1: Relevance</h4><p>Relevance generally asks,&#8221; Why do we even need the CPCSC?&#8221; The answer is simple: Canada needs a mechanism to ensure the security of sensitive government data in non-government systems. CPCSC has been developed to fill this gap. </p><p>Although reciprocity with the United States&#8217; Cybersecurity Maturity Model Certification (CMMC) was one of the primary motivations for creating the CPCSC, the CPCSC remains relevant and necessary regardless of alignment with other programs. Nevertheless, as will be discussed more later, the lack of reciprocation with CMMC had a major impact on the program.</p><p>One key question that was asked, and continues to be asked, is why CPCSC was not integrated into PSPC&#8217;s existing programs, such as Contract Security Program (CSP) and Controlled Goods Program (CGP). The report explains that CPCSC, CSP, and CGP all require specific compliance and assurances that, while complementary, address different areas that are governed by different policies and authorities. In particular, CSP is managed under the <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=16578">Policy on Government Security </a>and CGP is governed by the <a href="https://laws-lois.justice.gc.ca/eng/acts/d-1/">Defence Production Act</a> and <a href="https://laws-lois.justice.gc.ca/eng/regulations/SOR-2001-32/">Controlled Goods Regulations</a>. CPCSC is managed under the <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=16578">Policy on Government Security</a> and is defined by the&nbsp;<a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">ITSP 10.171</a>&nbsp;and ITSP 10.172 standards (10.172 not yet released).</p><h4>Issue 2: Effectiveness</h4><p>As CPCSC is still an in development program, effectiveness predominantly deals with the program&#8217;s ability to deliver the program based on its own timeline and goals. Unfortunately, the report obfuscates the actual effectiveness of the program delivery by putting it into the context of the entire program versus the completion status of deliverables during the period examined. As a result </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BnJO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BnJO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 424w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 848w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 1272w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BnJO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png" width="1157" height="142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:142,&quot;width&quot;:1157,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:31362,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/192012565?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BnJO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 424w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 848w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 1272w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The report explicitly states that the CPCSC implementation was slower than anticipated due to &#8220;factors such as the need to redevelop it with a Canada-only focus in early 2025.&#8221; In other words, Canada did not anticipate the United States' refusal to agree to reciprocity and thus had to switch to a Canada-only approach. What I find curious is that the phrasing makes it sound like there was a completely different plan and design for the program, and that they had to make modifications to launch it in March 2025 rather than January 2025. This begs the question as to what was so different to require changes, or was this a reassessment of the overall plan about CPCSC. Despite this lack of reciprocation, CPCSC is still based on CMMC and the ITSP 10.171 standard that is used in CPCSC is based on CMMC&#8217;s NIST 800-171. Further, the recently released self-assessement tool is based heavily on United States tools and wording. So there appears to be very little change.</p><p>Although the report states the delays are a result of a lack of reciprocity, a more kind interpretation would likely be that, after the initial delay, the delays have had a domino effect. These delays have been compounded by additional, more recent delays in CPCSC implementation that were not covered in the evaluation. All of this is understandable, and perhaps their timeline was optimistic in the first place, but what has increasingly frustrated industry and stakeholders is the CPCSC secretariat's lack of communication, which quietly updates its website with new dates and timelines.</p><p>While the program ultimately continues to roll out with occasional delays, the lack of communication about these delays and the resulting frustration are not captured by this report. However, as will be shown, we at least have an answer for this lack of communication.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h4>Issue 3: Delivery</h4><p>Issue 3 predominantly deals with the governance and overall organization of CPCSC program and its secretariat to implement the program. In other words, less to do with the work of implementing the CPCSC and more to do with the work of the government implementing the CPCSC program. Overall, the CPCSC secretariat reported satisfaction with PSPC's support, but there was a need to clarify roles and responsibilities in administering the CPCSC. </p><p>Despite this, the report greatly overstates the organization and governance of the CPCSC and makes it sound like they have more resources and support than they have. The report states that the CPCSC is supported by clearly defined governance that includes The ADM Cyber Security Commtitee, Director General committees, and the Tiger Team. The Tiger Team Working Group is the group actually responsible for developing and implementing the CPCSC. So while the ADM Cyber Security Committee and Director Generals do technically have oversight and manages the Tiger Team, this is like saying Cabinet oversaw the creation of the Defence Industrial Strategy. While technically correct, the actual writing and work is done by a smaller team that reports up.</p><p>The precise composition of the The Tiger Team Working Group, also known as the CPCSC Secretariat, is unclear, but it is primarily composed of and led by members of PSPC&#8217;s Defence and Marine Procurement Branch and the Departmental Oversight Branch as the designers, implementers, and technical authority for the CPCSC. They are then supported by an inter-departmental group from DND, Treasury Board Secretariat, Communications Security Establishment/Canadian Centre for Cyber Security.  The Standards Council of Canada is mentioned among partners, but as a Crown corporation, it is likely more of a partner than an active participant on the Tiger Team. This small, multi-departmental team is what has allowed them to stand up the program without running into mandate issues and ensure everyone is involved without being enormously slow.</p><p>One of the biggest complaints I have heard related to CPCSC thus far is about understanding its role in broader government cybersecurity compliance, such as the role of Canadian cloud profiles and CPCSC/ITSP 10.171. The reason that there has yet to be any adequate reconcilitation is stated plainly in the report:</p><p>&#8220;Several interviewees recognized the CSE-CCCS as the primary source of cybersecurity technical expertise for CPCSC and noted their limited involvement to date, citing a lack of funding and capacity as a barrier.&#8221;</p><p>CPCSC essentially rely upon CSE/CCCS for technical expertise related to the standard, but their capacity to deal with anything other than the standard are significantly limited or non-existent. As much as the Tiger Team organization has allowed them significant leeway to develop the CPCSC, there are limitations as it relates to the implementation of the program. The report notes insufficient technical cybersecurity expertise within CPCSC stakeholder departments, leading to reliance on technical authorities and experts such as CSE/CCCS. </p><p>These existing gaps were identified as risks to the ongoing implementation of CPCSC and could lead to further delays in the program.</p><p>This is closely related to the CPCSC's risk management. The report notes that the Secretariat undertook significant efforts to identify risks and included multiple stakeholders in this process, but there was minimal activity to address the identified risks, other than to help inform the planning and implementation of the CPCSC. Despite this, some interviewed noted that some risks were not fully addressed, which include:</p><ul><li><p>SMEs are struggling with the financial and technical demands of CPCSC</p></li><li><p>Lack of reciprocity</p></li><li><p>Insufficient personnel, project management, and technical cybersecurity expertise in CPCSC stakeholder departments</p></li><li><p>Inconsistent stakeholder priorities, coordination, and engagement</p></li><li><p>Unclear plans to transfer CPCSC management following implementation.</p></li></ul><p>Take note that all of these risks have still not been adequately addressed. While some issues may not be fully addressable, such as the lack of reciprocity, CPCSC has found a middle ground by allowing CMMC to apply to CPCSC on a case-by-case basis. </p><p>The management action plan includes details related to the development of CPCSC risk management tools after the evaluation was completed, but these tools do not neccesarily address the full breadth of risks noted above.</p><div><hr></div><h3>Long Term Program Governance and the CPCSC</h3><p><a href="https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin">What CPCSC is and where to start</a> have already been covered in detail, but this report does a good job of showing how many different departments and teams are involved. Here is a breakdown of the overall structure of those involved, including those outside of the program (<a href="https://www.linkedin.com/in/altechguy/">Thanks to Andrew Laliberte</a>):</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;1bba1be5-de24-4d0e-8f36-563b0bd7bd09&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">DM Committees (Defence Procurement Strategy)

&#9492;&#9472;&#9472; ADM Committees (GC Cyber Security Oversight)

    &#9492;&#9472;&#9472; DG Cyber Security Certification Steering Committee

        &#9492;&#9472;&#9472; PSPC &#8211; DMPB (Program Lead)

            &#9492;&#9472;&#9472; CPCSC Secretariat

                &#9500;&#9472;&#9472; DOB (Technical Authority / Business Owner)

                &#9500;&#9472;&#9472; Procurement Branch (Data Systems)

                &#9500;&#9472;&#9472; Tiger Team Working Group

                &#9474;   &#9500;&#9472;&#9472; PSPC (DMPB + DOB)

                &#9474;   &#9500;&#9472;&#9472; DND (Client / Assessments)

                &#9474;   &#9500;&#9472;&#9472; TBS (Policy)

                &#9474;   &#9500;&#9472;&#9472; CSE / CCCS (Technical Authority)

                &#9474;   &#9492;&#9472;&#9472; SCC (Accreditation)

                &#9492;&#9472;&#9472; External Ecosystem

                    &#9500;&#9472;&#9472; Industry (Suppliers)

                    &#9500;&#9472;&#9472; Third-Party Assessors

                    &#9492;&#9472;&#9472; Cyber / IT Providers</code></pre></div><p>Before CPCSC and informed folk yell at me, I know this does not fully/accurately reflect how the Tiger Team is organized, but it is a rough breakdown of the overall organization and stakeholders involved. it is meant to show just how many people are involved in this. As much as we would like to complain about a lack of communication or about how CPCSC is developing or being delayed, they&#8217;re essentially doing a giant juggling act among the different mandates of the organizations involved in this process. </p><p>The report is very explicit that a lack of personnel, project management, and cybersecurity knowledge is affecting implementation. The Tiger Team organization gives them a lot of flexibility, but may not have the capacity to accomplish everything to ensure that the program&#8217;s successful implementation. This should be a major concern for the government, military, and defence industry, as this is essentially saying CPCSC does not have the resources it needs.</p><div><hr></div><h3>Costs</h3><p>One particular passage really stood out to me that I want to unpack:</p><p>&#8220;The evaluation also found that cost to industry is a major concern for all cyber security programs reviewed. In the case of Canada, CPCSC Secretariat-led industry engagements in May 2024, reported 46% of sub-contractors expecting to invest less than $50,000, while 29% of consultants projected costs of $150,000 to 175,000. 68% of respondents want comprehensive support: financial assistance, guidance, and resources in order to prepare for CPCSC assessment.&#8221;</p><p>When PSPC conducted the evaluation, this data was already approximately a year old. At this point, it is one month shy of being two years old and is likely inaccurate.</p><p>This data is from May 2024, long before ITSP 10.171 was released. Although we generally knew it would be based on CMMC&#8217;s NIST SP 800-171A, CPCSC remains a different mechanism and had to pivot after failing to acquire reciprocity with the United States&#8217; CMMC. As a result, PSPC/CSPSC Secretariat must consider doing another RFI to determine how well industry is beginning to understand CPCSC, especially as level 1 is being introduced. </p><div><hr></div><h3>Takeaways - What Does This Tell Us About CPCSC?</h3><ul><li><p><strong>The government has not provided CPCSC with sufficient resources to develop and implement the program.</strong></p></li></ul><p>The program states that there is &#8220;insufficient personnel, project management and technical cyber security expertise within CPCSC stakeholder departments.&#8221; It is unclear if this has been resolved since this report was released</p><p>Part of the problem with this appears to be the level of funding allocated to departments, where DND, the Treasury Board Secretariat, and CSE/CCCS were not given any funding for CPCSC activities despite having a role in implementation. </p><p>The need to prioritize funding is also likely what has led to a lack of communication between CPCSC and industry and external stakeholders, as they&#8217;re prioritizing program development over engagement. This is a completely understandable approach, but it is making it harder for the CPCSC Secretariat to develop the program.</p><p>Communication and engagement with external stakeholders are critical to maintaining an active dialogue for additional feedback and ensuring successful implementation. Ultimately, it is industry that will be implementing the program and be affected by it, so any supply chain program should include the feedback of the supply chain. Deprioritizing engagement due to a lack of funding ultimately hurts the CPCSC and makes their job so much harder. </p><p>In the end, the report even confirms this when it states &#8220;it was suggested that industry engagement should be increased to boost CPCSC awareness and buy-in, however interviews noted that CPCSC was not provided funds for industry engagement or program promotion.&#8221;</p><ul><li><p><strong>The CPCSC Secretariat does not have an accurate survey of the state of the defence industry and CPCSC implementation, particularly costs.</strong></p></li></ul><p><a href="https://www.cyberincontext.ca/p/what-is-the-canadian-program-for">When CPCSC first conducted their RFI a few years ago</a>, CPCSC was still in its very early stages and only 91 organizations responded. There is likely a strong chance that you only responded to this RFI if you were already aware of CMMC and the role it plays on CPCSC.</p><p>This is to say that many more organizations are now aware of CPCSC; we have the standard and understand its full scope, so now is a time for CPCSC to release another RFI to gain a better understanding of the preparedness of Canada&#8217;s defence industry supply chain and perceptions of CPCSC.</p><p>The report specifically notes recognition of the risk of SMEs struggling with financial and technical demands. More information about these risks and concerns from a new RFI and surveys could potentially help persuade the government, that is very defence conscious, to provide additional funding to ensure the success of the CPCSC.</p><p>The report specifically highlights the high costs associated with similar compliance programs, especially for SMEs, and notes that Australia used loans and regional development funds. This does not mean that the government will institute such programs, but awareness of this and the compliance costs are a positive step towards the government developing programs to assist SMEs and the broader sector in ensuring compliance. This is optimistic thinking, but these types of evaluations and audits are bureaucratic processes that motivate a lot of action on cyber-related programs in the Canadian government.</p><ul><li><p><strong>The CPCSC Secretariat is temporary</strong></p></li></ul><p>Unless this has changed, the handoff plan seems risky. The evaluation states that <em>&#8220;the current CPCSC management model&#8230; was designed to be temporary with a reassessment and transfer of management to another entity following program implementation.&#8221; </em>Authority and oversight of CPCSC was always going to be vested in other authorities when the implementation of CPCSC was completed, but there does not appear to be long-term thinking about governance of this program.</p><p>The evaluation in particular notes that CPCSC&#8217;s management is concerned about when CPCSC moves from DMPB in PSPC to &#8220;another organization.&#8221; Although we know that CPCSC level 3 will be largely be overseen and assessed by DND, there remain questions about the long-term management of the overall CPCSC program. As the CPCSC Tiger Team is a multi-departmental group with an organization and mandate that is unique, it is likely difficult to transition this into normal operations and continue on as normal. </p><p>Another aspect that the report overlooks is that the loss of expertise about CPCSC is likely to occur if CPCSC management is transferred. The report only emphasizes ensuring proper documentation of roles to enable short and long-term effectiveness, but this may not capture the full institutional knowledge and experience with CPCSC stand up that will be important during the course of implementation. </p><p>As a result, it may be better for the program to transition to long-term management sooner rather than later, as the program becomes more complex, the more difficult it may be to transfer management. Despite the stated problems of lack of technical knowledge in PSPC to manage CSPSC, this can be addressed better with a more long-term arrangement with CSE/CCCS.</p><div><hr></div><h3>Conclusion</h3><p>There are many in the wider cyber defence and compliance space in Canada that does not give enough credit to the work of the CPCSC Secretariat. As this report notes, the CPCSC has simply not been provided with sufficient resources by the federal government and remains constrained in what it can achieve. Despite these constraints, its unique construction and &#8220;Tiger Team&#8221; approach have enabled the program to accomplish a great deal with a relatively small team. </p><p>It is unclear how much PSPC has been able to adjust its processes based on this evaluation report and the subsequent action plan, because the Management Action Plan only addresses the need for risk management tools and improved program documentation. These types of programmatic actions are relatively easy and do not suggest that the government has yet to provide CPCSC with the appropriate resources to ensure its success.</p><p>Although this evaluation covers a relatively old time period, it still tell us a lot about how the program is being developed and what has contributed to the delays. Rather than addressing some of the major risks the program has identified, PSPC has strengthened programmatic functions, since addressing anything beyond this would likely require ministerial or cabinet input. </p><p>In the coming weeks, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;id&quot;:1431708,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/canadiancyber&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;uuid&quot;:&quot;3aa34ab6-3e0c-4e38-9d9d-ae0c9a653235&quot;}" data-component-name="MentionToDOM"></span> will be releasing content and informational content about CPCSC level 1 with <a href="https://www.linkedin.com/in/altechguy/">Andrew Laliberte</a>. Already, Andy and I are finding that many of the risks identified in this evaluation are affecting the level 1 implementation.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 18/04/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending April 18]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426</guid><pubDate>Mon, 20 Apr 2026 13:59:25 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/cc0d2671-07cc-42a9-8f6b-d81d103dc55f_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>. </p></li></ul></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://www.cbc.ca/news/canada/edmonton/edmonton-police-emails-documents-provide-new-information-on-canada-first-ai-facial-recognition-bodycam-pilot-9.7157991">Edmonton police emails, documents provide new information on Canada-first AI facial recognition bodycam pilot</a></strong></p><ul><li><p>AI Facial recognition has been shown to produce false positives often, so this should be a major concern.</p></li><li><p>&#8220;The facial recognition model was supplied by Corsight AI, an Israeli company whose technology has reportedly been used for mass surveillance in Gaza.&#8221;</p></li></ul></li><li><p><strong><a href="https://archive.ph/UZdMZ#selection-2571.0-2571.70">AI firm Cohere in merger talks with Germany&#8217;s Aleph Alpha, sources say</a></strong></p><ul><li><p>This is pretty big news because Cohere is a Canadian AI darling that the Government of Canada has championed as a Canadian AI leader. Cohere has also loved to play up its Canadianness, so a merger with German company would upend a lot of the dynamics.</p></li><li><p><strong><a href="https://betakit.com/cohere-exec-pledges-ai-firm-will-stay-canadian-headquartered-amid-merger-reports/">Cohere exec pledges AI firm will stay Canadian-headquartered amid merger reports</a></strong></p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/public-services-procurement/news/2026/04/government-of-canada-introduces-level-1-of-canadian-program-for-cyber-security-certification.html">Government of Canada introduces Level 1 of Canadian Program for Cyber Security Certification</a></strong></p><ul><li><p>For those unfamiliar, CPCSC is Canada&#8217;s answer to the Cybersecurity Maturity Model Certification. Originally, Canada wanted reciprocity, but it didn&#8217;t get it. Nevertheless, the program is still important. This is a big milestone as we steadily get closer to a defence industry-wide implementation.</p><ul><li><p><strong><a href="https://cyberpostureassessments.ops.cyber.gc.ca/Interview/9792cec1-383e-405a-abe5-4cbd3bb4de29">Canadian Program for Cyber Security Certification Level 1 Self-Assesment</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada/meet-level1-certification-requirements.html">How to meet Level 1 Cyber Security Certification Requirements</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada/meet-level1-certification-requirements/scoping-guide.html">Level 1 CPCSC Certification Scoping Guide</a></strong></p></li></ul></li></ul></li><li><p><strong><a href="https://betakit.com/kepler-to-lead-testing-of-european-space-agencys-high-speed-data-network/">Kepler to lead testing of European Space Agency&#8217;s high-speed data network</a></strong></p><ul><li><p>Toronto-based Kepler Communications will be the prime contractor for the ESA&#8217;s HydRON ELement 3. There&#8217;s been a lot of Canada-European engagement on space, particularly space communications. I wouldn&#8217;t be surprised if this is the start of wider industry moves.</p></li></ul></li><li><p><strong>From last week, but activities continued to this week: <a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/04/cafcybercom-participates-latvia-led-threat-hunt-workshop-riga.html">CAFCYBERCOM participates in Latvia-led Threat Hunt Workshop in Riga</a></strong></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rigl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rigl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 424w, https://substackcdn.com/image/fetch/$s_!rigl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 848w, https://substackcdn.com/image/fetch/$s_!rigl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 1272w, https://substackcdn.com/image/fetch/$s_!rigl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rigl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png" width="548" height="670" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:670,&quot;width&quot;:548,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:391702,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/194087792?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rigl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 424w, https://substackcdn.com/image/fetch/$s_!rigl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 848w, https://substackcdn.com/image/fetch/$s_!rigl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 1272w, https://substackcdn.com/image/fetch/$s_!rigl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong><a href="https://feeds.issuerdirect.com/news-release.html?newsid=6478895330456046&amp;symbol=BB,BB:CA">QNX and TKMS Collaborate to Bring Canadian Software Innovation to Global Naval Defence Programs</a></strong></p><ul><li><p>TKMS has partnered with QNX, a division of Blackberry, fo collaboration in support of Canada&#8217;s submarine program</p></li></ul></li><li><p><strong><a href="https://mda.space/article/mda-space-unveils-space-control-platform-mda-midnight-designed-to-defend-and-protect-the-space-domain">MDA Space Unveils Space Control Platform MDA Midnight, Designed to Defend and protect the Space Domain</a></strong></p><ul><li><p>MDA has a VERY interesting new platform that raises questions:</p><ul><li><p>On-orbit inspection and reporting of satellite status</p></li><li><p>Electronic counter measures detection, attribution and mitigation</p></li><li><p>Rendezvous and proximity operations, cooperative satellite capture and release</p></li><li><p>De-orbiting of a customer&#8217;s non-operational asset</p></li></ul></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/04/canada-launches-national-initiative-to-build-large-scale-ai-supercomputing-capacity.html">Canada launches national initiative to build large-scale AI supercomputing capacity</a></strong></p></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/17/news/wealthsimple-x-integration-prediction-markets">Wealthsimple bets on X and Canadian users aren&#8217;t happy</a></strong></p><ul><li><p>I honestly cannot imagine this was done with any understanding of the limited number of Canadians who still use Twitter.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/public-services-procurement/news/2026/04/canada-and-european-space-agency-sign-general-security-of-information-agreement.html">Canada and European Space Agency sign General Security of Information Agreement</a></strong></p><ul><li><p>These agreements usually precede greater levels of cooperation between organizations/countries.</p></li></ul></li><li><p><strong>Canadian Centre for Cyber Security launches <a href="https://www.cyber.gc.ca/en/cyber-security-readiness/critical-infrastructure-resilience-escalated-threat-navigation-initiative">Critical infrastructure resilience and escalated threat navigation initiative</a></strong></p><ul><li><p>&#8220;The Critical Infrastructure Resilience and Escalated Threat Navigation (CIREN) initiative to drive immediate preparedness across organizations to reinforce and protect Canada&#8217;s sovereignty and essential services.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/04/canada-finland-joint-statement-on-sovereign-technology-and-ai-cooperation.html">Canada-Finland Joint Statement on Sovereign Technology and AI Cooperation</a></strong></p><ul><li><p>I&#8217;d argue that a quantum-focused agreement would be even better for Canada and Finland. Quantum is included in this, but is just one part of a large whole.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/economic-development-southern-ontario/news/2026/04/government-of-canada-invests-in-francophone-and-bilingual-digital-health-innovation.html">Government of Canada invests in Francophone and bilingual digital health innovation</a></strong></p></li><li><p><strong><a href="https://www.alberta.ca/release.cfm?xID=96001813BA503-9E45-AC37-D438F38CC353444E">Alberta creates Cyber Crime Task Force: Protecting Albertans from cybercriminals</a></strong></p><ul><li><p>Cyber crime is one of the most pervasive crimes that affect all Canadians, so establishing it as a central priority is good for protecting Canadians and is good politics.</p></li></ul></li><li><p><strong><a href="https://news.gov.bc.ca/releases/2026PSSG0033-000432">British Columbia Launching AI Pilot Project: Disrupting the illicit drug trade with first-in-Canada technology</a></strong></p><ul><li><p>BC is launching a pilot project to use AI for &#8220;enhance police intelligence and understanding of toxic-drug supply patterns to help inform enforcement efforts and issue earlier warnings for bad batches of toxic drugs .&#8221;</p></li></ul></li><li><p><strong><a href="https://www.priv.gc.ca/en/opc-news/news-and-announcements/2026/nr-c_260416/">Privacy Commissioner of Canada appears before Parliamentary Committee to discuss potential privacy implications of the Canada-China Preliminary Joint Arrangement on the Electric Vehicle Sector</a></strong></p><ul><li><p>Privacy Commissioner says new privacy laws are needed. The context was about the incoming electric vehicles from China, but really, the concerns about privacy and cybersecurity with Chinese electric vehicles are just as much of an issue with North American-built electric vehicles.</p></li></ul></li><li><p><strong><a href="https://archive.ph/k0qoC#selection-2565.0-2565.81">Canada must move quickly to address AI-related cybersecurity risks, Macklem warns</a></strong></p><ul><li><p>Bank of Canada Governor warns about looming risks to cybersecurity due to AI like Claude&#8217;s Mythos.</p></li></ul></li><li><p><strong><a href="https://halifax.citynews.ca/2026/04/13/canadian-banks-regulators-discussed-mythos-ai-minister-to-meet-with-anthropic/">Canadian banks, regulators discussed Mythos AI, minister to meet with Anthropic</a></strong></p><ul><li><p>Solomon says Canada can withstand such risks, but I trust anything Solomon says as much as I trust any snake oil salesman.</p></li></ul></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, this section is for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section, which is 100% focused on Canada</h6><ul><li><p><strong><a href="https://www.wired.com/story/meta-ray-ban-oakley-smart-glasses-no-face-recognition-civil-society/">Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators</a></strong></p></li><li><p><strong><a href="https://kotaku.com/rockstar-games-reportedly-hacked-massive-data-leak-ransom-gta-6-shinyhunters-2000686858">Rockstar Games Hacked, ShinyHunters Threaten A Massive Data Leak If Not Paid Ransom</a></strong></p><ul><li><p>Unclear if this will affect the release date of GTA 6.</p></li></ul></li><li><p><strong><a href="https://www.404media.co/google-microsoft-meta-all-tracking-you-even-when-you-opt-out-according-to-an-independent-audit/">Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit</a></strong></p></li><li><p><strong><a href="https://www.wired.com/story/deepfake-nudify-schools-global-crisis/">The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought</a></strong></p><ul><li><p>&#8220;Nearly 90 schools and 600 students around the world impacted by AI-generated deepfake nude images&#8221; - Keep in mind this is only verified and reported, the problem is significantly much worse than this.</p></li></ul></li><li><p><strong><a href="https://cyberscoop.com/ai-chip-smuggling-china-export-controls-enforcement-op-ed/">We&#8217;re only seeing the tip of the chip-smuggling iceberg</a></strong></p></li><li><p><strong><a href="https://hackread.com/booking-com-data-breach-hackers-customer-details/">Booking.com Confirms Data Breach as Hackers Access Customer Details</a></strong></p><ul><li><p>No payment data accessed, but customer information was exposed.</p></li><li><p><strong><a href="https://www.malwarebytes.com/blog/data-breaches/2026/04/booking-com-breach-gives-scammers-what-they-need-to-target-guests">Booking.com breach gives scammers what they need to target guests</a></strong></p><ul><li><p>Good article from MalwareBytes on potential impact.</p></li></ul></li></ul></li><li><p><strong><a href="https://industrialcyber.co/reports/ransomware-reaches-elevated-new-normal-as-attack-volumes-hold-steady-into-2026-reshape-baseline-risk-expectations/">Ransomware reaches elevated &#8216;new normal&#8217; as attack volumes hold steady into 2026, reshape baseline risk expectations</a></strong></p></li><li><p><strong><a href="https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/remotepc/understanding-security-warnings">Understanding security warnings when opening Remote Desktop (RDP) files</a></strong></p><ul><li><p>Windows will begin to show warnings when remote desktop connection files are opened. This is great news, but also what took them so long?</p></li></ul></li><li><p><strong><a href="https://www.theverge.com/ai-artificial-intelligence/914672/the-ram-shortage-could-last-years">The RAM shortage could last years</a> (h/t Catalin Cimpanu)</strong></p><ul><li><p>Although many organizations have already adjusted, I feel like we&#8217;re only seeing the tip of the iceberg when it comes to RAM shortages. Massive demand for AI is putting pressure on RAM producers, who cannot keep up. Additional fabrication capacity will not be online until 2027, and I don&#8217;t think it will be sufficient to meet current demand, which is likely to continue increasing.</p></li></ul></li><li><p><strong><a href="https://www.ietf.org/archive/id/draft-thain-ipv8-00.html">Internet Protocol Version 8 (IPv8)</a></strong></p><ul><li><p>IPv6 traffic has crossed 50%, so it is time to think about the future.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://9to5google.com/2026/04/13/google-search-back-button-hijacking/">Google Search to classify &#8216;back button hijacking&#8217; as spam</a></strong></p></li><li><p><strong><a href="https://databreaches.net/2026/04/05/how-often-do-threat-actors-default-on-promises-to-delete-data/">How often do threat actors default on promises to delete data?</a></strong></p><ul><li><p>This is a few weeks old, but a great article that I want to highlight.</p></li></ul></li><li><p><strong><a href="https://www-securityweek-com.cdn.ampproject.org/c/s/www.securityweek.com/by-design-flaw-in-mcp-could-enable-widespread-ai-supply-chain-attacks/amp/">&#8216;By Design&#8217; Flaw in MCP Could Enable Widespread AI Supply Chain Attacks</a></strong></p></li><li><p><strong><a href="https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/">Someone Bought 30 WordPress Plugins and Planted a Backdoor in All of Them.</a></strong></p><ul><li><p>Easier to do this than to take over open-source projects.</p></li></ul></li><li><p><strong><a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident">Vercel April 2026 security incident</a></strong></p><ul><li><p>Cloud provider hit by ShinyHunters</p></li></ul></li><li><p><strong><a href="https://www.hookphish.com/blog/ransomware-group-shinyhunters-hits-the-canada-life-assurance-company-canadalife-com/">Ransomware Group shinyhunters Hits: The Canada Life Assurance Company (canadalife.com)</a></strong></p><ul><li><p>Major Canadian life assurance company hit by Shinyhunters.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><ul><li><p><strong><a href="https://mollyrosefoundation.org/more-than-60-of-australian-children-still-using-social-media-despite-ban-for-under-16s-research-shows/">More than 60% of Australian children still using social media despite ban for under-16s, research shows</a></strong></p><ul><li><p>The Liberal Party is interested in a ban and should pay attention to how it doesn&#8217;t work.</p></li></ul></li><li><p><strong><a href="https://cybersecurecatalyst.ca/to-build-a-modern-canadian-defence-sector-make-smes-cybersecure/">To build a modern Canadian defence sector, make SMEs cybersecure</a></strong></p><ul><li><p>Op-ed by Charles Finlay of Rogers Cybersecure Catalyst and Daniel Blanc, former Chief of Staff of CAFCYBERCOM</p></li></ul></li><li><p><strong><a href="https://easychair.org/cfp/PST2026">EVENT: 23rd Annual International Conference on Privacy, Security &amp; Trust (PST) to be held in Ottawa, Canada</a></strong></p><ul><li><p>To be held August 26 - 28. Submission deadline is passed, but should be an interesting conference.</p></li></ul></li><li><p><strong><a href="https://eucyberdirect.eu/blog/the-risk-of-making-offensive-cyber-the-new-shiny-silver-bullet">The Risk of Making Offensive Cyber the New Shiny Silver Bullet</a></strong></p><ul><li><p>The direction many NATO countries are considering does not have modern precedence and has a lot of preconceived notions.</p></li></ul></li><li><p>Parliamentary Meetings of Note:</p><ul><li><p><strong><a href="https://sencanada.ca/en/committees/trcm/noticeofmeeting/691633/45-1">April 21: Senate Transport and Communications Committee - Examine and report on the opportunities and challenges of artificial intelligence (AI) in the information and communication technology sector</a></strong></p></li><li><p><strong><a href="https://sencanada.ca/en/committees/trcm/noticeofmeeting/691634/45-1">April 22: Senate Transport and Communications Committee - Examine and report on the opportunities and challenges of artificial intelligence (AI) in the information and communication technology sector</a></strong></p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://docs.fcc.gov/public/attachments/DOC-420764A1.pdf">FCC Selects New Lead Administrator for U.S. Cyber Trust Mark Program (h/t Eric Geller)</a></strong></p><ul><li><p>The FCC selected ioXt Alliance to oversee its Internet of Things labeling program</p></li></ul></li><li><p><strong><a href="https://www.nextgov.com/cybersecurity/2026/04/us-push-counter-hackers-draws-industry-deeper-offensive-cyber-debate/412770/">The White House is expanding the market for offensive cyber capabilities &#8212; and drawing more of the private sector into that ecosystem &#8212; even as policy boundaries around their use remain unclear</a></strong></p><ul><li><p>The White House has had they aren&#8217;t interested in cyber letters of marquee, but there are still major changes underway in how the US uses and cooperates with the private sector to counter cyber threat actors.</p></li></ul></li><li><p><strong><a href="https://www.politico.com/news/2026/04/13/missouri-city-council-data-center-00867259">Missouri town fires half its city council over data center deal</a></strong></p><ul><li><p>Yes we need data centres, but governments at all levels must recognize the harm that they can do to local ecosystems and communities and do consultation. </p></li></ul></li><li><p><strong><a href="https://archive.ph/gWjRA#selection-1285.0-1285.68">The FCC just saved Netgear from its router ban for no obvious reason</a></strong></p><ul><li><p>There were already some concerns that this would lead to corruption and this is not quelling those concerns.</p></li></ul></li><li><p><strong><a href="https://www.nbcnews.com/tech/tech-news/san-jose-drivers-sue-city-police-flock-cameras-rcna331750">Drivers sue San Jose over nearly 500 police cameras used to track drivers across the state</a></strong></p><ul><li><p>This has the potential to establish a lot of precedence regarding private surveillance.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/16/two-americans-sentenced-for-helping-north-korea-steal-5-million-in-fake-it-worker-scheme/">Two Americans sentenced for helping North Korea steal $5 million in fake IT worker scheme</a></strong></p><ul><li><p>I have yet to see any specific reports about Canadian firms hiring North Korean fake IT workers nor anyone assisting them apart from general warnings about North Korea, although this just means it has yet to be reported.</p></li></ul></li><li><p><strong><a href="https://thehill.com/homenews/state-watch/5832039-maine-data-center-ban/">Maine passes first-in-nation freeze on big data centers</a></strong></p><ul><li><p>Although temporary, this is pretty big and likely to lead to similar legislation.</p></li></ul></li><li><p><strong><a href="https://finance.yahoo.com/sectors/technology/articles/bessent-calls-anthropic-mythos-breakthrough-010339669.html">White House Works to Give US Agencies Anthropic Mythos AI</a></strong></p><ul><li><p>Remember, just a few weeks ago, Anthropic was being labelled a supply chain risk?</p></li></ul></li><li><p><strong><a href="https://therecord.media/cargo-thieving-hackers-running-sophisticated-campaigns">Cargo thieving hackers running sophisticated remote access campaigns, researchers find</a></strong></p><ul><li><p>Criminal hackers helping organized crime with cargo thefts.</p></li></ul></li><li><p><strong><a href="https://www.axios.com/2026/04/19/nsa-anthropic-mythos-pentagon">Scoop: NSA using Anthropic&#8217;s Mythos despite blacklist</a></strong></p><ul><li><p>Almost like the current US administration&#8217;s words are hollow and they can&#8217;t be trusted.</p></li></ul></li><li><p><strong><a href="https://www.tallahassee.com/story/news/local/2026/04/17/tallahassee-city-website-down-after-cyberattack/89664260007/">Cyberattack targets city of Tallahassee; official says no data compromised</a></strong></p></li><li><p><strong><a href="https://www.cnbc.com/2026/04/18/justice-department-france-probe-exlon-musk-x.html">Justice Department refuses to assist French probe into Musk&#8217;s X, WSJ reports</a></strong></p><ul><li><p>US Justice Department claims child sexual abuse material constitutes free speech.</p></li></ul></li><li><p><strong><a href="https://lustra.news/en/us-congress/119/legislations/119_HR_8250/">Parents Decide Act: Mandatory Age Verification for Operating Systems</a></strong></p><ul><li><p>This would require operating system providers to verify the age of all users.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://www.gld.nl/nieuws/8463135/oorlogsschip-van-500-miljoen-euro-gevonden-met-gadget-van-5-euro">500 million euro warship found with 5 euro gadget</a></strong></p><ul><li><p>Dutch ship tracked via cheap bluetooth tracker.</p></li></ul></li><li><p><strong><a href="https://www.politico.eu/article/european-civil-servants-new-messaging-services/">European civil servants are being forced off WhatsApp</a></strong></p></li><li><p><strong><a href="https://www.techpolicy.press/how-big-tech-lobbied-the-eu-to-hide-data-centers-environmental-toll/">How Big Tech Lobbied the EU to Hide Data Centers&#8217; Environmental Toll</a></strong></p></li><li><p><strong><a href="https://www.politico.eu/article/eu-brussels-launched-age-checking-app-hackers-say-took-them-2-minutes-break-it/">Brussels launched an age checking app. Hackers say it takes 2 minutes to break it.</a></strong></p><ul><li><p>Governments increasingly want to strip the average person of privacy to avoid responsibility for regulating social media, but they are putting so little effort into implementing these bans that it&#8217;s making everything worse.</p></li></ul></li><li><p><strong><a href="https://therecord.media/ukraine-confirms-suspected-apt28-campaign-targeting-prosecutors">Ukraine confirms suspected APT28 campaign targeting prosecutors, anti-corruption agencies</a></strong></p><ul><li><p></p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://biz.chosun.com/en/en-science/2026/04/12/I2XWXIXVWVEMDCTUAS33I2L6FE/">Hospitals face cyberattacks as Korea underfunds medical data security</a></strong></p><ul><li><p>Republic of Korea is very much like Canada and other Western countries in underfunding cybersecurity in healthcare.</p></li></ul></li><li><p><strong><a href="https://therecord.media/new-janaware-ransomware-targeting-turkey">New &#8216;JanaWare&#8217; ransomware targeting Turkish citizens as cybercriminal ecosystem fragments</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/04/15/sweden-blames-russian-hackers-for-attempting-destructive-cyberattack-on-thermal-plant/">Sweden blames Russian hackers for attempting &#8216;destructive&#8217; cyberattack on thermal plant</a></strong></p><ul><li><p>Russia has been stepping up cyber attacks on critical infrastructure over the past few years.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 11/04/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending April 11]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426</guid><pubDate>Mon, 13 Apr 2026 14:21:26 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8de99a66-80ad-4529-b549-2235d4e486d4_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>.</p></li></ul></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://archive.ph/XCBZ8">AI being used to add fake details in immigration, asylum applications, federal officials say</a></strong></p><ul><li><p>An article on one instance of this came out a couple of weeks ago; this is a broader expos&#233; on the wider use of AI and the problems it will cause.</p></li></ul></li><li><p><strong><a href="https://securitybrief.ca/story/kyndryl-foundation-backs-jedi-for-cyber-skills-training">Kyndryl Foundation backs JEDI for cyber skills training</a></strong></p><ul><li><p>JEDI is a New Brunswick group that focuses on working with Indigenous communities on economic and workforce development.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/politics/saab-lockheed-martin-fighters-data-defence-9.7157673">Saab dangles sovereign data centre in Montreal to undercut F-35 fighter contract</a></strong></p><ul><li><p>I honestly don&#8217;t think this will affect the overall calculus that much because the military is 100% behind F-35, and any decision is based on politics and long-term strategic balancing.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/04/invisible-shield-how-cafcybercom-protects-systems-protect-canada.html">Invisible shield: How CAFCYBERCOM protects the systems that protect Canada</a></strong></p><ul><li><p>Bit of a fluff piece out by CAFCYBERCOM Public Affairs</p></li></ul></li><li><p><strong><a href="https://www.ctvnews.ca/canada/article/a-new-alarming-scam-trend-is-running-rampant-in-canada/">A new, alarming scam trend is running rampant in Canada</a></strong></p><ul><li><p>About leveraging media reports about class-action settlements for use in scams. This is not really &#8220;new,&#8221; it&#8217;s just another scam.</p></li></ul></li><li><p><strong><a href="https://www.winnipegfreepress.com/arts-and-life/life/sci-tech/2026/04/11/liberal-party-adopts-motion-to-restrict-kids-from-social-media">Liberals adopt policy to restrict kids from social media</a></strong></p><ul><li><p>The Federal Liberal Party of Canada adopted a non-binding resolution in favor of banning the use of social media by those under the age of 16.</p></li><li><p>There are major issues with such policies because it relies on identity verification. Canada doesn&#8217;t even have updated privacy laws yet, but the Liberals want to rush ahead and force private corporations to store our data to verify ages. This is quite dangerous for Canadians&#8217; privacy.</p></li></ul></li><li><p><strong><a href="https://archive.ph/Jzvln#selection-3745.26-3745.115">Ontario and Quebec police probing cyber network that hacked millions of household devices</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://digitalnovascotia.com/news/how-a-volunteer-run-cyber-conference-grew-to-fill-halifaxs-convention-centre/">How a volunteer-run cyber conference grew to fill Halifax&#8217;s convention centre</a></strong></p><ul><li><p>Article about ATLSEC </p></li></ul></li><li><p><strong><a href="https://lockheedmartin.ca.mediaroom.com/index.php?s=2429&amp;item=122586">Lockheed Martin Canada Invests $3.6M CAD in Ottawa-based Lemay.ai</a></strong></p><ul><li><p>Investment as part of ITB commients to support in-service support for CC-130J Super Hercules aircraft fleet.</p></li></ul></li><li><p><strong><a href="https://documentsearch.oas.org/documents/X_2_26_CICTE_doc-7/X_2_26_CICTE_doc-7-rev1-en.pdf">Canada is Working with Organisation for American States on Cybersecurity</a></strong><a href="https://documentsearch.oas.org/documents/X_2_26_CICTE_doc-7/X_2_26_CICTE_doc-7-rev1-en.pdf"> </a></p><ul><li><p>Canada is the listed donor country on projects addressing the gender gap in cybersecurity and strengthening capacity to address cybercrime in the Americas</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/04/crtc-seeking-new-broadband-fund-proposals-to-help-improve-internet-services-for-canadians.html">CRTC seeking new Broadband Fund proposals to help improve Internet services for Canadians</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/04/crtc-launches-new-call-for-proposals-to-its-broadband-fund-to-help-improve-internet-and-cellphone-services.html">CRTC launches new call for proposals to its Broadband Fund to help improve Internet and cellphone services</a></strong></p><ul><li><p>Rural and Northern/Arctic communities remain severely underserved with limited options for access in Canada.</p></li></ul></li><li><p><strong>Provinces view digital sovereignty very differently&#8230;</strong></p><ul><li><p><strong><a href="https://news.ontario.ca/en/release/1007259/ontario-welcomes-microsofts-ai-infrastructure-expansion">Ontario Welcomes Microsoft&#8217;s AI Infrastructure Expansion</a></strong></p></li><li><p>(Google Translated) <strong><a href="https://www.quebec.ca/nouvelles/actualites/details/mission-du-ministre-gilles-belanger-renforcer-le-partenariat-strategique-entre-la-france-et-le-quebec-en-matiere-de-souverainete-numerique-69659">Minister Gilles B&#233;langer&#8217;s mission: to strengthen the strategic partnership between France and Quebec in the area of &#8203;&#8203;digital sovereignty</a></strong></p></li></ul></li><li><p><strong><a href="https://archive.ph/00jw1#selection-1249.0-1249.60">Bank of Canada, Major Lenders Met on Anthropic AI Cyber Risk</a></strong></p><ul><li><p>While it is good they are meeting to discuss cyber risk, it should likely be focused more broadly than just Anthropic&#8217;s latest marketing.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/04/cafcybercom-participates-latvia-led-threat-hunt-workshop-riga.html">CAFCYBERCOM participates in Latvia-led Threat Hunt Workshop in Riga</a></strong></p><ul><li><p>CAF Cyber Forces have been working closely with Latvia on cyber threat hunting since at least 2022.</p></li></ul></li><li><p>Ambassador of the Phillipines to Canada met with Sami Khoury, who is the Senior Official for Cyber Security and former head of the Canadian Centre for Cyber Security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Whvn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Whvn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 424w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 848w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 1272w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Whvn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png" width="872" height="829" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:829,&quot;width&quot;:872,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:709804,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/193373566?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Whvn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 424w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 848w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 1272w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, I am creating this section for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section that will be 100% focused on Canada</h6><ul><li><p><strong><a href="https://gizmodo.com/microsoft-says-youre-not-supposed-to-take-copilots-advice-seriously-2000742630">Microsoft Says You&#8217;re Not Supposed to Take Copilot&#8217;s Advice Seriously</a></strong></p><ul><li><p>Microsoft recently slipped into its terms of service that you should basically treat copilot as a toy and not for anything important. That should tell you a lot about its efficacy.</p></li></ul></li><li><p><strong><a href="https://arstechnica.com/ai/2026/04/anthropic-limits-access-to-mythos-its-new-cybersecurity-ai-model/?utm_source=bsky&amp;utm_medium=social">Anthropic limits access to Mythos, its new cybersecurity AI model</a></strong></p><ul><li><p>I am seeing/hearing a lot of interesting things about this new model. Anthropic is making some major advancements in the use of AI for cybersecurity. With that said, people should still have a healthy amount of skepticism about Anthropic&#8217;s marketing.</p></li></ul></li><li><p><strong><a href="https://arstechnica.com/security/2026/04/heres-why-its-prudent-for-openclaw-users-to-assume-compromise/">OpenClaw gives users yet another reason to be freaked out about security</a></strong></p><ul><li><p>I haven&#8217;t shared too much about OpenClaw, but it is just a colossal mess.</p></li></ul></li><li><p><strong><a href="https://futurism.com/artificial-intelligence/google-ai-overviews-misinformation">Analysis Finds That Google&#8217;s AI Overviews Are Providing Misinformation at a Scale Possibly Unprecedented in the History of Human Civilization</a></strong></p></li><li><p><strong><a href="https://security.googleblog.com/2026/04/bringing-rust-to-pixel-baseband.html">Bringing Rust to the Pixel Baseband</a></strong> (h/t Catalin Cimpanu)</p><ul><li><p>Apparently Google used the Rust in the last Pixel release. Rust is a programming language that is know for its benefits to cybersecurity, especially regarding memory safety..</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/">Men Are Buying Hacking Tools to Use Against Their Wives and Friends</a></strong></p><ul><li><p>The ease of access is turning this into a crime of convenience for many.</p></li></ul></li><li><p><strong><a href="https://www.404media.co/webinartv-secretly-scraped-zoom-meetings-of-anonymous-recovery-programs/">WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs</a></strong></p><ul><li><p>Zoom remains popular in Canada.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-007-vulnerability-impacting-fortinet-forticlientems-cve-2026-35616">Alert - AL26-007 - Vulnerability impacting Fortinet FortiClientEMS - CVE-2026-35616</a></strong></p></li><li><p><strong><a href="https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html">Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/">Disgruntled researcher leaks &#8220;BlueHammer&#8221; Windows zero-day exploit</a></strong></p><ul><li><p>If you don&#8217;t have an engaged, cooperative disclosure process, you&#8217;ll get disclosures you&#8217;ll wish you had cooperated with.</p></li></ul></li><li><p><strong><a href="https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/">Investigating Storm-2755: &#8220;Payroll pirate&#8221; attacks targeting Canadian employees</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://www.sophos.com/en-us/blog/adobe-reader-zero-day-vulnerability-in-active-exploitation">Adobe Reader zero-day vulnerability in active exploitation</a></strong></p></li><li><p><strong><a href="https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Adds One Known Fortinet Exploited Vulnerability to Catalog</a></strong></p></li><li><p><strong><a href="https://cybernews.com/security/cpuid-hwmonitor-hwinfo-cpuz-deliver-malware/">CPUID website hacked: users report HWMonitor and CPU-Z delivering malware</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/">New VENOM phishing attacks steal senior executives&#8217; Microsoft logins</a></strong></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p>Michael Geist:<strong> <a href="https://www.michaelgeist.ca/2026/04/could-bill-c-22-make-canadians-less-safe-the-systemic-vulnerability-gap-in-canadas-new-surveillance-law/">Could Bill C-22 Make Canadians Less Safe? The Systemic Vulnerability Gap in Canada&#8217;s New Surveillance Law</a></strong></p></li><li><p><strong>Globe and Mail OpEd by Michael Geist: <a href="https://archive.ph/xCo10">The U.S. isn&#8217;t happy about Canada&#8217;s quest for digital sovereignty</a></strong></p></li><li><p><strong>Event April 29: <a href="https://events.teams.microsoft.com/event/8b275e5e-a10b-46b6-963d-267540902a83@fcf67057-50c9-4ad4-98f3-ffca64add9e9">Defence Disrupted: Technology, Readiness, and the Future of Canadian Defence</a></strong></p><ul><li><p>Put on by IBM Canada</p></li></ul></li><li><p><strong>Citizen Lab: <a href="https://citizenlab.ca/research/analysis-of-penlinks-ad-based-geolocation-surveillance-tech/">Uncovering Webloc: An Analysis of Penlink&#8217;s Ad-based Geolocation Surveillance Tech</a></strong></p><ul><li><p>&#8220;Webloc is a global geolocation surveillance system that monitors hundreds of millions of people based on data purchased from consumer apps and digital advertising. It was developed by Cobwebs Technologies and is now sold by its successor Penlink.&#8221;</p></li></ul></li><li><p><strong>The Conversation: <a href="https://theconversation.com/canadas-cybersecurity-sector-has-a-pipeline-problem-and-a-glass-ceiling-270764">Canada&#8217;s cybersecurity sector has a pipeline problem &#8212; and a glass ceiling</a></strong></p><ul><li><p>By Sepideh Borzoo, Atefeh (Atty) Mashatan, and Rupa Banerjee from Toronto Metropolitan University</p></li></ul></li><li><p><strong><a href="https://aiforensics.org/work/telegram-harassment-infrastructure">Harassment as Infrastructure: How Telegram&#8217;s design enables TFGBV</a></strong></p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:193503283,&quot;url&quot;:&quot;https://www.nattothoughts.com/p/cybersecurity-strategy-in-chinas&quot;,&quot;publication_id&quot;:835088,&quot;publication_name&quot;:&quot;Natto Thoughts&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!t3eQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png&quot;,&quot;title&quot;:&quot;Cybersecurity Strategy in China&#8217;s 15th Five-Year Plan&quot;,&quot;truncated_body_text&quot;:&quot;On March 12, 2026, the National People&#8217;s Congress approved the &#8220;Outline of the 15th Five-Year Plan for National Economic and Social Development (15th FYP) of the People&#8217;s Republic of China&#8221; (&#20013;&#21326;&#20154;&#27665;&#20849;&#21644;&#22269;&#22269;&#27665;&#32463;&#27982;&#21644;&#31038;&#20250;&#21457;&#23637;&#31532;&#21313;&#20116;&#20010;&#20116;&#24180;&#35268;&#21010;&#32434;&#35201;) (15th FYP), the country&#8217;s highest-level development blueprint, which covers the years 2026 to 2030. Over the years, the Western cybersecurity&quot;,&quot;date&quot;:&quot;2026-04-08T14:03:21.660Z&quot;,&quot;like_count&quot;:5,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:86550903,&quot;name&quot;:&quot;Natto Team&quot;,&quot;handle&quot;:&quot;nattothoughts&quot;,&quot;previous_name&quot;:&quot;Project MNP&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15b484a6-590b-44d5-9774-de4cb42631df_954x954.png&quot;,&quot;bio&quot;:&quot;We are a group of experts with decades of experience in geopolitical analysis and cyber threat intelligence. We do research in a variety of European and Asian languages. &quot;,&quot;profile_set_up_at&quot;:&quot;2022-04-07T01:38:15.619Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:774421,&quot;user_id&quot;:86550903,&quot;publication_id&quot;:835088,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:835088,&quot;name&quot;:&quot;Natto Thoughts&quot;,&quot;subdomain&quot;:&quot;nattothoughts&quot;,&quot;custom_domain&quot;:&quot;www.nattothoughts.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Stories, analysis and insights from the intersection of culture, technology, and security.\n&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png&quot;,&quot;author_id&quot;:86550903,&quot;primary_user_id&quot;:86550903,&quot;theme_var_background_pop&quot;:&quot;#EA410B&quot;,&quot;created_at&quot;:&quot;2022-04-07T01:41:45.349Z&quot;,&quot;email_from_name&quot;:&quot;Natto Thoughts&quot;,&quot;copyright&quot;:&quot;Natto Thoughts&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.nattothoughts.com/p/cybersecurity-strategy-in-chinas?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!t3eQ!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png" loading="lazy"><span class="embedded-post-publication-name">Natto Thoughts</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cybersecurity Strategy in China&#8217;s 15th Five-Year Plan</div></div><div class="embedded-post-body">On March 12, 2026, the National People&#8217;s Congress approved the &#8220;Outline of the 15th Five-Year Plan for National Economic and Social Development (15th FYP) of the People&#8217;s Republic of China&#8221; (&#20013;&#21326;&#20154;&#27665;&#20849;&#21644;&#22269;&#22269;&#27665;&#32463;&#27982;&#21644;&#31038;&#20250;&#21457;&#23637;&#31532;&#21313;&#20116;&#20010;&#20116;&#24180;&#35268;&#21010;&#32434;&#35201;) (15th FYP), the country&#8217;s highest-level development blueprint, which covers the years 2026 to 2030. Over the years, the Western cybersecurity&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">21 days ago &#183; 5 likes &#183; Natto Team</div></a></div><ul><li><p>Natto Thoughts is one of the best sources for research and analysis on Chinese cyber, so go give them a follow.</p></li></ul></li><li><p><strong>Parliament is holding a few hearings on AI this upcoming week:</strong></p><ul><li><p><strong><a href="https://www.ourcommons.ca/DocumentViewer/en/45-1/INDU/meeting-31/notice">April 13, House of Commons Industry and Technology Committee: Opportunities, Risks, and Regulation of AI in Canada&#8217;s Strategic Industries</a></strong></p></li><li><p><strong><a href="https://sencanada.ca/en/committees/trcm/noticeofmeeting/691631/45-1">April 14, Senate Transport and Communications, Examine and report on the opportunities and challenges of artificial intelligence (AI) in the information and communication technology sector</a></strong></p></li><li><p><strong><a href="https://sencanada.ca/en/committees/trcm/noticeofmeeting/691632/45-1">April 15, Senate Transport and Communications, Examine and report on the opportunities and challenges of artificial intelligence (AI) in the information and communication technology sector</a></strong></p></li></ul></li><li><p>DND is holding public engagement sessions related to NORAD modernization infrastructure projects in the North, some of which will include information infrastruture</p><ul><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/news/2026/04/national-defence-to-hold-public-engagement-session-in-inuvik-northwest-territories.html">Inuvik: April 21</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/news/2026/04/national-defence-to-hold-public-engagement-session-in-yellowknife-northwest-territories.html">Yellowknife: April 23</a></strong></p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a">Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</a></strong></p><ul><li><p>Ongoing warnings to all critical infrastructure operators.</p></li></ul></li><li><p><strong><a href="https://www.latimes.com/california/story/2026-04-07/lapd-records-suspected-hack">Trove of sensitive LAPD records leaked in data hack of city attorney&#8217;s office</a></strong></p><ul><li><p>It&#8217;s hard to find a more corrupt police department than the LAPD in the US (there are receipts for this), so it's unsurprising that this has happened.</p></li></ul></li><li><p><strong><a href="https://therecord.media/cia-director-elevated-agency-cyber-espionage-division">CIA director quietly elevated agency&#8217;s cyber espionage division</a></strong></p><ul><li><p>This should not be a big surprise and is likely the direction for many Western human-intelligence organizations, but should be a major concern. The CIA has been in the game for a while, but it&#8217;s generally been a tertiary tool. The use of privately developed exploits and spyware sold to governments and private actors is greatly proliferating, and this will increasingly endanger civilians and the general public.</p></li></ul></li><li><p><strong><a href="https://hackread.com/dark-web-market-375tb-lockheed-martin-data/">Dark Web Market Lists Alleged 375TB Lockheed Martin Data for $600M</a></strong></p><ul><li><p>By a group &#8220;APT Iran&#8221;</p></li></ul></li><li><p><strong><a href="https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack">Massachusetts hospital turning ambulances away after cyberattack</a></strong></p><ul><li><p>Healthcare is one of the favorite targets for cyber threat actors.</p></li></ul></li><li><p><strong><a href="https://therecord.media/minnesota-sends-national-guard-after-local-cyberattack">Minnesota governor sends national guard to county after cyberattack</a></strong></p><ul><li><p>There is previous precedence for this in Minnesota. The importance of such actions are not always about skilled cybersecurity knowledge, but sometimes about additional labour to have people on hand to run programs, click through prompts, physically remove infected hardware from networks for additional work and recovery, etc.</p></li></ul></li><li><p><strong><a href="https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/">FBI Extracts Suspect&#8217;s Deleted Signal Messages Saved in iPhone Notification Database</a></strong></p><ul><li><p>Deleted signal messages recovered, along with a charge for &#8220;Antifa&#8221; activities.</p></li></ul></li><li><p><strong><a href="https://www.zetter-zeroday.com/trenchant-exec-says-he-had-depression-money-troubles-when-he-decided-to-sell-zero-days-to-russian-buyer-also-new-info-reveals-nature-of-his-work-for-australian-intelligence-agency/">Trenchant Exec Says He Had Depression, Money Troubles When He Decided to Sell Zero Days to Russian Buyer; Also, New Info Reveals Nature of His Work for Australian Intelligence Agency</a></strong></p><ul><li><p>A pretty common set of conditions that often leads to insider threats.</p></li></ul></li><li><p><strong><a href="https://therecord.media/treasury-department-announces-crypto-info-sharing">Treasury Department announces crypto industry cyber threat sharing initiative</a></strong></p></li><li><p><strong><a href="https://cyberscoop.com/fbi-operation-masquerade-russian-gru-router-takedown-brett-leatherman/">Inside the FBI&#8217;s router takedown that cut off APT28&#8217;s &#8216;tremendous access&#8217;</a></strong></p></li><li><p><strong><a href="https://defensescoop.com/2026/04/07/army-data-operations-center-plans-adoc/">Inside the Army&#8217;s new data operations center and its &#8216;sprint&#8217; to help fix digital headaches</a></strong></p><ul><li><p>DND/CAF are also dealing with various digital headaches, but I am not sure I would describe them as being in a similar &#8220;sprint&#8221; to fix them.</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/sam-altman-home-attack-openai-san-franisco-office-threat/">Suspect Arrested for Allegedly Throwing Molotov Cocktail at Sam Altman&#8217;s Home</a></strong></p></li><li><p><strong><a href="https://therecord.media/senator-launches-inquiry-into-tech-giants-csam">Senator launches inquiry into 8 tech giants for failures to adequately report CSAM</a></strong></p></li><li><p><strong><a href="https://therecord.media/florida-investigates-openai-chatgpt-deadly-shooting">Florida investigates OpenAI for role ChatGPT may have played in deadly shooting</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://therecord.media/cyberattack-hits-northern-ireland-schools">Cyberattack hits Northern Ireland&#8217;s centralized school network, disrupting access for thousands</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/04/07/russian-government-hackers-broke-into-thousands-of-home-routers-to-steal-passwords/">Russian government hackers broke into thousands of home routers to steal passwords</a></strong></p><ul><li><p>Edge devices will always remain a priority target for all cyber threat actors.</p></li></ul></li><li><p><strong><a href="https://linuxiac.com/france-launches-government-linux-desktop-plan-as-windows-exit-begins/">France Launches Government Linux Desktop Plan as Windows Exit Begins</a></strong></p><ul><li><p>This is after France dropped Teams and Zoom in January. It&#8217;s not clear what distro they&#8217;re using, which, honestly, they may not want to make too public but also likely something that will be determined later.</p></li></ul></li><li><p><strong><a href="https://therecord.media/russia-accuses-radio-free-europe-journalist-aiding-ukraine-cyberattack?mkt_tok=Njc4LUZITC03MTAAAAGhFjzQ1CE4sLLTzgOpA4pqhrXW7BaINhNovl5tm6-xPtJKYF9tomKCFIkQ1nXTkIB_60O0FAs_oNePUsNwWwYXCCANf5-CXBaI1kncRmWF">Russia accuses former Radio Free Europe journalist of aiding cyberattacks for Ukraine</a></strong></p></li><li><p><strong><a href="https://dysruptionhub.com/chevin-fleetwave-us-fleet-ops/">U.K.-based Chevin cyber incident disrupts U.S. fleet operations</a> </strong>(H/t Catalin Cimpanu)</p><ul><li><p>The attack is targeting fleet management software.</p></li></ul></li><li><p><strong><a href="https://news.sky.com/story/greece-to-ban-under-15s-from-social-media-from-next-year-13529181">Greece to ban under-15s from social media from next year</a></strong></p><ul><li><p>I would not be surprised if we begin to see this in many more Western countries. Unsure how successful it will be in Canada, but hte liberals are interested in a similar ban.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://www.reuters.com/world/europe/russia-supplies-iran-with-cyber-support-spy-imagery-hone-attacks-ukraine-says-2026-04-07/">Russia supplies Iran with cyber support, spy imagery to hone attacks, Ukraine says</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://edition.cnn.com/2026/04/08/china/china-supercomputer-hackers-hnk-intl">A hacker has allegedly breached one of China&#8217;s supercomputers and is attempting to sell a trove of stolen data</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/eurail-says-december-data-breach-impacts-300-000-individuals/">Eurail says December data breach impacts 300,000 individuals</a></strong></p></li><li><p><strong><a href="https://www.accessnow.org/mena-phishing-2026/">Espionage for repression: hack-for-hire phishing campaign targets civil society in MENA</a> </strong>(h/t Catalin Cimpanu)</p><ul><li><p>Hack-for-hire is slowly growing as a viable option for cyber criminal groups.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 4/04/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending April 4]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426</guid><pubDate>Tue, 07 Apr 2026 09:05:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/77b8e77b-27f3-46d0-b2f3-fb78b5ff640a_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></p></li><li><p><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>.</p></li></ul></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://www.dal.ca/news/2026/03/30/agriculture-technology-artificial-intelligence.html">Hackers, barns, and breakfast: Why agriculture needs cybersecurity</a></strong></p><ul><li><p>Agriculture cyber security has been a long time coming.</p></li></ul></li><li><p><strong><a href="https://www.theglobeandmail.com/business/article-rogers-freedom-mobile-data-breaches-telecom-quebecor/">Rogers and Freedom Mobile say they suffered data breaches in recent weeks</a></strong></p><ul><li><p>Have any Canadian telecoms not suffered a breach?</p></li></ul></li><li><p><strong><a href="https://thewalrus.ca/why-does-ottawa-keep-funding-fake-canadian-companies/">Why Does Ottawa Keep Funding Fake Canadian Companies?</a></strong></p><ul><li><p>The definitions of what is a &#8220;Canadian&#8221; company are very loose. This affects cyber and cloud as we have discussed before, but it has larger economic impact that the government is slowly trying to address.</p></li></ul></li><li><p><strong><a href="https://rollingout.com/2026/03/31/oracle-slashes-30000-jobs-with-a-cold-6/">Oracle slashes 30,000 jobs with a cold 6 a.m. email</a></strong></p><ul><li><p>Unclear of the direct impact on Canada, but Oracle has a large presence in Canada, especially in government.</p></li><li><p><strong><a href="https://finance.yahoo.com/markets/stocks/articles/oracle-fired-30-000-workers-174000364.html">Oracle fired up to 30,000 workers via email after a 95% profit surge. Tech companies are cutting almost 1,000 jobs/day</a></strong></p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/shared-services/news/2026/03/government-of-canada-advances-digital-sovereignty-and-secure-communications-through-contract-extension-with-blackberry.html">Government of Canada advances digital sovereignty and secure communications through contract extension with BlackBerry</a></strong></p><ul><li><p>Blackberry has shifted away from its cellphone does and does great now in cybersecurity, so they are ones to keep an eye on.</p></li></ul></li><li><p><strong><a href="https://financialpost.com/news/economy/us-targets-canada-cloud-computing-trade-irritant">U.S. targets Canada&#8217;s cloud-computing move as trade irritant</a></strong></p><ul><li><p>The United States doesn&#8217;t want Canada to have sovereignty. They are incapable of understanding they are the risk we want to avoid.</p></li></ul></li><li><p><strong><a href="https://www.csoonline.com/article/4152830/anthropic-employee-error-exposes-claude-code-source-2.html">Anthropic employee error exposes Claude Code source</a></strong></p><ul><li><p>Company that habitually infringes on other&#8217;s copyright is now concerned about their own copyright. </p></li></ul></li><li><p><strong><a href="https://www.microsoft.com/en-us/microsoft-copilot/for-individuals/termsofuse">Microsoft&#8217;s Terms of Use says Copilot is only for entertainment purposes</a></strong></p><ul><li><p>Exact wording: &#8220;Copilot is for entertainment purposes only. It can make mistakes, and it may not work as intended. Don&#8217;t rely on Copilot for important advice. Use Copilot at your own risk.&#8221;</p><ul><li><p>This should tell you everything you should know about LLMs. They are toys that Microsoft and others are trying to convince you will change the world, while they themselves know it is breaking and making everything worse.</p></li></ul></li></ul></li><li><p><strong><a href="https://www.platformer.news/meta-oversight-board-funding-cancel/">Exclusive: Meta has discussed ending funding to the Oversight Board</a></strong></p><ul><li><p>This should be grounds to increase litigation against Meta and Facebook. This oversight board was setup due to the overwhelming unethical behaviour on behalf of Facebook, now Meta. Meta stands out amongst social media companies in that they seem to actively try to make things worse, more toxic, and harmful all to produce profit.</p></li><li><p>Stop using Facebook.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/pacific-economic-development/news/2026/03/pacifican-invests-138-million-to-advance-defence-innovation-in-ai-and-aerospace-in-british-columbia.html">PacifiCan invests $13.8 million to advance defence innovation in AI and aerospace in British Columbia</a></strong></p><ul><li><p>There&#8217;s a small, but growing defence and security industry in BC.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/economic-development-southern-ontario/news/2026/04/government-of-canada-supports-aerospace-and-space-innovation-to-strengthen-security-boost-prosperity-and-enhance-sovereign-capabilities.html">Government of Canada supports aerospace and space innovation to strengthen security, boost prosperity, and enhance sovereign capabilities</a></strong></p></li><li><p><strong><a href="https://browsergate.eu/">LinkedIn Is Illegally Searching Your Computer</a></strong></p><ul><li><p>Major claims that Microsoft is essentially running one of the largest corporate espionage operations via Linkedin.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/news/2026/04/canadian-armed-forces-cyber-command-launches-official-command-badge.html">Canadian Armed Forces Cyber Command launches Official Command Badge</a></strong></p><ul><li><p>They&#8217;ve had an unofficial patch/bade for a while, so great they now have an official command badge.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bzdx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bzdx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 424w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 848w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 1272w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png" width="266" height="344" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a838b55b-7021-4ad9-801e-f4ed76702446_266x344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:344,&quot;width&quot;:266,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:150864,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/192625842?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Bzdx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 424w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 848w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 1272w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li><li><p>&#8220;The green and black field reflects the Command&#8217;s integration of signals intelligence, electronic warfare, and cyber operations across the digital and electromagnetic domains. The green represents signals intelligence heritage, while the black represents electronic warfare and operations within the contested electromagnetic spectrum. The chess knight represents the deliberate application of cyber capabilities in both defensive and offensive contexts. A lightning bolt and interlaced rings highlight operational precision and expertise in signals intelligence, while the Royal Crown and maple leaves affirm constitutional authority and national service.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/03/news/alberta-scraps-environmental-assessment-kevin-olearys-worlds-largest-data-centre">Alberta scraps environmental assessment for Kevin O&#8217;Leary&#8217;s &#8216;world&#8217;s largest&#8217; data centre</a></strong></p><ul><li><p>Still in the planning phases so there&#8217;s a chance nothing will come of this, especially with O&#8217;Leary attached to this. However, this lack of environmental assessment is likely to become the norm, which sets a concerning precedent due to how major of an impact data centres can have on local environments and populations.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/london/officials-still-investigating-what-led-to-cyber-incident-at-london-health-unit-9.7121106">Officials still investigating what led to cyber incident at London health unit</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/03/cafcybercom-showcases-new-ai-cyber-tool-nato-exercise.html">CAFCYBERCOM showcases new AI cyber tool at NATO exercise</a></strong></p><ul><li><p>I have heard of this tool before, but I don&#8217;t know much about it other than that it&#8217;s really well liked and getting a lot of attention</p></li><li><p>&#8220;The capability, a Cyber Indications and Warning (I&amp;W) tool, was designed and developed by five members of 33 Signals Regiment working on Class A time since January 2025. Their objective was to explore how large language models could support cyber operations through analysis, translation, and geolocation, while also enabling the seamless sharing of insights into a broader operational picture.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.newswire.ca/news-releases/larus-awarded-8-3m-contract-by-department-of-national-defence-to-advance-ai-powered-tactical-intelligence-in-partnership-with-the-canadian-army-896794905.html">Larus awarded an $8.3 million IDEaS Test Drive contract by DND to advance AI/ML in tactical planning and decision intelligence</a></strong></p></li><li><p><strong><a href="https://www.cbc.ca/news/canada/kitchener-waterloo/security-incident-personal-health-information-exposed-waterloo-region-health-network-9.7149980">&#8216;Security incident&#8217; may have exposed files of thousands of patients, Waterloo Regional Health Network warns</a></strong></p></li><li><p><strong><a href="https://betakit.com/canadas-first-full-stack-university-owned-quantum-computer-comes-to-usask/">Canada&#8217;s first full-stack, university-owned quantum computer comes to USask</a></strong></p><ul><li><p>Some of the best uses for quantum computers remain to write academic papers about, but we&#8217;re slowly getting to more operational use with hybrid computing.</p></li></ul></li><li><p><strong><a href="https://betakit.com/ngen-announces-nearly-80-million-for-canadian-manufacturers-to-adopt-ai/">NGen announces nearly $80 million for Canadian manufacturers to adopt AI</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/treasury-board-secretariat/news/2026/04/government-of-canada-launches-review-of-the-privacy-act.html">Government of Canada launches review of the Privacy Act</a></strong></p><ul><li><p>Canada is LONG overdue for updated privacy laws. </p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/04/canada-is-expanding-high-speed-internet-access-in-nunavut.html">Canada is expanding high-speed Internet access in Nunavut</a></strong></p><ul><li><p>$86 million federal investment, piggybacks off the <a href="https://www.canada.ca/en/innovation-science-economic-development/news/2020/11/universal-broadband-fund-and-telesat-low-earth-orbit-capacity-agreement.html">$600 million contract w/Telesat</a></p></li></ul></li><li><p><strong>CDW Canada: <a href="https://finance.yahoo.com/sectors/technology/articles/cyberattacks-targeting-canadian-enterprises-surge-121500060.html">Cyberattacks Targeting Canadian Enterprises Surge Nearly 80% Year Over Year</a></strong></p><ul><li><p>Report from CDW Canada has some very interesting info and statistics. Suggest that there is a &#8220;security maturity illusion.&#8221; which is a common topic, but fascinating that it is getting to a level that a cybersecurity firm is saying it&#8217;s impacting the wider Canadian threat surface.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-006-vulnerability-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2026-3055">Alert - AL26-006 - Vulnerability impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2026-3055</a></strong></p><ul><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks/">Critical Citrix NetScaler memory flaw actively exploited in attacks</a></strong></p><ul><li><p>Citrix used to be quite common in Canada amongst businesses, but not sure what its market presence is these days.</p></li></ul></li></ul></li><li><p><strong><a href="https://opensourcemalware.com/blog/axios-compromised">One of the most popular JavaScript packages on earth Axios has been compromised</a></strong></p><ul><li><p>I&#8217;ve been saying for a year now that there needs to be industry- and government-wide engagement to address the growing security problem with open-source software.</p></li><li><p><strong><a href="https://therecord.media/google-links-axios-supply-chain-attack-north-korea">Google links axios supply chain attack to North Korean group</a></strong></p><ul><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package">Google&#8217;s report here</a></p></li></ul></li></ul></li><li><p><strong><a href="https://www.theregister.com/2026/03/31/iran_password_spraying_m365/">Iran targets M365 accounts with password-spraying attacks</a></strong></p><ul><li><p>They&#8217;ve been doing M365 password spraying for years</p></li></ul></li><li><p><strong><a href="https://blog.talosintelligence.com/qilin-edr-killer/">Qilin EDR killer infection chain</a></strong></p></li><li><p><strong><a href="https://workspaceupdates.googleblog.com/2026/03/ransomware-detection-and-file-restoration-for-Google-Drive-now-generally-available.html">Ransomware detection and file restoration for Google Drive now generally available</a></strong></p></li><li><p><strong><a href="https://www.theregister.com/2026/03/31/red_hat_ai_dev/">Leaked memo suggests Red Hat&#8217;s chugging the AI Kool-Aid</a></strong></p></li><li><p><strong><a href="https://adversa.ai/claude-code-security-bypass-deny-rules-disabled/">Critical Claude Code vulnerability: Deny rules silently bypassed because security checks cost too many tokens</a></strong></p></li><li><p><strong><a href="https://therecord.media/new-criminal-service-plans-to-monetize-ransomware-data">New criminal service plans to monetize data stolen by ransomware gangs</a></strong></p><ul><li><p>This is a particularly concerning innovation. If successful, this will change the cyber crime market.</p></li></ul></li><li><p><strong><a href="https://dti.domaintools.com/research/dprk-malware-modularity-diversity-and-functional-specialization">DPRK Malware Modularity: Diversity and Functional Specialization</a></strong></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><strong><a href="https://www.bbc.co.uk/mediacentre/2025/new-ebu-research-ai-assistants-news-content">Largest study of its kind shows AI assistants misrepresent news content 45% of the time &#8211; regardless of language or territory</a></strong></p><ul><li><p>This will change nothing. Those selling you AI will downplay this.</p></li></ul></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks/">Evolution of Ransomware: Multi-Extortion Ransomware Attacks</a></strong></p></li><li><p><strong><a href="https://www.lawfaremedia.org/article/the-perils-of-privatized-cyberwarfare">The Perils of Privatized Cyberwarfare</a></strong></p><ul><li><p>By Ron Deibert from Citizen Lab, who is on the forefront of defending civilians from privatized cyber warfare.</p></li></ul></li><li><p><strong>Event: <a href="https://www.nationalacademies.org/units/DEPS-CSTB-13-03/event/46521">Securing AI systems: New challenges and research priorities</a></strong></p><ul><li><p>Being held April 20-21, online attendance is possible.</p></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:193351972,&quot;url&quot;:&quot;https://teresascassa.substack.com/p/consultation-on-long-overdue-privacy&quot;,&quot;publication_id&quot;:3380257,&quot;publication_name&quot;:&quot;Teresa Scassa&#8217;s Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0Wwc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;title&quot;:&quot;Consultation on long overdue Privacy Act reform promises a significant overhaul&quot;,&quot;truncated_body_text&quot;:&quot;Treasury Board Secretariat has published a discussion paper and launched a consultation into the long-overdue reform of the federal Privacy Act. The consultation is open until July 10, 2026.&quot;,&quot;date&quot;:&quot;2026-04-06T13:45:56.190Z&quot;,&quot;like_count&quot;:5,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:103039402,&quot;name&quot;:&quot;Teresa Scassa&quot;,&quot;handle&quot;:&quot;tscassa&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;bio&quot;:&quot;I'm a law professor at the University of Ottawa, where I hold the Canada Research Chair in Information Law and Policy. My research areas include privacy law, AI regulation, and data governance. All opinions and commentary are my own.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-11-19T15:35:43.741Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:3444266,&quot;user_id&quot;:103039402,&quot;publication_id&quot;:3380257,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3380257,&quot;name&quot;:&quot;Teresa Scassa&#8217;s Substack&quot;,&quot;subdomain&quot;:&quot;teresascassa&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Posts about developments in law and technology with a focus on AI, privacy, and data governance.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;author_id&quot;:103039402,&quot;primary_user_id&quot;:103039402,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-19T16:15:47.041Z&quot;,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;Teresa Scassa&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://teresascassa.substack.com/p/consultation-on-long-overdue-privacy?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!0Wwc!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg" loading="lazy"><span class="embedded-post-publication-name">Teresa Scassa&#8217;s Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Consultation on long overdue Privacy Act reform promises a significant overhaul</div></div><div class="embedded-post-body">Treasury Board Secretariat has published a discussion paper and launched a consultation into the long-overdue reform of the federal Privacy Act. The consultation is open until July 10, 2026&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">22 days ago &#183; 5 likes &#183; Teresa Scassa</div></a></div></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="http://Meta ordered to pay $375m after being found liable in child exploitation case">Meta ordered to pay $375m after being found liable in child exploitation case</a></strong></p></li><li><p><strong><a href="https://www.404media.co/how-thomson-reuters-powers-ice-and-palantir/">How Thomson Reuters Powers ICE and Palantir</a></strong></p><ul><li><p>Data brokers generally don&#8217;t care about ethics.</p></li></ul></li><li><p><strong><a href="https://therecord.media/iran-hackers-state-department-reward">State Department reissues $10 million reward for info on Iranian hackers</a> (Handala)</strong></p></li><li><p><strong><a href="https://www.cnbc.com/2026/04/01/iran-irgc-nvidia-appple-attack-threat.html">Iran threatens Nvidia, Apple and other tech giants with attacks</a></strong></p><ul><li><p>Also includes Cisco, HP, Intel, Oracle, IBM, Dell, Palantir, JPMorgan, Tesla, GE, and more. </p></li></ul></li><li><p><strong><a href="https://therecord.media/hasbro-takes-some-systems-offline-after-cyber-incident">Hasbro takes some systems offline after cybersecurity incident</a></strong></p><ul><li><p>May need a few weeks to recover.</p></li></ul></li><li><p><strong><a href="https://www.wcvb.com/article/cyberattack-town-public-safety-systems-patriot-regional/70908585">&#8216;Serious cyberattack&#8217; impacts phones, public safety systems in Massachusetts towns</a></strong></p></li><li><p><strong><a href="https://www.politico.com/news/2026/04/01/fbi-hack-surveillance-system-major-incident-00854237">FBI declares suspected Chinese hack of US surveillance system a &#8216;major cyber incident&#8217;</a></strong></p></li><li><p><strong><a href="https://www.nextgov.com/people/2026/03/new-nsa-director-pushes-more-intel-sharing-allies-internal-meeting/412350/">New NSA director pushes for more intel-sharing with allies in internal meeting</a></strong></p><ul><li><p>This is good to hear. He is former Indo-Pacific deputy commander, so that likely plays a role in his understanding that partnerships are key.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/02/ice-says-it-bought-paragons-spyware-to-use-in-drug-trafficking-cases/">ICE says it bought Paragon&#8217;s spyware to use in drug trafficking cases</a></strong></p><ul><li><p>Acting Director states they will comply with constitutional requirements. Somehow we&#8217;re supposed to believe ICE, which has a greater track record than any other agency of infringing on people&#8217;s constitutional rights.</p></li><li><p><strong><a href="https://summerlee.house.gov/newsroom/press-releases/rep-summer-lee-colleagues-slam-dhs-response-on-ice-use-of-foreign-spyware-vow-continued-oversight">Rep. Summer Lee, Colleagues Slam DHS Response on ICE Use of Foreign Spyware, Vow Continued Oversight</a></strong></p></li></ul></li><li><p><strong><a href="https://federalnewsnetwork.com/cybersecurity/2026/04/cybercorps-grads-consider-private-sector-as-fed-hiring-challenges-persist/">CyberCorps grads consider private sector as fed hiring challenges persist</a></strong></p><ul><li><p>CyberCorps is a program of the US Office of Personnel Management to provide scholarship for cybersecurity professionals. It has been a great program to bring cybersecurity professionals in the government and has been a constant source of people. The Trump admin has completely destroyed its government cybersecurity workforce and institutions.</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/artemis-ii-microsoft-outlook-problems/">Even Artemis II Astronauts Have Microsoft Outlook Problems</a></strong></p><ul><li><p>At the end of time and the universe there will be Microsoft Outlook problems.</p></li></ul></li><li><p><strong><a href="https://federalnewsnetwork.com/defense-news/2026/04/dod-still-failing-to-properly-mark-cui-data-years-after-initial-audit/">DoD still failing to properly mark CUI data years after initial audit</a></strong></p></li><li><p><strong><a href="https://defensescoop.com/2026/03/31/army-cybersecurity-training-policy-change/">Commanders now responsible for cybersecurity training after Army cuts online course requirement to once every 5 years</a></strong></p><ul><li><p>This is a hilariously bad idea. China and DPRK have growing and more advanced cyber operations programs, but the Army is relaxing cybersecurity training.</p></li></ul></li><li><p><strong><a href="https://fortune.com/2026/04/02/mercor-ai-startup-security-incident-10-billion/">Mercor, a $10 billion AI startup that works with companies including OpenAI and Anthropic, confirms major data breach</a></strong></p></li><li><p><strong><a href="https://chinaselectcommittee.house.gov/media/press-releases/house-committee-passes-chip-security-act">House Committee Passes Chip Security Act</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://www.prospectmagazine.co.uk/ideas/technology/72853/rise-facial-recognition-policing">The rise of facial recognition policing</a></strong></p><ul><li><p>This is a UK-focused article, but has global implications.</p></li></ul></li><li><p><strong><a href="https://therecord.media/european-commission-downplays-shinyhunters-cyber-claim">European Commission downplays ShinyHunters cyberattack impact</a></strong></p><ul><li><p>ShinyHunters do have a history of overblowing their extortion attempts. However, most ransomware and extortion cyber threat actors tend to do the same, so it&#8217;s why everything they cyber threat actors claim should always be taken cautiously.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/03/europes-cyber-agency-blames-hacking-gangs-for-massive-data-breach-and-leak/">Europe&#8217;s cyber agency blames hacking gangs for massive data breach and leak</a></strong></p><ul><li><p>&#8220;The stolen data was then posted online by another hacking group, the notorious ShinyHunters. &#8220;</p></li></ul></li><li><p><strong>(Google Translated) <a href="https://www.repubblica.it/tecnologia/2026/04/01/news/meta_denuncia_spyware_clone_di_whatsapp-425257968/">An Italian company&#8217;s spyware was posing as WhatsApp. Meta: &#8220;Affected users notified.&#8221;</a></strong></p></li><li><p><strong><a href="https://www.techpolicy.press/uk-cloud-regulator-opts-for-voluntary-commitments-launches-microsoft-investigation/">UK Regulator Probes Microsoft While Backing Voluntary Cloud Rules</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://www.404media.co/an-ai-agent-was-banned-from-creating-wikipedia-articles-then-wrote-angry-blogs-about-being-banned/">An AI Agent Was Banned From Creating Wikipedia Articles, Then Wrote Angry Blogs About Being Banned</a></strong></p><ul><li><p>Didn&#8217;t take them long to ban their first clanker.</p></li></ul></li><li><p><strong><a href="https://restofworld.org/2026/ai-avatar-colombia-political-candidate">An AI avatar is running to represent Indigenous voters in Colombia</a></strong></p></li><li><p><strong>Australia: <a href="https://www.esafety.gov.au/newsroom/media-releases/five-social-media-platforms-flagged-for-compliance-issues">Five social media platforms flagged for compliance issues</a></strong></p><ul><li><p>Facebook, Instagram, Snapchat, TikTok and YouTube are being investigated related to Australia&#8217;s social media minimum age laws.</p></li></ul></li><li><p><strong>(Google Translated) <a href="https://www.kisa.or.kr/402/form?postSeq=2580&amp;page=1">Korea Internet &amp; Security Agency Launches &#8216;Ransomware Full Lifecycle Response Task Force&#8217;</a></strong></p><ul><li><p>There has been a spat of high level ransomware incidents in South Korea of late, so this is an unsurprising, but welcome response.</p></li></ul></li><li><p><strong><a href="https://gizmodo.com/iran-says-it-hit-oracle-facilities-in-uae-2000741785">Iran Says It Hit Oracle Facilities in the UAE</a></strong></p><ul><li><p>Not the first data centres hit, but now confirms and shows that data centres are a target in military conflict.</p></li></ul></li><li><p><strong><a href="https://cityhub.com.au/sydney-councils-warn-data-centre-boom/">Sydney Councils Warn Data Centre Boom Is Set To Strain Housing And Utilities</a></strong></p><ul><li><p>Good article as this strain is going on everywhere right now. Because Western countries can no longer trust the United States, there&#8217;s a mad rush to develop sovereign data centres.</p></li></ul></li><li><p><strong><a href="https://www.aljazeera.com/news/2026/4/3/cambodia-parliament-approves-law-to-combat-cybercrime-scam-rings">Cambodia parliament approves law to combat cybercrime scam rings</a></strong></p></li><li><p><strong><a href="https://www.wired.com/story/inside-the-hack-that-exposed-syrias-security-failures/">The Hack That Exposed Syria&#8217;s Sweeping Security Failures</a></strong></p><ul><li><p>I&#8217;m not a fan of this article, but it is important to share. This sort of overlooks the context for which Syria is in and assumes a similar baseline of capacity.</p></li></ul></li><li><p><strong><a href="https://latinamericanpost.com/science-technology/mexico-confronts-a-silent-cyber-war-it-can-no-longer-outsource/">Mexico Confronts a Silent Cyber War. It Can No Longer Outsource</a></strong> (H/t <a href="https://sherpaintelligence.substack.com/">Sherpa Intelligence, go give them a follow</a>)</p><ul><li><p>As Mexico increasingly digitizes, it becomes the primary target in Latin America for cyber attacks.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 28/03/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending March 28]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326</guid><pubDate>Mon, 30 Mar 2026 13:43:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6be036aa-0f5e-47b7-b997-33c37747136d_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have a new paper out with the Canadian Global Affairs Institute: </p><ul><li><p><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>.</p></li></ul></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><a href="https://betakit.com/spark-microsystems-secures-additional-17-million-in-series-b-funding/">Spark Microsystems secures additional $17 million in Series B funding</a></p><ul><li><p>Spark specializes in next-gen short-range wireless communications. </p></li></ul></li><li><p>Online Privacy at Stake in Cambridge Analytica Supreme Court of Canada Case</p></li><li><p><a href="https://betakit.com/cohere-teams-up-with-swedish-defence-firm-saab-on-ai-for-surveillance-jets/">Cohere teams up with Swedish defence firm Saab on AI for surveillance jets</a></p><ul><li><p>Canadian AI darling Cohere is starting to make increasingly big moves into defence.</p></li></ul></li><li><p><a href="https://abacusdata.ca/canadians-split-on-ai-data-centres-as-cost-concerns-and-local-opposition-emerge/">Canadians Split on AI Data Centres as Cost Concerns and Local Opposition Emerge</a></p><ul><li><p>New data from Abacus Data concerning Canadian attitudes towards AI data centres, which can likely be applied to data centres broadly despite there unique differences as the public is unlikely to care about the distinction when they both have massive impacts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lUTn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lUTn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 424w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 848w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 1272w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lUTn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png" width="930" height="725" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:725,&quot;width&quot;:930,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:80122,&quot;alt&quot;:&quot;\&quot;At a broad level, Canadians are divided on whether building more AI data centres in the country is a good idea. Overall, 38% say it would be a good thing, including 12% who say it would be a very good thing, while 37% believe it would be a bad thing, including 21% who say it would be very bad. Another 9% say it would be neither good nor bad, and 15% say they don&#8217;t know enough to offer an opinion.\&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/191891137?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&quot;At a broad level, Canadians are divided on whether building more AI data centres in the country is a good idea. Overall, 38% say it would be a good thing, including 12% who say it would be a very good thing, while 37% believe it would be a bad thing, including 21% who say it would be very bad. Another 9% say it would be neither good nor bad, and 15% say they don&#8217;t know enough to offer an opinion.&quot;" title="&quot;At a broad level, Canadians are divided on whether building more AI data centres in the country is a good idea. Overall, 38% say it would be a good thing, including 12% who say it would be a very good thing, while 37% believe it would be a bad thing, including 21% who say it would be very bad. Another 9% say it would be neither good nor bad, and 15% say they don&#8217;t know enough to offer an opinion.&quot;" srcset="https://substackcdn.com/image/fetch/$s_!lUTn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 424w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 848w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 1272w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://abacusdata.ca/canadians-split-on-ai-data-centres-as-cost-concerns-and-local-opposition-emerge/">Abacus Data</a></figcaption></figure></div></li></ul></li><li><p><a href="https://theijf.org/article/fire-rises-extremism-video-games">Federal government worried extremists recruiting through video games</a></p><ul><li><p>They are, but it&#8217;s a multi-prong issue. Toxic gaming culture is super prevalent that encourages extremist views and takes, which makes individuals predisposed to be influenced.</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/canada/nova-scotia/pc-mla-rick-burns-hackers-blackmail-intimate-images-9.7134004">PC MLA says hackers accessed and shared intimate images on his devices</a></p><ul><li><p>I am honestly surprised this does not occur more often, but I'm glad the MLA didn&#8217;t pay and is working with police and the RCMP.</p></li></ul></li><li><p><a href="https://archive.is/ELrCI#selection-3765.26-3765.137">Canada rejected her permanent residence application. Her job duties were made up &#8212; by Immigration&#8217;s AI reviewer</a></p><ul><li><p>This is just the start. More is to come as the CRA is experiencing MASSIVE cuts and will be investing significantly into AI.</p></li></ul></li><li><p><a href="https://www.ipc.on.ca/en/media-centre/news-releases/statement-on-proposed-fippa-changes-march-24">Updated statement on proposed changes to Ontario&#8217;s Freedom of Information and Protection of Privacy Act</a></p><ul><li><p>Ontario&#8217;s Privacy Commissioner updates their statement on the Ontario government&#8217;s attempts to exempt the premier and high levels of provincial government from freedom of information requests.</p></li><li><p>This is a great statement and really goes to the heart that Doug Ford is trying to hide what he is doing and prevent accountability. Doug Ford hates transparency and doesn&#8217;t want to be held accountable for his activities.</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/business/technology/article-coolit-sold-to-ecolab-for-475-billion-in-one-of-biggest-ever-canadian/">CoolIT sold to Ecolab for $4.75-billion in one of biggest-ever Canadian tech takeovers</a></p><ul><li><p>Oh look, another Canadian company sold to American company. Bought by private equity, no less. Guess that means we should start counting until another private equity firm destroys a company.</p></li></ul></li><li><p><a href="https://www.cyber.gc.ca/en/news-events/joint-guidance-securing-space-cyber-security-low-earth-orbit-satellite-communications">Joint guidance on securing space and cyber security for low earth orbit satellite communications</a></p><ul><li><p>Canada&#8217;s CCCS joins Australia, New Zealand, and the United States.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/26/cohere-launches-an-open-source-voice-model-specifically-for-transcription/">Cohere launches an open-source voice model specifically for transcription</a></p><ul><li><p>A nice move by Cohere. I&#8217;ll hold off until third-party verification of how good their model is, but with so many transcription models out there for voice-to-text, many are bad. Cohere is releasing an open source model based on Cohere&#8217;s tech and work, this could be great for those with disabilities, like myself, who use transcriptions of other people&#8217;s speech to help them.</p></li></ul></li><li><p><a href="https://betakit.com/opentext-employees-report-job-cuts-tied-to-apparent-restructuring/">OpenText lays off four percent of its global workforce</a></p></li><li><p><a href="https://betakit.com/denvr-partners-with-dominion-dynamics-on-drone-development/">Denvr signs two defence deals to deepen sovereign AI push in Canada</a></p><ul><li><p>Deals signed with Dominion Dynamics and Sapper Labs. Sapper Labs is pretty well known in Canada's cyber defence scene, so this automatically catches my eye.</p></li></ul></li><li><p><a href="https://theijf.org/article/osfi-cybersecurity-self-assessment?utm_source=Investigative+Journalism+Foundation">Can&#173;ada&#8217;s banking regulator gives itself substandard score on cybersecurity</a></p><ul><li><p>I provided some comments for this story.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/03/caf-and-five-eyes.html">CAF and Five Eyes partners advance Cyber Mission Assurance in pre-RIMPAC 26 tabletop exercise</a></p><ul><li><p>CAFCYBERCOM is doing a lot in the Indo-Pacific.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/economic-development-quebec-regions/news/2026/03/government-of-canada-invests-36m-in-defence-sector-with-support-for-universite-du-quebec-en-outaouais.html">Government of Canada invests $3.6M in defence sector with support for Universit&#233; du Qu&#233;bec en Outaouais</a></p><ul><li><p>A big part of this will be going towards cybersecurity range. I should likely map out how many cyber ranges there are in Canada. Just a few years ago, I would likely count on one hand, but now I feel like there&#8217;s been a major boom in just the last couple years.</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/canada/nova-scotia/hacked-power-security-data-breach-9.7141893">Nova Scotia Power agrees to beef up security after customer data breached</a></p><ul><li><p>They are responding to a compliance letter from Canada&#8217;s privacy commissioner.</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11748030/carney-3-billion-defence-projects/">Prime minister commits more than $3B for defence projects in the Maritimes</a></p><ul><li><p>A significant part of this will be cyber, information, and communications technology related.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/democratic-institutions/news/2026/03/government-of-canada-introduces-measures-to-further-protect-canadas-electoral-processes-and-strengthen-democracy.html">Bill C-25: Government of Canada introduces measures to further protect Canada&#8217;s electoral processes and strengthen democracy</a></p><ul><li><p>A few cyber-related aspects of this new bill. Includes privacy policy requirements and requirement to disclose data breaches, and bans deepfakes.</p></li><li><p><a href="https://www.parl.ca/DocumentViewer/en/45-1/bill/C-25/first-reading">Read the full Bill C-25 here</a></p></li></ul></li><li><p><a href="https://www.canada.ca/en/financial-consumer-agency/news/2026/03/final-report-from-the-second-financial-industry-forum-on-artificial-intelligence-fifai-2-now-available.html">Final report from the second Financial Industry Forum on Artificial Intelligence (FIFAI 2) now available</a></p><ul><li><p>Final report for the forum held last year.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/competition-bureau/news/2026/03/competition-bureaus-experts-available-to-discuss-ai-generated-government-impersonation-scams-with-media.html">Competition Bureau&#8217;s experts available to discuss AI-generated government impersonation scams with media</a></p><ul><li><p>Appears competition bureau is increasingly concerned about AI-generated government scams.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/03/minister-sidhu-and-indias-minister-of-commerce-and-industry-continue-to-strengthen-canadaindia-trade-cooperation.html">Canada and India Advance Dialogue on Digital Trade and Bilateral Economic Agreement</a></p><ul><li><p>Includes digital trade.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf">NIST updates Secure Domain Name System (DNS) Deployment Guide</a></p><ul><li><p>First update in a decade! As they say, it&#8217;s always DNS.</p></li></ul></li><li><p><a href="https://databreaches.net/2026/03/23/if-threat-actors-gave-you-a-chance-to-redact-the-patient-data-they-hacked-before-they-leak-it-would-you-take-them-up-on-the-offer-read-about-the-woundtech-incident/">If threat actors gave you a chance to redact the patient data they hacked before they leak it, would you take them up on the offer? Read about the Woundtech incident</a> (H/t Catalin Cimpanu)</p><ul><li><p>Very interesting case of a cyber threat actor targeting a health care provider and taking considerable effort to redact patient data. Even offering Woundtech to redact the data themselves.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-exploited-secure-fmc-flaw-in-zero-day-attacks-since-january/">Ransomware gang exploits Cisco flaw in zero-day attacks since January</a></p></li><li><p><a href="https://www.securityweek.com/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors/">&#8216;DarkSword&#8217; iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors</a></p><ul><li><p>More technical reporting on the Coruna exploit/toolkit</p></li></ul></li><li><p><a href="https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html">GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers</a></p><ul><li><p>Github/open source attacks. So hot right now.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/github-adds-ai-powered-bug-detection-to-expand-security-coverage/">GitHub adds AI-powered bug detection to expand security coverage</a></p><ul><li><p>And in response Github is trying to beef up their security</p></li></ul></li><li><p><a href="https://www.legitsecurity.com/blog/the-trivy-supply-chain-compromise-what-happened-and-playbooks-to-respond">The Trivy Supply Chain Compromise: What Happened and Playbooks to Respond</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday/">CISA orders feds to patch max-severity Cisco flaw by March 22</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">Canada needs a secure-coding policy &#8212; and AI is making that more urgent</a></p><ul><li><p>My new op-ed about the need for a secure-coding policy.</p></li></ul></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026">M-Trends 2026: Data, Insights, and Strategies From the Frontlines</a></p><ul><li><p>Dwell time increases as hand-off window &#8220;collapses&#8221; to 22 seconds. A lot of concerning trends, however, one positive trend is detections are up.</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/business/commentary/article-digital-sovereignty-data-tech/">Can Canada ever have true digital sovereignty?</a></p><ul><li><p>Good op-ed, which really gets to the heart of current debates: &#8220;When in doubt, remember that sovereignty is determined by which court can compel the access of data, not where that data is ultimately stored.&#8221;<br></p></li></ul></li><li><p><a href="https://www.linkedin.com/pulse/defence-industrial-strategys-initial-spending-hoped-da-mota-ph-d--fmsle/">The Defence Industrial Strategy&#8217;s initial spending is not as Canadian as hoped</a></p><ul><li><p>Some good research by ana anlyst from the Canadian Shield Institute.</p></li></ul></li><li><p><a href="https://www.science.org/doi/10.1126/science.aec8352">Sycophantic AI decreases prosocial intentions and promotes dependence</a></p><ul><li><p>Some great research on impacts of the use of certain types of AI models</p></li></ul></li><li><p><a href="https://www.tradecommissioner.gc.ca/en/trade-events-training/2026/09/international-defense-industry-exhibition-mspo.html">International Defence Industry Exhibition (MSPO 2026)</a></p><ul><li><p>Apply to join Canadian delegation to Europe&#8217;s third largest defence and security trade show.</p></li></ul></li><li><p><a href="https://cybersecurecatalyst.ca/advancing-defence/">Rogers Cybersecure Catalyst held a Defence Sector 101 catered for cyber and dual-use technology sectors.</a></p><p></p></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><a href="https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers">FCC Updates Covered List to Include Foreign-Made Consumer Routers</a></p><ul><li><p>The FCC basically just banned all consumer routers not made in the United States. This will be a major disruption.</p></li></ul></li><li><p><a href="https://abcnews.com/amp/Politics/state-department-launches-effort-counter-cyberattacks-ai-risks/story?id=131265350">State Department launches effort to counter cyberattacks, AI risks from Iran, others </a></p><ul><li><p>Just in case you forgot that the United States is run by the biggest of idiots: <a href="https://www.cybersecuritydive.com/news/state-department-cyber-bureau-firings-reorganization/753370/">In July 2025, the State Department began to dismantle their Bureau of Cyberspace and Digital Policy.</a></p></li></ul></li><li><p><a href="https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/">Google launches threat disruption unit, stops short of calling it &#8216;offensive&#8217;</a></p><ul><li><p>Although we&#8217;re not likely to see cyber letters of marquee, we&#8217;re going to see private actors getting into &#8220;disruption.&#8221;</p></li><li><p>An explanation from one of the heads of Google Threat Intelligence&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Oa2f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Oa2f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 424w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 848w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 1272w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png" width="572" height="702" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:702,&quot;width&quot;:572,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79177,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/191891137?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Oa2f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 424w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 848w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 1272w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul></li><li><p><a href="https://therecord.media/stryker-cyberattack-malware-iran">Stryker says malware was involved in recent cyberattack as production lines reopen</a></p><ul><li><p>Stryker originally said malware was not used, so it is now unclear to what degree Stryker is releasing information for PR reasons versus what information is about the attack.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/24/crunchyroll-confirms-data-breach-after-hacker-claims-unauthorized-access/">Crunchyroll confirms data breach after hacker claims unauthorized access</a></p><ul><li><p>The attack stole customer service ticket information via a third-party vendor, which makes me suspect they may use this data to target customers.</p></li></ul></li><li><p><a href="https://www.wired.com/story/when-satellite-data-becomes-a-weapon/">When Satellite Data Becomes a Weapon</a></p><ul><li><p>Focused on the US, but this is universal and impacts Canada a lot.</p></li></ul></li><li><p><a href="https://www.wired.com/story/using-a-vpn-may-subject-you-to-nsa-spying/">Using a VPN May Subject You to NSA Spying</a></p><ul><li><p>The logic here is sound whereby the US is actively encouraging its citizens to use foreign VPNs to enable greater surveillance of their citizens.</p></li></ul></li><li><p><a href="https://www.axios.com/2026/03/27/fbi-kash-patel-iran-cyberattack">Iran-linked group claims hack of FBI Director Kash Patel</a></p><ul><li><p>Handala has claimed responsibility, who are also the ones behind the Stryker attack.</p></li><li><p><a href="https://therecord.media/fbi-confirms-theft-of-directors-personal-emails-iran-group">FBI confirms theft of director&#8217;s personal emails by Iran-linked hacking group</a></p></li></ul></li><li><p><a href="https://databreaches.net/2026/03/18/the-internet-yiff-machine-leaks-millions-of-anonymous-tips-to-ddosecrets/">The &#8220;Internet YIFF Machine&#8221; leaks millions of &#8220;anonymous&#8221; tips to DDoSecrets</a></p><ul><li><p>Anonymous tip line for police leaked.</p></li></ul></li><li><p><a href="https://www.economist.com/united-states/2026/03/22/america-goes-on-cyber-offence">America goes on cyber-offence</a></p><ul><li><p>Economist article about the US&#8217; new cyber strategy and Iran.</p></li></ul></li><li><p><a href="https://www.wired.com/story/a-school-district-tried-to-help-train-waymos-to-stop-for-school-buses-it-didnt-work/">A School District Tried to Help Train Waymos to Stop for School Buses. It Didn&#8217;t Work</a></p><ul><li><p>Businesses argue that their technology should be exempt from laws while humans continue to suffer. </p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><a href="https://therecord.media/russia-malware-arrest-clayrat">Russia-linked malware operation collapses after security failures, developer&#8217;s arrest</a></p></li><li><p><a href="https://www.heise.de/en/news/Vulnerability-in-CampusNet-Addresses-of-over-one-million-students-exposed-online-11218902.html">Vulnerability in German CampusNet:Addresses of over one million students exposed online</a></p></li><li><p><a href="https://techcrunch.com/2026/03/25/russia-arrests-alleged-owner-of-cybercrime-forum-leakbase-report-says/">Russia arrests alleged owner of cybercrime forum LeakBase, report says</a></p><ul><li><p>Russia arresting cyber criminals is still relatively rare as many will cooperate with Russian intelligence services and police, but this uneasy alliance has been strained in recent years.</p></li></ul></li><li><p><a href="https://www.iwf.org.uk/news-media/news/dangerous-ai-child-sexual-abuse-reaches-record-high-as-public-backs-clampdown-on-uncensored-tools/">&#8216;Dangerous&#8217; AI child sexual abuse reaches record high as public backs clampdown on &#8216;uncensored&#8217; tools</a></p><ul><li><p>Internet Watch Foundation identified over 8,000 AI-generated videos and images of child sexual abuse in 2025. How much of this was Grok?</p></li></ul></li><li><p><a href="https://www.bloomberg.com/news/newsletters/2026-03-18/chinese-partnerships-with-european-universities-stir-security-concerns">Chinese Partnerships With European Universities Stir Security Concerns</a></p><ul><li><p>Funny how China is okay with Europeans sharing/bringing research to China, but doesn&#8217;t want Chinese researchers sharing research or threat information with anyone outside of China.</p></li></ul></li><li><p><a href="https://www.c4isrnet.com/global/europe/2026/03/27/ukrainian-drones-hit-all-three-baltic-states-did-russia-redirect-them/">Ukrainian drones hit all three Baltic States &#8722; did Russia redirect them?</a></p><ul><li><p>Cyber Electro Magnetic Activities (CEMA) is the name of the game now for militaries. It is why CAFCYBERCOM commands electronic warfare in addition to cyber.</p></li></ul></li><li><p><a href="https://arstechnica.com/tech-policy/2026/03/elon-musk-loses-big-in-court-x-boycott-perfectly-legal/">Elon Musk loses big in court; X boycott perfectly legal</a></p><ul><li><p>Musk&#8217;s efforts to stiffle free speech and association fails and said to be a &#8220;fishing expedition.&#8221; Just a reminder that Musk profited off of CSAM. Yet, MInister of AI Solomon still believes X is a reputable platform.</p></li></ul></li><li><p><a href="https://therecord.media/ransomware-ukraine-russia-bearlyfy">Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware</a></p></li><li><p><a href="https://www.kommersant.ru/doc/8533998">The Not so Great Firewall of Russia to increase capacity by 2.5 times by 2030</a></p><ul><li><p>Russia is slowly moving towards a similar domestically controlled information space and internet as China.</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/sci-tech/article/poland-faced-a-surge-in-cyberattacks-in-2025-including-a-major-assault-on-the-energy-sector/">Poland faced a surge in cyberattacks in 2025, including a major assault on the energy sector</a></p><ul><li><p>Led by Russia and increasingly includes destrutive attacks.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><a href="https://biz.chosun.com/en/en-finance/2026/03/22/QN57OMWVMJG6BP6VIBN6IA42XI/">Hackers breach South Korea&#8217;s top lender subsidiary, leak customer data</a></p></li><li><p><a href="https://www.heise.de/en/news/WTF-Police-responded-on-Saturday-night-due-to-a-zero-day-11221590.html">WTF: Police responded on Saturday night due to a zero-day</a></p></li><li><p><a href="https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/">Self-propagating malware poisons open source software and wipes Iran-based machines</a></p><ul><li><p>A self-propagating backdoor in open source software that likes to deploy a data wiper on Iranian computers. Sounds like Israel to me.</p></li></ul></li><li><p><a href="https://www.sixthtone.com/news/1018313">&#8216;GEO&#8217; Services Are Flooding the Chinese Internet With Misinformation</a> (h/t Catalin Cimpanu)</p><ul><li><p>&#8220;Generative engine optimization, or GEO, to manipulate AI models, distort search result rankings, and spread misinformation to achieve commercial goals such as product promotion.&#8221;</p></li></ul></li><li><p><a href="https://www.israelnationalnews.com/news/424483">National Cyber Authority: 50 Israeli companies &#8216;digitally erased&#8217;</a></p><ul><li><p>The scope of cyber attacks related to conflict is never fully captured by mainstream media and you generally have to go to cybersecurity firms to understand the state of things. This can actually make things difficult because not all cybersecurity firms publish reputable information.</p></li></ul></li><li><p><a href="https://www.404media.co/wikipedia-bans-ai-generated-content/">Wikipedia Bans AI-Generated Content</a></p><ul><li><p>Good.</p></li></ul></li><li><p><a href="https://cybertechaccord.org/statement-from-the-cybersecurity-tech-accord-advancing-international-alignment-in-cybersecurity-regulation-to-strengthen-collective-resilience/">Statement from the Cybersecurity Tech Accord: Advancing International Alignment in Cybersecurity Regulation to Strengthen Collective Resilience </a> </p><ul><li><p>The Accord is calling on G7 and OECD to work together to better align regulations.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canada needs a secure-coding policy — and AI is making that more urgent]]></title><description><![CDATA[Software development is changing, and the government needs to respond]]></description><link>https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Fri, 27 Mar 2026 16:04:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/edb01877-f1d7-465f-978d-9ccc335732d7_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This article originally appeared in Digital Journal <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">here</a>.</p><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><p>The federal government spends approximately $6.8 billion on information and communications technology every year.</p><p>It contracts extensively with the private sector for software development, database administration, cybersecurity, and more, handling core Canadian services that include sensitive financial and health information. Despite the scale of that investment and the criticality of those systems, Canada does not have a secure-coding policy. That gap is getting harder to ignore.</p><p>Secure coding refers to a set of practices designed to instill security into software development from the start. Security educator Tanya Janca describes it as<a href="https://claude.ai/chat/URL"> &#8220;fostering a proactive, security-minded culture in software development teams&#8221;</a>. The goal is to eliminate bugs and exploits that expose sensitive data or allow threat actors into an application or network.</p><p>The stakes are real. On average,<a href="https://claude.ai/chat/URL"> Canadian businesses lose nearly $7 million per data breach</a>.<a href="https://claude.ai/chat/URL"> Total recovery costs from cybersecurity incidents exceeded $1.2 billion in 2023</a>. Secure coding is not yet standard practice across the industry, but the case for it is becoming more difficult to dismiss.</p><p>AI is a big reason why.</p><p><a href="https://claude.ai/chat/URL">PwC has found</a> that AI is already automating tasks previously performed by developers, driving labour reductions, and enabling smaller teams to deliver software-as-a-service models. The<a href="https://claude.ai/chat/URL"> Information and Communications Technology Council</a> finds that many junior-level tasks, including programming, are increasingly automated. As AI accelerates through the industry, the need for a clear market signal around secure development is growing.</p><p>That signal has not come.</p><p>AI is increasingly used in programming and operations despite ongoing debate about its reliability. Anthropic, the creator of the<a href="https://claude.ai/chat/URL"> Claude programming model</a>, has acknowledged that the model &#8220;frequently overstated findings and occasionally fabricated data during autonomous operations.&#8221; AI can be productive and transformative, but it is not infallible. In some cases, poorly developed models can obscure their own errors. Human-in-the-loop oversight is not optional; it is a necessary condition for responsible deployment.</p><p>The Government of Canada is the largest ICT client in the country. Adopting a secure-coding policy would be a significant market lever, establishing strict requirements for secure software development across all government contracts, not just IT contracts.</p><p>That matters not just for security, but for digital sovereignty. A secure-coding policy can help ensure that Canadian data used in software development is handled in accordance with Canadian law without cross-border data transfers that could compromise sovereignty when US infrastructure is involved.</p><p>This is not about constraining AI or slowing innovation. It is about ensuring that adoption meets a security and safety standard, one that allows the federal government to tell Canadians their data is protected.</p><p>Such a policy also fits squarely within<a href="https://claude.ai/chat/URL"> Canada&#8217;s National Cyber Security Strategy</a>. Pillar 2 seeks to make Canada a global cybersecurity industry leader by prioritizing trusted innovation and building a foundational workforce. Fostering secure-coding and secure-AI practitioners advances all three of those objectives.</p><p>Janca, a Canadian information security leader and secure-coding advocate, has initiated a<a href="https://claude.ai/chat/URL"> petition to the Government of Canada</a> calling on the federal government to adopt a secure-coding policy for all custom software systems. It is one of the clearest signals yet that the practitioner community sees this as urgent. Whether Ottawa is paying attention is another question.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Canadian Cyber in Context! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 21/03/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending March 21]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326</guid><pubDate>Mon, 23 Mar 2026 13:07:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3f1ebb4a-9065-4a7c-b58a-57c002774ed4_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have a new paper out with the Canadian Global Affairs Institute: </p><ul><li><p><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (Article on this coming soon)</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p>Bell to build 300MW Data centre in Saskatchewan</p><ul><li><p><a href="https://www.ctvnews.ca/business/article/bell-canada-to-build-300mw-data-centre-in-saskatchewan/">Bell Canada to build 300MW data centre in Saskatchewan</a></p></li><li><p><a href="https://www.bnnbloomberg.ca/investing/investor-outlook/2026/03/16/bell-plans-17b-ai-data-centre-in-saskatchewan-as-demand-for-computing-power-surges/">Bell plans $1.7B AI data centre in Saskatchewan as demand for computing power surges</a></p></li><li><p><a href="https://panow.com/2026/03/17/george-gordon-first-nation-excited-for-bell-canada-partnership-on-ai-data-centre/">George Gordon First Nation excited for Bell Canada partnership on AI data centre</a></p><ul><li><p>I have frequently said that Canada&#8217;s big telecoms are best positioned to enter the data centre game. Glad to see Bell leading the charge.</p></li><li><p>The tenants will be United States corporations &#8220;CoreWeave and Cerebras [which] will be bringing in the compute hardware to run the AI workloads in the data centre. If you take the $1.7 billion of direct Bell investment and consider the compute hardware the two tenants will bring, we&#8217;re talking essentially close to $12 billion of direct investment right here in the province.&#8221;</p><ul><li><p>This has major risk exposure under the US CLOUD Act, but unclear how much non-American data will be processed in this AI data centre.</p></li></ul></li></ul></li></ul></li><li><p><a href="https://www.bbc.com/news/articles/cqj9kgxqjwjo">Meta and TikTok let harmful content rise after evidence outrage drove engagement, say whistleblowers</a></p><ul><li><p>Whistleblowers confirming what we already knew.</p></li></ul></li><li><p>Bill C-22: <a href="https://archive.ph/uBKvM#selection-2489.0-2489.73">Lawful access bill could create vulnerabilities for hackers, experts warn</a></p><ul><li><p>One of the primary worries of Bill C-22 has been it could potentially enable the government to require integrating backdoors for easy lawful interception. Beyond the concerns that this could be abused, there is also major concerns that cyber threat actors, particularly China and Russia, could exploit this infrastructure.</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/opinion/editorials/article-secret-canada-dougs-transparent-cloak-of-self-serving-secrecy">Secret Canada: Doug&#8217;s transparent cloak of self-serving secrecy</a></p><ul><li><p>Doug Ford doesn&#8217;t want to be accountable and wants to hide what he is doing. Should we assume that Doug Ford&#8217;s office is engaged in illegal activities and that is why he does not want to release information?</p></li></ul></li><li><p><a href="https://news.gov.mb.ca/news/index.html?item=73120&amp;posted=2026-03-17">Manitoba Government Ending Predatory Pricing in Grocery Stores and Other Retail</a></p><ul><li><p>&#8220;Manitoba government has introduced an amendment to the Business Practices Act that would ban retailers from using consumers&#8217; personal data to increase the price of goods for a specific consumer&#8221;</p></li><li><p><a href="https://www.cbc.ca/news/canada/manitoba/bill-49-predatory-pricing-9.7131963">Manitoba bill goes after grocers using &#8216;predatory pricing&#8217; to charge some customers more online</a></p></li></ul></li><li><p><a href="https://www.theguardian.com/technology/2026/mar/18/instagram-to-remove-end-to-end-encryption-for-private-messages-in-may">Instagram to remove end-to-end encryption for private messages in May</a></p><ul><li><p>Meta will be ending end-to-end encryption in private messages. My only assumption can be that they will soon begin harvesting data from these messages to make a greater profit off of their users and occasionally for legal takedowns and removal of criminal content. </p></li></ul></li><li><p><a href="https://betakit.com/were-in-a-moment-in-canada-solomon-brings-ai-pitch-to-calgary/">&#8220;We&#8217;re in a moment in Canada&#8221;: Solomon brings AI pitch to Platform Calgary</a></p></li><li><p><a href="https://betakit.com/montreal-computer-scientist-gilles-brassard-wins-turing-award-for-quantum-discoveries/">Montr&#233;al computer scientist Gilles Brassard wins Turing Award for quantum discoveries</a></p><ul><li><p>A good reminder that Canada is the source for a lot of the most high-end and emerging quantum research that is helping Canada be amongst the leaders in quantum research and quantum applications.</p></li></ul></li><li><p><a href="https://betakit.com/manitoba-launches-ai-consultations-as-it-weighs-tougher-privacy-and-youth-protections/">Manitoba launches AI consultations as it weighs tougher privacy and youth protections</a></p><ul><li><p>Provinces will increasingly try to address the legal gap on AI as the federal government fails to enact regulations and laws to address the risks and threats of unmitigated AI.</p></li></ul></li><li><p><a href="https://www.theverge.com/tech/896490/google-replace-news-headlines-in-search-canary-coal-mine-experiment">Google Search is now using AI to replace headlines</a></p><ul><li><p>Google is destroying what turned it into a global giant.</p></li></ul></li><li><p><a href="https://betakit.com/1password-launches-new-platform-to-rein-in-companies-ai-agents/">1Password launches new platform to rein in companies&#8217; AI agents</a></p><ul><li><p>Securing AI agents is going to be massive business. Interesting to see 1Password getting in so early.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/corporate/reports-publications/departmental-plans/departmental-plan-2026-27.html">DND/CAF 2026-27 Departmental Plan</a></p><ul><li><p>DND/CAF releases its departmental plans. I am likely to do a long review of this and the departmental results for next month as I do every year.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/defence-investment-agency/news/2026/03/defence-investment-agency-announces-new-contract-for-surveillance-of-space-2-project.html">Defence Investment Agency announces new contract for Surveillance of Space 2 project</a></p><ul><li><p>DIA continues to be busy with space ISR projects.</p></li></ul></li><li><p><a href="https://vanguardcanada.com/c4isr-beyond-2026-highlights/">C4ISR &amp; Beyond 2026 Highlights</a></p><ul><li><p>Vanguard Canada summary of C4ISR and Beyond, a yearly conference on C4ISR and the CAF.</p></li><li><p>Canadian Cyber in Context subscribers can view and watch more <a href="https://www.cyberincontext.ca/p/missed-c4isr-and-beyond-dont-worry">here</a>.</p></li></ul></li><li><p><a href="https://www.cybersecuritydive.com/news/botnet-takedown-operation-us-canada-germany/815309/">US, Canada and Germany move to dismantle four high-volume IoT botnets</a></p><ul><li><p>Taking down botnets </p></li></ul></li><li><p><a href="https://bsky.app/profile/lukelebrun.ca/post/3mhminmy2ks2g">Individuals associated with Canadaland Podcast Allgedly Sends Phishing Emails with IP tracers to Journalists</a></p><ul><li><p>Developing story where it has been discovered that the Canadaland podcast worked with the Canadaland subreddit to create an IP tracer website and attempting to phish journalists to discover the ownership behind sock puppet accounts.</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/politics/article-canadians-face-tsunami-of-transnational-repression-in-coming-years/">Canadians face &#8216;tsunami&#8217; of transnational repression in coming years, cyber-research group says</a></p><ul><li><p>Ron Deibert and Citizen Lab providing testimony to House of Commons, this is coverage of that testimony.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/03/backgrounder-crtc-making-it-easier-to-connect-indigenous-communities-to-high-speed-internet-and-cellphone-services.html">CRTC making it easier to connect Indigenous communities to high-speed Internet and cellphone services</a></p></li><li><p><a href="https://www.canada.ca/en/canadian-heritage/news/2026/03/leaders-creators-and-innovators-come-together-at-canadas-first-ever-national-summit-on-artificial-intelligence-and-culture.html">Leaders, creators and innovators come together at Canada&#8217;s first-ever national summit on artificial intelligence and culture</a></p><ul><li><p>The first <a href="https://www.canada.ca/en/canadian-heritage/campaigns/ai-culture-summit.html">National Summit on Articial Intelligence and Culture</a> is held</p></li></ul></li><li><p><a href="https://ottawa.citynews.ca/2026/03/19/cost-of-federal-it-project-explodes-to-up-to-6-6-billion/">Cost of federal IT project explodes to up to $6.6 billion</a></p><ul><li><p>Not surprising. Ottawa has habitually underfunded such modernization efforts, so this is maybe a positive sign that the proper investment will occur.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-005-critical-vulnerability-impacting-microsoft-sharepoint-server-cve-2026-20963">Alert - AL26-005 &#8211; Critical vulnerability impacting Microsoft SharePoint Server &#8211; CVE-2026-20963</a></p></li><li><p><a href="https://hackread.com/shinyhunters-hackers-threat-stolen-salesforce-data/">ShinyHunters Hackers Threaten 400 Firms Over Stolen Salesforce Data</a></p><ul><li><p>ShinyHunters have seen increasing success lately. (See Telus)</p></li></ul></li><li><p><a href="https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/">Supply-chain attack using invisible code hits GitHub and other repositories</a></p><ul><li><p>A lot of supply chain attacks are hitting Github as both state actors and criminals see the potential to compromise github repositories as an attack vecture.</p></li></ul></li><li><p><a href="https://ctrlaltintel.com/threat%20research/FancyBear/#overview">FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</a></p><ul><li><p>Russian APT left open directories on a server with exploits and other major tools and information.</p></li></ul></li><li><p><a href="https://eclypsium.com/blog/condibot-monaco-malware-network-infrastructure/">New Malware Highlights Increased Systematic Targeting of Network Infrastructure</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/bitrefill-blames-north-korean-lazarus-group-for-cyberattack/">Crypto e-commerce platform Bitrefill accuses North Korea of stealing 18,500 purchase records</a></p><ul><li><p>Bitrefill can be used in Canada, so this has some impact on Canadians.</p></li></ul></li><li><p><a href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-campaign-targeting-enterprise-firewalls/">Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls</a></p></li><li><p>Vancouver-based <a href="https://www.globenewswire.com/news-release/2026/03/20/3259630/0/en/westport-s-statement-on-cybersecurity-incident.html">Westport Fuel System&#8217;s Statement on Cybersecurity Incident</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><a href="https://www.recordedfuture.com/blog/identity-trend-report-march-blog">Recorded Future 2025 Identity Threat Landscape Report</a></p><ul><li><p>Nice eye catching opener: &#8220;Credential theft is the dominant initial access vector for enterprise breaches.&#8221;</p></li></ul></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/ransomware-ttps-shifting-threat-landscape/">Google Threat Intelligence Group: Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape</a></p><ul><li><p>Report on the broader ransomware ecosystem.</p></li></ul></li><li><p><a href="https://blog.checkpoint.com/research/telegrams-crackdown-in-2026-and-why-cyber-criminals-are-still-winning/">Telegram&#8217;s Crackdown in 2026 and Why Cyber Criminals Are Still Winning</a> (h/t Catalin Cimpanu)</p><ul><li><p>More than 43.5 million channels were blocked in 2025,  but that has done little to stem the flow of criminal activity on Telegram.</p></li></ul></li><li><p>Michael Geist: <a href="https://www.michaelgeist.ca/2026/03/the-lawful-access-privacy-risks-unpacking-bill-c-22s-expansive-metadata-retention-requirements/">The Lawful Access Privacy Risks: Unpacking Bill C-22&#8217;s Expansive Metadata Retention Requirements</a></p></li><li><p><a href="https://cyberdefensereview.army.mil/CDR-Content/Articles/Article-View/Article/4434149/why-alignment-matters-cyber-capabilities-and-military-operational-schemes-in-al/">Why Alignment Matters: Cyber Capabilities and Military Operational Schemes in All-Domain Operations</a></p><ul><li><p>By the authors of cyber persistence theory. A great article.</p></li></ul></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:190770972,&quot;url&quot;:&quot;https://www.newsguardrealitycheck.com/p/china-pushes-pro-iran-war-claims&quot;,&quot;publication_id&quot;:2106147,&quot;publication_name&quot;:&quot;NewsGuard's Reality Check&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!aEFD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F841cf339-6e75-4ac6-b007-2659e14239ee_176x176.png&quot;,&quot;title&quot;:&quot;China Pushes Pro-Iran War Claims&quot;,&quot;truncated_body_text&quot;:&quot;Welcome to Reality Check, NewsGuard&#8217;s nonpartisan newsletter that tracks the false claims and conspiracy theories that shape our world &#8212; and who&#8217;s behind them. Support us by becoming a premium member or sharing our work.&quot;,&quot;date&quot;:&quot;2026-03-12T20:50:17.222Z&quot;,&quot;like_count&quot;:33,&quot;comment_count&quot;:0,&quot;bylines&quot;:[],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.newsguardrealitycheck.com/p/china-pushes-pro-iran-war-claims?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!aEFD!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F841cf339-6e75-4ac6-b007-2659e14239ee_176x176.png" loading="lazy"><span class="embedded-post-publication-name">NewsGuard's Reality Check</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">China Pushes Pro-Iran War Claims</div></div><div class="embedded-post-body">Welcome to Reality Check, NewsGuard&#8217;s nonpartisan newsletter that tracks the false claims and conspiracy theories that shape our world &#8212; and who&#8217;s behind them. Support us by becoming a premium member or sharing our work&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 months ago &#183; 33 likes</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:191463360,&quot;url&quot;:&quot;https://netaskari.substack.com/p/chinas-massive-data-leak-of-military&quot;,&quot;publication_id&quot;:3812955,&quot;publication_name&quot;:&quot;NetAskari&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BsZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;title&quot;:&quot;China's massive data leak of military secrets ?&quot;,&quot;truncated_body_text&quot;:&quot;About two months ago we saw a sales announcement on a dark web forum by a hacker that goes by the name of &#8220;airborneshark1\&quot;. It offered a massive data set of 10 Petabyte that was apparently extracted from the National Super Computer Center of China ( NSCC ) in Tianjin. It was re-upped again a few days ago, probably to drive up the bidding process. The fi&#8230;&quot;,&quot;date&quot;:&quot;2026-03-19T13:12:10.352Z&quot;,&quot;like_count&quot;:65,&quot;comment_count&quot;:6,&quot;bylines&quot;:[{&quot;id&quot;:43092822,&quot;name&quot;:&quot;NetAskari&quot;,&quot;handle&quot;:&quot;netaskari&quot;,&quot;previous_name&quot;:&quot;Marc Hofer&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;bio&quot;:&quot;Over 16 years of all sorts of journalism: wars, troubles and where the wild things are. If you have data or info to leak, use: deaddrop.netaskari.online.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-08-04T07:37:41.859Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-08-04T07:39:13.534Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:3887885,&quot;user_id&quot;:43092822,&quot;publication_id&quot;:3812955,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3812955,&quot;name&quot;:&quot;NetAskari&quot;,&quot;subdomain&quot;:&quot;netaskari&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Over 16 years of visual journalism from around the globe. I have always questions. &quot;,&quot;logo_url&quot;:null,&quot;author_id&quot;:43092822,&quot;primary_user_id&quot;:43092822,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-01-20T07:22:21.937Z&quot;,&quot;email_from_name&quot;:&quot;NetAskari &quot;,&quot;copyright&quot;:&quot;NetAskari&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;profile&quot;,&quot;is_personal_mode&quot;:true,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://netaskari.substack.com/p/chinas-massive-data-leak-of-military?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!BsZQ!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png" loading="lazy"><span class="embedded-post-publication-name">NetAskari</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">China's massive data leak of military secrets ?</div></div><div class="embedded-post-body">About two months ago we saw a sales announcement on a dark web forum by a hacker that goes by the name of &#8220;airborneshark1". It offered a massive data set of 10 Petabyte that was apparently extracted from the National Super Computer Center of China ( NSCC ) in Tianjin. It was re-upped again a few days ago, probably to drive up the bidding process. The fi&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">a month ago &#183; 65 likes &#183; 6 comments &#183; NetAskari</div></a></div><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://www.politico.eu/article/us-congress-judiciary-committee-big-tech-private-communication-eu-officials/">US Congress Judiciary committee demands Big Tech share private comms with EU officials</a></strong></p><ul><li><p>US politicians are demanding the communications of the European Commission related to enforcement of EU law. </p></li><li><p>This is a direct attack on European sovereignty. The US CLOUD Act makes this infinitely easier for them to do this. This is a warning shot and it will only get worse. </p></li></ul></li><li><p><a href="https://smucker.house.gov/media/in-the-news/politico-house-republicans-introduce-bill-go-after-canadas-online-streaming-act">House Republicans introduce bill to go after Canada&#8217;s Online Streaming Act</a></p><ul><li><p>This was inevitable and there are major problems with the Online Streaming Act, but new implications as Republicans and the United States continue to attack Canadian sovereignty.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/16/elon-musks-xai-faces-child-porn-lawsuit-from-minors-grok-allegedly-undressed/">Elon Musk&#8217;s xAI faces child porn lawsuit from minors Grok allegedly undressed</a></p></li><li><p><a href="https://www.forbes.com/sites/the-wiretap/2026/03/17/us-strikes-killed-iranian-cyber-chiefs-but-the-hacks-continued/">U.S Strikes Killed Iranian Cyber Chiefs, But The Hacks Continued</a></p><ul><li><p>Not all countries conduct cyber operations the same. To assume a strict command and control and to remove all an actor&#8217;s capabilities to take our leadership or the HQ is extreme naivety or ignorance.</p></li></ul></li><li><p><a href="https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government">Federal Cyber Experts Thought Microsoft&#8217;s Cloud Was &#8220;a Pile of Shit.&#8221; They Approved It Anyway.</a></p><ul><li><p>Kind of reminds me of a few other examples north of the United States. The Government of Canada loves to spend money on Microsoft cloud, including DND/CAF.</p></li></ul></li><li><p><a href="https://www.pogo.org/investigates/declassified-report-reveals-nsa-broke-surveillance-rules">Declassified Report Reveals NSA Broke Surveillance Rules</a></p><ul><li><p>And now we are supposed to believe they&#8217;ll follow the US CLOUD Act rules correctly? This is how they act regarding their own citizens personal information and data. They care even less about non-Americans data.</p></li></ul></li><li><p><a href="https://www.denverpost.com/2026/03/16/hacked-crosswalks-denver-donald-trump/">Hacked crosswalks in Denver claim &#8216;Trump murders children&#8217;</a></p><ul><li><p>Low level hacktivism</p></li></ul></li><li><p><a href="https://therecord.media/energy-department-set-to-release-first-ever-cyber-strategy">Energy Department set to release its first-ever cyber strategy</a></p><ul><li><p>I am of the opinion all departments should have a cyber strategy. Most will have some level of planning, but it&#8217;s a matter of how much leadership is engaged in this planning that also includes strategizing.</p></li></ul></li><li><p><a href="https://www.politico.com/news/2026/03/18/fbi-buying-data-track-people-patel-00834080">FBI is buying data that can be used to track people, Patel says</a></p><ul><li><p>Why request data through a process that may not be legal when the corporation will just sell you the data?</p></li></ul></li><li><p><a href="https://defensescoop.com/2026/03/12/cmmc-implementation-gao-report-kirsten-davies-dod-cio/">Watchdog urges DOD to address external factors affecting CMMC implementation</a></p><ul><li><p>CMMC is what CPCSC is modelled after, although it has begun to diverge enough to make CPCSC its own approach.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/20/cyberattack-on-vehicle-breathalyzer-company-leaves-drivers-stranded-across-the-us/">Cyberattack on vehicle breathalyzer company leaves drivers stranded across US</a></p><ul><li><p>An Insane story of what happens when critical services that work on behalf of the state fails in their cybersecurity. Appears to be affecting multiple states. </p></li></ul></li><li><p><a href="https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html">Customer Updates: Stryker Network Disruption</a></p><ul><li><p>Stryker providing updates on its recovery operations after the Iranian cyber attack.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/18/marquis-says-over-672000-people-had-personal-and-financial-data-stolen-in-ransomware-attack/">Marquis says over 672,000 people had personal and financial data stolen in ransomware attack</a></p><ul><li><p>A lot of fintech compromises of late, which are a favorite target of criminals.</p></li></ul></li><li><p><a href="https://therecord.media/offensive-cyber-white-house-hacking">White House pours cold water on cyber &#8216;letters of marque&#8217; speculation</a></p><ul><li><p>Senior officials finally made clear they were not interested in allowing private companies to conduct offensive cyber operations. With that said, this administration is now to change directions on a whim, misinformation, or current senile rambling of the president, so take this with a grain of salt.</p></li></ul></li><li><p><a href="https://www.whitehouse.gov/articles/2026/03/president-donald-j-trump-unveils-national-ai-legislative-framework/">President Donald J. Trump Unveils National AI Legislative Framework</a></p><ul><li><p>Six key objectives: Protecting Children and Empowering Parents; Safeguarding and Strengthening American Communities; Respecting Intellectual Property Rights and Supporting Creators; Preventing Censorship and Protecting Free Speech; Enabling Innovation and Ensuring American AI Dominance; Educating Americans and Developing an AI-Ready Workforce.</p></li></ul></li><li><p><a href="https://therecord.media/california-city-reports-ransomware-attack-la-metro">California city reports ransomware attack as LA transit agency finds &#8216;unauthorized activity&#8217;</a></p><ul><li><p>I get the sense that attacks on public organizations is on the rise.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><a href="https://securityaffairs.com/189585/security/eu-sanctions-chinese-and-iranian-actors-over-cyberattacks-on-critical-infrastructure.html">EU sanctions Chinese and Iranian actors over cyberattacks on critical infrastructure</a></p><ul><li><p>Sanctioning a few companies and individuals.</p></li></ul></li><li><p><a href="https://www.gov.uk/government/news/new-disruption-unit-launched-in-crackdown-on-fraud">New UK disruption unit launched in crackdown on fraud</a></p><ul><li><p>UK investing $250 over 3 years into new Online Crime Centre.</p></li></ul></li><li><p><a href="https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/">Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild</a></p><ul><li><p>Another major iphone exploit tool found in the wild used by Russia.</p></li></ul></li><li><p><a href="https://therecord.media/russia-hackers-ukraine-zimbra-breach">Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency</a></p><ul><li><p>Cyber conflict remains active between Russia and Ukraine</p></li></ul></li><li><p><a href="https://www.belganewsagency.eu/belgium-launches-secure-messaging-app-for-government-staff">Belgium launches secure messaging app for government staff</a></p><ul><li><p>With how much no one can rely upon US-based apps and infrastructure, I am not surprised by this move.</p></li></ul></li><li><p>(Google Translated Title) <a href="https://www.lemonde.fr/international/article/2026/03/19/stravaleaks-le-porte-avions-charles-de-gaulle-localise-en-temps-reel-par-le-monde-grace-a-l-application-de-sport_6672445_3210.html">The aircraft carrier &#8220;Charles de Gaulle&#8221; located in real time by &#8220;Le Monde&#8221; thanks to the sports app</a></p><ul><li><p>&#171; StravaLeaks &#187; : le porte-avions &#171; Charles-de-Gaulle &#187; localis&#233; en temps r&#233;el par &#171; Le Monde &#187; gr&#226;ce &#224; l&#8217;application de sport</p></li><li><p>An every present problem for state defence and national security institutions. This has been a problem since the late 2000s with US forces in Iraq and Afghanistan. This is a known issue that I would wager a guess that all NATO countries have a policy about.</p></li></ul></li><li><p><a href="https://tvpworld.com/92030219/ukraine-cyber-ops-caused-220-mln-damage-to-russia">Cyber attacks inflicted $220 mln losses on Russia, says Kyiv</a></p><ul><li><p>Indirect losses amount to approximately $1.5 billion. </p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/09/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn/">Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn</a></p><ul><li><p>Encrypted messaging apps will always be a top target.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><a href="https://digg.com/">Digg Shut Down due to Bot Problem</a></p><ul><li><p>This is just the beginning. This will continue to be a problem as many social media platforms </p></li></ul></li><li><p><a href="https://www.nippon.com/en/news/yjj2026031701011/">Japan to Begin Active Cyber Defense Operations in Oct.</a></p><ul><li><p>CAFCYBERCOM has increasingly been cooperating with many Indo-Pacific countries including Japan as part of greater Canadian presence in the Indo-Pacific. </p></li><li><p><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2025/08/masakari-25-canadian-japanese-militaries.html">CAFCYBERCOM and JDF conducted joint defensive cyber operations in 2025.</a></p></li></ul></li><li><p><a href="https://www.upguard.com/news/royal-bahrain-hospital-data-breach-2026-03-17">Payload Claims Data Breach on Royal Bahrain Hospital (RBH)</a></p><ul><li><p>Noteworthy for its target as Bahrain is amongst the targets for Iranian drones and reprisal attacks due to the United States and Israel&#8217;s attack on Iran.</p></li></ul></li><li><p><a href="https://www.linuxfoundation.org/press/linux-foundation-announces-12.5-million-in-grant-funding-from-leading-organizations-to-advance-open-source-security">Linux Foundation Announces $12.5 Million in Grant Funding from Leading Organizations to Advance Open Source Security</a></p><ul><li><p>Great to see this. Open source software is a massive target for APTs and cyber threat actors and a major ecosystem change needs to happen to better protect open source software.</p></li></ul></li><li><p><a href="https://services.google.com/fh/files/newsletters/industryaccord.pdf">Industry Accord Against Online Scams &amp; Fraud</a></p><ul><li><p>A group of major multinational corporations have signed an accord to word together and fight online scams and fraud.</p></li><li><p>Signatories so far include: Adobe, Pinterst, Google, OpenAI, LinkedIn, Match Group, Meta, Amazon, Microsoft, Target, Levi Strauss &amp; Co.</p></li></ul></li><li><p><a href="https://www.eff.org/deeplinks/2026/03/blocking-internet-archive-wont-stop-ai-it-will-erase-webs-historical-record">Blocking the Internet Archive Won&#8217;t Stop AI, But It Will Erase the Web&#8217;s Historical Record</a></p><ul><li><p>Internet Archive is increasingly being blocked as part of sweeping efforts to block website scraping, particularly to prevent AI and LLMs.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 14/03/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending March 14]]></description><link>https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326</guid><pubDate>Mon, 16 Mar 2026 15:15:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4125864a-26c9-4469-869b-4cd8ac6162d1_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (Article on this coming soon)</p><p></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/">Telus Digital confirms breach after hacker claims 1 petabyte data theft</a></p><ul><li><p>A <strong>PETABYTE</strong> of data. Telus Digital confirms one of the largest data thefts in history. ShinyHunters have claimed resonsibility. This is a massive mess up by Telus Digital to allow this much data to be exfiltrated. While Telus cannot be blamed for ShinyHunters getting access via a supply chain attack, but there should have been controls and monitoring to prevent this much theft to occur. </p></li></ul></li><li><p><a href="https://www.scc-csc.ca/cases-dossiers/search-recherche/41538/">Supreme Court of Canada hearing in Facebook v Privacy Commissioner is on March 19</a></p><ul><li><p>Supreme Court case concerning whether Facebook breached PIPEDA related to the Cambridge Analytica scandal. </p></li></ul></li><li><p><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/03/canada-and-global-partners-advance-6g-security-and-resilience-at-mobile-world-congress.html">Canada and global partners advance 6G security and resilience at Mobile World Congress</a></p><ul><li><p>Western countries learned after what happened with 5G and China and are much more active in developing future protocols. </p></li></ul></li><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/03/minister-sidhu-concludes-productive-meeting-on-comprehensive-economic-and-trade-agreement-with-european-union-in-toronto.html">Minister Sidhu concludes productive meeting on Comprehensive Economic and Trade Agreement with European Union in Toronto</a></p><ul><li><p>This has a lot of potential implications. The EU is potentially even more concerned about digital sovereignty than Canada, so improving Canada-EU digital trade would be great to grow Canadian cyber industry in the EU. </p></li></ul></li><li><p><a href="https://www.thecanadianpressnews.ca/science/bell-teams-up-with-coveo-to-modernize-digital-services-for-ottawa-provinces/article_2ee10da9-3450-5e59-8bed-ec6bece94134.html">Bell teams up with Coveo to modernize digital services for Ottawa, provinces</a></p></li><li><p><a href="https://www.tradecommissioner.gc.ca/en/our-solutions/support-programs/canadian-technology-accelerators/cybersecurity-enterprise-ai-silicon-valley.html">Cybersecurity and Enterprise AI: Silicon Valley Canadian Technology Accelerator</a></p><ul><li><p>Trade Commissioner and a group of Canadian cyber firms are headed to RSAC</p></li></ul></li><li><p><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/03/minister-jolys-statement-on-the-outcome-of-the-further-national-security-review-of-tiktok-technology-canada-inc-under-the-investment-canada-act.html">Minister Joly&#8217;s statement on the outcome of the further national security review of TikTok Technology Canada Inc. under the Investment Canada Act</a></p><ul><li><p>Government of Canada says jk, nevermind, TikTok is cool now as long as Americans are harvesting and exploiting our data instead of China.</p></li></ul></li><li><p><a href="https://toronto.citynews.ca/2026/03/10/loblaw-says-some-customers-affected-by-data-breach/">Loblaw says some customers affected by data breach</a></p><ul><li><p>&#8220;Low-level data breach&#8221; is an interesting phrasing here. A &#8220;criminal third-party&#8221; accessed names, phone numbers, and emails. Sounds like they&#8217;re trying to downplay this breach.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/national-research-council/news/2026/03/canada-advances-defence-industrial-strategy-to-strengthen-security-sovereignty-and-prosperity.html">Canada advances Defence Industrial Strategy to strengthen security, sovereignty and prosperity</a></p><ul><li><p>Largely for innovation overall, but part of this does go to cyber and ICT.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/atlantic-canada-opportunities/news/2026/03/projects-supporting-the-growth-of-atlantic-canadas-artificial-intelligence-ecosystem.html">Projects supporting the growth of Atlantic Canada&#8217;s artificial intelligence ecosystem</a></p><ul><li><p>This is the list of projects/businesses through the government&#8217;s $8.5 million investment into AI, which includes a handful of cybersecurity</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11719238/satellite-communications-defence-telesat-low-orbit/">Satellites are Canada&#8217;s next sovereignty frontier as global &#8216;race&#8217; heats up</a></p><ul><li><p>I have been saying for a while now that Canada has a really strong domestic space defence industry.</p></li></ul></li><li><p><a href="https://www.priv.gc.ca/en/opc-news/news-and-announcements/2026/nr-c_260312/">Privacy Commissioner of Canada tables in Parliament Special Report on ArriveCAN app investigation</a></p><ul><li><p>The special report can be read <a href="https://www.priv.gc.ca/en/opc-actions-and-decisions/ar_index/202526/sr_pa_20260312_arrivecan/">here</a>. The investigation was based on a complaint that the contractor did not have appropriate security clearances. OPC found the complaint is &#8220;not well-founded,&#8221; however they did find some deficiencies and provided recommendations for improvements.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/03/turning-intent-into-action.html">Turning intent into action: inside CAFCYBERCOM&#8217;s Command Evolution Team</a></p><ul><li><p>Article from CAFCYBERCOM Public Affairs Officer on the standing up of CAFCYBERCOM.</p></li></ul></li><li><p><a href="https://flickr.com/photos/cafcombatcameradecombatfac/albums/72177720331541726/">Pictures from CAFCYBERCOM&#8217;s Military Cyber Security Operations Course Philippines 2026</a></p></li><li><p><a href="https://betakit.com/xanadu-in-talks-with-government-over-potential-390-million-for-domestic-quantum-manufacturing/">Xanadu in talks with government over potential $390 million for domestic quantum manufacturing</a></p><ul><li><p>This would be a big win for Canada. There&#8217;s limited quantum manufacturing in Canada right now, but it has been <a href="https://quantumcomputingreport.com/pasqal-opens-quantum-processor-factory-in-quebec-and-sells-100-qubit-system-to-distriq/">slowly growing over the past couple of years</a> and is a great potential area for growth.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/canadian-heritage/news/2026/03/government-of-canada-reconvenes-the-expert-advisory-group-on-online-safety.html">Government of Canada reconvenes the expert advisory group on online safety</a></p><ul><li><p>Kind of makes you wonder why they decided to not convene it until now.</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11720041/ontario-health-athome-ransomware/">Ontario health agency vendor suffered major ransomware attack in 2025</a></p><ul><li><p>This really highlights the major gaps in cybersecurity regulations and reporting in Canada.</p></li></ul></li><li><p>Government Reintroduces Bill C-22: <a href="https://www.canada.ca/en/public-safety-canada/news/2026/03/canada-introduces-new-tools-for-law-enforcement-to-investigate-threats-and-keep-canadians-safe.html">Canada introduces new tools for law enforcement to investigate threats and keep Canadians safe</a></p><ul><li><p>Some news coverage:</p><ul><li><p><a href="https://globalnews.ca/news/11727555/canada-lawful-access-bill-liberals/">Police will get new powers for online data in tweaked &#8216;lawful access&#8217; bill</a></p></li><li><p><a href="https://www.cbc.ca/news/politics/lawfull-access-legislation-liberal-9.7125891">New lawful access bill would give police, CSIS more powers to track suspects online</a></p></li><li><p>The scope of data retention is clarified: only prescribed metadata may be retained for up to one year, excluding content, browsing history, and social media activity.</p></li></ul></li></ul></li><li><p><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/03/crtc-eliminates-fees-to-make-it-easier-to-switch-internet-and-cellphone-plans.htm2">CRTC eliminates fees to make it easier to switch Internet and cellphone plans</a></p><ul><li><p>Every so often the CRTC makes some good decisions for the consumer. Part of CRTC&#8217;s overall <a href="https://crtc.gc.ca/eng/internet/protection.htm">Consumer Protections Action Plan</a>.</p></li></ul></li><li><p><a href="https://senparlvu.parl.gc.ca/Harmony/en/PowerBrowser/PowerBrowserV2?fk=687346&amp;">Standing Senate Committee on Social Affairs, Science and Technology</a></p><ul><li><p>Canadian Senate studying impacts of AI in Canada</p></li></ul></li><li><p><a href="https://news.ontario.ca/en/release/1007160/ontario-updating-cyber-security-privacy-and-access-framework-to-align-more-closely-with-jurisdictions-across-canada">Ontario Updating Cyber Security, Privacy and Access Framework to Align More Closely with Jurisdictions Across Canada</a></p><ul><li><p>Privacy and cyber security laws are not uniform across Canada, with Quebec having the most modern/up to date laws, so there&#8217;s a lot of incongruency across the provinces.</p></li></ul></li><li><p><a href="https://www.coalitioninc.com/en-ca/announcements/Coalition-Enters-Excess-Cyber-Insurance-Market-in-Canada">Coalition Enters Excess Cyber Insurance Market in Canada</a></p><ul><li><p>US-Based Coalition announces expansion into excess cyber insurance market in Canada. I&#8217;m honestly not a big fan of cyber insurance and think it can excerbate many problems.</p></li></ul></li><li><p><a href="https://rhisac.org/press-release/rcc-partnership/">Retail &amp; Hospitality ISAC and Retail Council of Canada Announce Strategic Partnership to Strengthen Cybersecurity Across Canadian Retail Sector</a></p><ul><li><p>Retail &amp; Hospitality Information Sharing and Analysis Center (RH-ISAC) and Retail Council of Canada is a partnership I am surprised isn&#8217;t done more with other trade associations. This is an easy path for any trade association to take to specifically address the cyber needs of their sector.</p></li></ul></li></ul><p>Read my analysis of sovereign cloud RFI and what it tells us about the Government of Canada's direction on sovereign cloud:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;65a9998c-1318-405a-8816-1eb9171b8fc1&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Canadian Government Provides Next Steps to Sovereign Cloud&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-06T21:26:56.872Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e1b4c37-bc01-4aa1-bda3-90650e2d1f9d_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-government-provides-next&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:190047079,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:3,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://hackread.com/shinyhunters-hackers-threat-stolen-salesforce-data/">ShinyHunters Hackers Threaten 400 Firms Over Stolen Salesforce Data</a></p><ul><li><p>ShinyHunters have seen increasing success lately. (See Telus)</p></li></ul></li><li><p><a href="https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/">Supply-chain attack using invisible code hits GitHub and other repositories</a></p><ul><li><p>A lot of supply chain attacks are hitting Github.</p></li></ul></li><li><p><a href="https://blog.barracuda.com/2026/03/16/sandworm--russia-s-global-infrastructure-wrecking-crew">Sandworm: Russia&#8217;s global infrastructure wrecking crew</a></p><ul><li><p>Decent CTI profile on Sandworm/APT44</p></li></ul></li><li><p><a href="https://blog.checkpoint.com/research/global-cyber-attacks-remain-near-record-highs-in-february-2026-despite-ransomware-decline/">Global Cyber Attacks Remain Near Record Highs in February 2026 Despite Ransomware Decline</a></p><ul><li><p>Checkpoint says Canada ranks second worldwide in ransomware. This isn&#8217;t good.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><a href="https://canadianshieldinstitute.ca/latest-updates/f/briefing-note-quebecs-sovereign-it-policy">Briefing Note: Quebec&#8217;s Sovereign IT Policy</a></p><ul><li><p>Briefing note on Quebec&#8217;s Digital Sovereignty and IT Procurement Policy by Emily Osborne @ Canadian Shield Institute</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/business/commentary/article-big-tech-digital-ai-privacy/">As U.S. state and Big Tech become one, we become digital serfs, and it sucks</a></p><ul><li><p>Opinion piece by Vass Bednar, Managing Director of the Canadian Shield Institute</p></li></ul></li><li><p><a href="https://aicompetitiveness.ca/assets/Sovereign-by-Design-Full-Report-2026.pdf">Sovereign by Design: Strategic Options for Canadian AI Sovereignty</a></p><ul><li><p>Report on options to develop sovereign AI in Canada by former government bureaucrat who had a large role in the government&#8217;s policy, Jaxson Khan, and former Trudeau economic advisor Sean Mullin</p></li></ul></li><li><p>Event: <a href="https://us06web.zoom.us/webinar/register/3317720436685/WN_0MsezgsJQzOckoZ4mcDAuQ#/registration">Rogers Cybersecure Catalyst is hosting a Defence Sector 101</a></p><ul><li><p>Hosted by Daniel Blanc, former CAFCYBERCOM. If you are in the cyber sector and curious about defence, this is one not to miss.</p></li></ul></li><li><p><a href="https://www.theatlantic.com/magazine/2026/04/ai-data-centers-energy-demands/686064/">Inside the Dirty, Dystopian World of AI Data Centers</a></p><ul><li><p>There&#8217;s a massive demand for cloud and AI data centres, but there&#8217;s a major social, environmental, and health impact on humans.</p></li></ul></li><li><p><a href="https://www.cpac.ca/public-record/episode/panel-discussion-on-canadas-ai-strategy-consultations?id=135866a5-001e-4501-893c-0a7e84007387">Panel Discussion on Canada&#8217;s AI Strategy Consultations</a></p><ul><li><p>&#8220;Industry experts gather in Ottawa to discuss the findings of the federal government&#8217;s recent public consultations on Canada&#8217;s national artificial intelligence (AI) strategy. This panel discussion features Erin Kelly (Advanced Symbolics Inc.), Michael Geist (University of Ottawa), and Jaxson Khan (Aperture AI). The event is hosted by the Canadian Internet Society and is moderated by Brent Arnold, the society&#8217;s chair. Katie Preiss (TELUS) provides opening remarks.&#8221;</p></li></ul></li><li><p><a href="https://direct.mit.edu/isec/article/50/3/86/135683/Deception-and-Detection-Why-Artificial">Deception and Detection: Why Artificial Intelligence Empowers Cyber Defense over Offense</a></p><ul><li><p>Article by Lennart Maschmeyer, easily one of the best academics doing research on cyber conflict. (Even though we disagree on a lot)</p></li></ul></li><li><p><a href="https://tboteproject.com/">Age Verification Lobbying: Dark Money, Model Legislation &amp; Institutional Capture</a></p><ul><li><p>An investigation has found Meta and other social media companies behind a major push to lobby governments to shift age verification from websites to app stores.</p></li></ul></li></ul><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://archive.ph/dDwdY">Whistleblower claims ex-DOGE member says he took Social Security data to new job</a></p><ul><li><p>I would not be surprised if this turned out to be true with how terrible DOGE was at security and ruining everything it touched.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/09/an-iphone-hacking-toolkit-used-by-russian-spies-likely-came-from-u-s-military-contractor/">An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor</a></p><ul><li><p>Likely designed by L3Harris. L3Harris has a pretty big presence in Canada, but it is unclear if they sell exploits to Canada. I have been trying to learn just to what degree Canada purchases exploits from private sellers the past few years with nothing coming up yet, but that does not mean it is not occurring. </p></li><li><p>An L3Harris executive was sentenced to 7 years in prison for selling zero-days to Russian Operation Zero. There are some suspicions that he also sold this toolkit, which is also being used by Trickbot ransomware.</p></li><li><p><a href="https://arstechnica.com/security/2026/03/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities/">Feds take notice of iOS vulnerabilities exploited under mysterious circumstances</a></p><ul><li><p>This is the Coruna exploit mentioned above.</p></li></ul></li></ul></li><li><p><a href="https://www.404media.co/viral-quittr-porn-addiction-app-exposed-the-masturbation-habits-of-hundreds-of-thousands-of-users/">Viral &#8216;Quittr&#8217; Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users</a></p><ul><li><p>From the author of this story: &#8220;these kids are making Ferrari money telling people to use their app in order to stop watching porn, but they exposed their most intimate data and then lied to me about it&#8221;</p></li></ul></li><li><p><a href="https://therecord.media/rudd-confirmed-nsa-cyber-command-chief">Rudd confirmed to head NSA, Cyber Command after near year-long vacancy</a></p></li><li><p><a href="https://www.gao.gov/products/gao-26-108685">Cybersecurity Regulations: Additional Industry Perspectives on the Impact, Progress, Challenges, and Opportunities of Harmonization</a></p><ul><li><p>GAO report on cybersecurity regulations in the US</p></li></ul></li><li><p><a href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/">Iranian Hacktivists Strike Medical Device Maker Stryker in &#8220;Severe&#8221; Attack that Wiped Systems</a></p><ul><li><p>Major attack on Stryker affecting global operations in US, Australia, India, Ireland.</p></li></ul></li><li><p><a href="https://cyberscoop.com/us-state-department-data-sovereignty-myth-op-ed/">No, it&#8217;s not &#8216;unnecessarily burdensome&#8217; to control your own data</a></p><ul><li><p>No one is believing the State department&#8217;s efforts to undermine digital sovereignty.</p></li></ul></li><li><p><a href="https://therecord.media/235000-affected-cyberattack-ambulance-provider">235,000 affected by cyberattack on largest ambulance provider in Wisconsin</a></p><ul><li><p>A lot of critical information stolen in this attack.</p></li></ul></li><li><p><a href="https://www.malwarebytes.com/blog/data-breaches/2026/03/hackers-may-have-breached-fbi-wiretap-network-via-supply-chain">Hackers may have breached FBI wiretap network via supply chain</a></p><ul><li><p>A lot of organizations getting hit with supply chain attacks at the moment.</p></li></ul></li><li><p><a href="https://therecord.media/new-data-shows-increase-fbi-searches-on-americans">Exclusive: New data shows increase in FBI searches of Americans&#8217; data last year</a></p><ul><li><p>Not a surprise at all. This will continue and I worry it will eventually increase in targeting non-Americans.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/">Starbucks discloses data breach affecting hundreds of employees</a></p><ul><li><p>Unclear how much and who are affected so far, could potentially include Canada.</p></li></ul></li></ul><div><hr></div><h3>United Kingdom and European Union News</h3><ul><li><p><a href="https://therecord.media/finnish-intel-warns-espionage-china-russia">Finnish intelligence warns of persistent cyber espionage from Russia, China</a></p></li><li><p><a href="https://www.corkbeo.ie/news/local-news/cork-stryker-plants-hit-suspected-33571864">Cork Stryker plants hit by suspected global Iranian-linked cyberattack</a></p><ul><li><p>Appears to be hitting global operations. This comany makes medical devices include defribulators. </p></li></ul></li><li><p><a href="https://www.theregister.com/2026/03/11/swiss_evote_usb_snafu/">Swiss e-voting pilot can&#8217;t count 2,048 ballots after USB keys fail to decrypt them</a></p><ul><li><p>Technical errors are dooming this test in e-voting.</p></li></ul></li><li><p><a href="https://www.manchestereveningnews.co.uk/news/uk-news/lloyds-issues-apology-after-bank-33579221">Lloyds issues apology after Bank of Scotland and Halifax bank customers &#8216;see other people&#8217;s transactions&#8217;</a></p><ul><li><p>Reason doesn&#8217;t seem to be clear yet, but investigation is ongoing.</p></li></ul></li><li><p><a href="https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament">Iran-linked hackers claim cyberattack on Albania&#8217;s parliament email systems</a></p></li><li><p><a href="https://thedefensepost.com/2026/03/11/germany-british-hacking-program/">German Military University Adopts British Defense Hacking Program</a></p><ul><li><p>&#8220;London-based Common Mission Project UK has announced the launch of its Hacking for Defense academic program in Germany in partnership with the University of the Bundeswehr Munich, marking the initiative&#8217;s first deployment in continental Europe.&#8221;</p></li></ul></li><li><p><a href="https://www.reuters.com/world/poland-says-foiled-cyberattack-nuclear-centre-may-have-come-iran-2026-03-12/">Poland says foiled cyberattack on nuclear centre may have come from Iran</a></p><ul><li><p>Hard to say how much of this is scare mongering, but Iran will be looking for any potential vulneraiblity just like Russia right now.</p></li></ul></li><li><p><a href="https://theins.press/en/inv/290235">Lost in translation: How Russia&#8217;s new elite hit squad was compromised by an idiotic lapse in tradecraft</a></p><ul><li><p>Understanding tradecraft is important to understanding many dynamics to international cyber conflict.</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/world/article/moscow-businesses-struggle-as-russia-restricts-cellphone-internet-services/">Moscow businesses struggle as Russia restricts cellphone internet services</a></p><ul><li><p>The article tries to frame this as Russia is increasingly trying to roll back the Internet in the country so that they eventually have their own <a href="https://en.wikipedia.org/wiki/Great_Firewall">Great Firewall of China</a>. In reality, it is more likely to do with preventing use of mobiel internet by Ukraine. I have seen some rumors of other concerns related to a coup, but nothing official yet.</p></li></ul></li><li><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-and-international-partners-disrupt-socksescort-proxy-service">Europol and international partners disrupt &#8216;SocksEscort&#8217; proxy service</a></p><ul><li><p>Paid criminal proxy service taken down: <a href="https://techcrunch.com/2026/03/12/law-enforcement-shuts-down-botnet-made-of-tens-of-thousands-of-hacked-routers/">Law enforcement shuts down botnet made of tens of thousands of hacked routers</a></p></li></ul></li><li><p><a href="https://www.spiegel.de/politik/deutschland/spionage-ehemaliger-bnd-vize-wird-opfer-von-cyberangriff-a-3fb118d6-b740-4e09-bfa2-6bf67c3fd1e9">Cyberattack against former BND vice president</a></p><ul><li><p>Former high-ranking official falls for Signal spear-phishing</p></li></ul></li><li><p><a href="https://office.eu/media/pressrelease-20260304">Office.eu officially launches in The Hague as Europe&#8217;s fully sovereign office platform</a></p><p></p></li></ul><div><hr></div><h3>Other News</h3><ul><li><p><a href="https://www.theguardian.com/global-development/2026/mar/12/invasive-ai-led-mass-surveillance-in-africa-violating-freedoms-warn-experts">&#8216;Invasive&#8217; AI-led mass surveillance in Africa violating freedoms, warn experts</a></p><ul><li><p>Where Authoritarian and dictatorial people operate, spyware and AI-led surveillance will follow.</p></li></ul></li><li><p><a href="https://www.404media.co/ai-is-african-intelligence-the-workers-who-train-ai-are-fighting-back/https://www.404media.co/ai-is-african-intelligence-the-workers-who-train-ai-are-fighting-back/">&#8216;AI Is African Intelligence&#8217;: The Workers Who Train AI Are Fighting Back</a></p><ul><li><p>Fantastic reporting here. AI is based on data, but not just any data, AI requires good data. To ensure the data that AI is trained on is good, reliable, and accurate requires a lot of labour, which can be both physically and mentally taxing. </p></li></ul></li><li><p>Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone</p><ul><li><p>Verifone has not reported a breach yet, but Stryker is already making a lot of headlines (noted above).</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Compliance is Cash - Where to Begin with CPCSC]]></title><description><![CDATA[The Canadian Program for Cyber Security Certification can be overwhelming, so let us start with the basics]]></description><link>https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Tue, 10 Mar 2026 12:02:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><h5 style="text-align: center;">The Canadian Program for Cyber Security Certification (CPCSC) is still in development and is subject to change. The information in this will be updated as the CPCSC Secretariat releases more information.</h5><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XZt0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XZt0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 424w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 848w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 1272w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XZt0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png" width="466" height="406" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:406,&quot;width&quot;:466,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:65975,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/189788422?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17dd211e-4c80-4bb5-be88-5f039faeee46_500x500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XZt0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 424w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 848w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 1272w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;m <a href="https://www.linkedin.com/in/altechguy/">Andrew Laliberte</a>. For years, I worked inside the Canadian Armed Forces and Department of National Defence networks, deploying and sustaining technical capabilities under strict governance, risk, and compliance constraints. It was not glamorous work. It was long hours, rapid learning curves, and constant pressure to keep complex systems stable in environments where resources were scarce and the rules were rigid&#8230; except when they weren&#8217;t.</p><p>That experience gave me something invaluable. A practical understanding of how compliance frameworks shape architecture, operations, procurement, and organizational survival.</p><p>Today, I work with organizations across the defence industrial base (DIB), from primes to specialized subcontractors, who are entering a new era. An era where compliance is not optional, not theoretical, and not negotiable.</p><p>Here is what many still miss.</p><p>Compliance is no longer a checkbox buried in the back of a contract.<br>In the defence industrial base, it is becoming the price of entry.</p><p>The defence industrial base is becoming one of the most compliance-driven sectors in North America. While it may not entail the liquidity and capital controls of banking, its cybersecurity requirements are increasingly mandatory, enforceable, and directly tied to revenue.</p><p>Over the next few years, mandatory frameworks like CMMC in the United States and Canada&#8217;s evolving CPCSC requirements will determine who can bid, who can handle controlled information, and ultimately who gets paid.</p><p>Compliance is not just a cost center.<br>Done properly, it is a market filter.<br>Market filters create competitive advantage.</p><p>This series breaks down what the coming compliance landscape means for your business and how to turn governance requirements into strategic leverage.</p><p>Because in the DIB, compliance is not paperwork.</p><p>It is cash.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h1>The 101 on CPCSC Level 1</h1><h2><strong>Who</strong></h2><p>Program governance is distributed across federal authorities:</p><p>&#8226; Program Manager: <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada.html">Public Services and Procurement Canada (PSPC)<br></a>&#8226; Defence Authority: <a href="https://www.canada.ca/en/department-national-defence.html">Department of National Defence (DND)<br></a>&#8226; Standards Development: <a href="https://www.cyber.gc.ca/en">Canadian Centre for Cyber Security (CCCS)<br></a>&#8226; Accreditation Authority: <a href="https://scc-ccn.ca/">Standards Council of Canada (SCC)</a></p><h2><strong>What</strong></h2><p>The Canadian Program for Cyber Security Certification (CPCSC) is the Government of Canada&#8217;s official cybersecurity certification program for defence suppliers.</p><p>It safeguards unclassified Specified/Sensitive Information that flows from federal departments to industry under defence contracts.</p><p>Specified/Sensitive Information is categorized as:</p><p>&#8226; SI Low<br>&#8226; SI Medium<br>&#8226; SI High</p><p>These categories align with specified/sensitive information data types such as <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/safeguarding-equipment-sites-assets-information/levels-security.html">Protected A, Protected B</a>, and certain Controlled Goods contexts, as well as several others. Organizations must understand how their data maps to these operational impact levels.</p><h2><strong>When</strong></h2><p>Beginning in Spring 2026, PSPC will introduce contractual language requiring self-attested CPCSC Level 1 compliance for award on most DND contracts.</p><h2><strong>Where</strong></h2><p>If non-commercial off-the-shelf (COTS)  activity or Specified/Sensitive Information (SI) is involved, CPCSC applicability and level will be determined through the Industry Contract Cyber Security Risk Assessment, CCSRA.</p><p>SI Low, aligned to CPCSC Level 1, includes:</p><p>&#8226; <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/safeguarding-equipment-sites-assets-information/levels-security.html">Protected A information</a><br>&#8226; Low sensitivity Dual Use Goods technical data<br>&#8226; Non-critical sensitive supplier financial information<br>&#8226; Low sensitivity procurement documentation such as RFQs, purchase orders, and schedules</p><h2><strong>Why</strong></h2><p>CPCSC is Canada&#8217;s response to systemic cybersecurity risk across the Defence Industrial Base. It marks a shift from compliance on paper to structured, enforceable cybersecurity maturity requirements.</p><p>Three realities drive this shift.</p><ul><li><p>The threat environment has evolved. Smaller subcontractors are often the easiest path into larger defence programs.</p></li><li><p>Self-attestation alone proved insufficient. Documentation did not always reflect operational reality.</p></li><li><p>Verification is now built into the model, but in a graduated form. Level 1 remains self-attested. Levels 2 and 3 introduce formal assessments to validate implementation and operational effectiveness.</p></li></ul><p>The direction is clear. Canada is moving toward higher assurance requirements for higher sensitivity work.</p><p>Cybersecurity in Canadian defence contracting is no longer an honour system. It is becoming a tiered eligibility framework.</p><p>For DIB firms, CPCSC is not a policy update. It is a structural shift in how eligibility, competitiveness, and trust are determined.</p><p>Those who treat compliance strategically will find it does more than protect contracts.</p><p>It positions them to win.</p><h2><strong>How</strong></h2><p>The best way to keep your costs and timelines down is accurate scoping.  You must first identify the systems, services, people, and workflows that touch defence contracts or Specified/Sensitive Information.</p><p>Once scoped, apply the <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada/cyber-security-certification-level1.html">13 CPCSC Level 1 controls</a> to that environment and build a controlled operating model that integrates people, process, policy, facilities, and technology.</p><p>Level 1 is not advanced security engineering.<br>It is just the minimum acceptable standard in 2026.</p><p>In 2026, we are 38 years removed from the first major internet worm (Morris Worm). Thirty-eight years of warnings. Thirty-eight years of incidents. Thirty-eight years to get the basics right.</p><p>There is no strategic justification left for ignoring technical debt, postponing governance, or hoping regulators will look the other way.</p><p>CPCSC Level 1 is not an innovation burden. It is the baseline cost of doing business in the modern defence ecosystem. Align with it or step aside for organizations that will.</p><p>It forces clarity on who has access, what systems matter and whether they are maintained. For some organizations, this will feel like overhead. For disciplined organizations, it becomes structured.</p><p>And structure scales.</p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h1>Where to Start with CPCSC</h1><p>In CPCSC level 1, there are 13 security requirements from 6 of the 17 security requirements families found in <a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">ITSP.10.171</a>.</p><p>All of that translates into 71 assessment objectives (AO), which is really the only thing you should focus on applying to your organization&#8217;s scope.</p><p>The AO are the questions on the open-book test. If you can confirm you&#8217;ve applied them to every applicable part of your scope, then you pass the test.</p><p>To make life interesting, of course, you also need to track and insert various &#8220;organization-defined parameters&#8221; or ODPs</p><p>Direct from <a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">ITSP.10.171</a> Sec. 2.2:</p><p>&#8220;ODPs are an important part of specifying a security requirement. ODPs provide both the flexibility and the specificity needed by organizations to clearly define their specified information security requirements according to their particular missions, business functions, operational environments and risk tolerance. In addition, ODPs support consistent security assessments to determine if specified security requirements have been satisfied. If a GC department or agency, or a group of departments or agencies, does not specify a particular value or range of values for an ODP, non-GC organizations must assign the value or values to complete the security requirement.&#8221;</p><p>And</p><p>&#8220;The term &#8216;organization&#8217; is used in many security requirements, and its meaning depends on context. For example, in a security requirement with an ODP, an organization can refer to either the GC department or agency or to the non-GC organization establishing the parameter values for the requirement.&#8221;</p><p>Which means that so far, unlike CMMC for which the DoD released an official list of ODP values you can just plug in and plan for, the ODPs in CPCSC will be left up to whichever government entity wants to take a stab at defining it before ultimately leaving the rest up to you.</p><p>How will that shake out? Will it be regulatory chaos? Time will tell but the most practical thing you can do is take those DoD-defined values as your starting point when planning as it would be unlikely to require much modification once you get your official values on a contract.</p><p>Now, let&#8217;s run through a couple of the most impactful security requirements to get a sense of what your new day-to-day reality looks like.</p><p><strong>Family: 3.1 Access control</strong></p><p>Security Requirement: 03.01.01 Account management</p><p>AO:</p><p><strong>A.03.01.01.d.01: access to the system is authorized based on a valid access authorization</strong></p><p><strong>A.03.01.01.d.02: access to the system is authorized based on intended system usage</strong></p><p><strong>Impact:</strong> For the average defence contractor, these CPCSC Level 1 objectives represent a shift from a &#8220;convenience-first&#8221; to a &#8220;compliance-first&#8221; operational mindset. Meeting A.03.01.01.d.01 requires a formal administrative process where identity is verified before a single login is generated; gone are the days of informal account creation or shared credentials.</p><p>Meanwhile, A.03.01.01.d.02 introduces the concept of Least Privilege, mandating that access isn&#8217;t granted simply because a person is &#8220;on the team,&#8221; but only because their specific role requires it. For a small-to-mid-sized firm, this means an increased administrative burden for which you&#8217;ll need documented evidence of who has access and why.</p><p>In practice, this forces contractors to tighten their internal HR and IT workflows, ensuring that when an employee&#8217;s role changes or they leave the company, their access is adjusted or revoked immediately to prevent unauthorized data exposure.</p><p><strong>Family: 3.14 System and information integrity</strong></p><p>Security Requirement: 03.14.01 &#8211; Flaw Remediation</p><p>AO:</p><p><strong>A.03.14.01.a[03]: system flaws are corrected</strong></p><p><strong>Impact: </strong>For the average defence contractor, objective A.03.14.01.a[03] transforms patch management from a &#8220;best effort&#8221; IT task into a high-stakes compliance requirement. The primary impact is the loss of operational flexibility; contractors can no longer afford to delay updates for months out of fear of software instability. Instead, they must implement a disciplined vulnerability remediation lifecycle that includes identifying, testing, and applying security patches within specific timeframes.</p><p>For many firms, this necessitates a move away from manual updates toward automated patch management tools to ensure nothing slips through the cracks. Beyond the technical shift, there is a significant documentation burden. Assessors won&#8217;t just want to see that the system is currently updated; they will want to see historical logs proving that flaws were corrected consistently and promptly. This effectively raises the &#8220;floor&#8221; for cybersecurity maturity, forcing smaller contractors to invest in more robust IT support or managed service providers to keep pace with the constant stream of newly discovered software vulnerabilities.</p><p>Even if you&#8217;re assessing your own organization, this is the level of consistent organizational effort required to meet that attestation.</p><p><strong>Family: 3.13 System and communications protection</strong></p><p>Security Requirement: 03.13.01 Boundary protection</p><p>AO:</p><p><strong>A.03.13.01.a[02]: communications at external managed interfaces to the system are controlled.</strong></p><p><strong>Impact: </strong>For the average defence contractor, objective A.03.13.01.a[02] marks the end of &#8220;open-door&#8221; networking and necessitates strengthening the digital perimeter. The impact is felt most acutely in how the company interacts with the outside world&#8212;specifically at the Managed Interface, which serves as the single, guarded gateway between the internal network and external entities such as the public internet or subcontractor portals.</p><p>Contractors must move away from ad hoc connectivity and instead implement strict Boundary Protection technologies, such as enterprise-grade firewalls or specialized gateways that perform deep packet inspection. This requirement often forces a structural redesign of the network to ensure that all data &#8220;traffic&#8221; is funnelled through controlled checkpoints where it can be monitored, filtered, and restricted based on pre-defined security policies.</p><p>For smaller firms, this typically means moving away from consumer-grade routing hardware toward more sophisticated managed security services, as the burden of constantly updating and auditing these interface controls requires specialized expertise to prevent unauthorized data exfiltration.</p><h1>From Vibes to Verifiable</h1><p>Seventy-one assessment objectives. ODPs that may or may not be pre-defined for you. Evidence trails. Role catalogs. Patch clocks. Firewall rules that now require justification instead of &#8220;vibes&#8221;. All of this at level one is your new reality. It is the methods and actions your organization will have to live by.</p><p>But here&#8217;s the uncomfortable truth: none of this is exotic. None of it is bleeding-edge cyber wizardry. It&#8217;s basic governance. It&#8217;s discipline. It&#8217;s documentation. It&#8217;s doing the boring fundamentals consistently enough that you can prove it.</p><p>CPCSC Level 1 doesn&#8217;t demand a security operations center or classified infrastructure. It demands that you stop running your defence business like a startup lab and start running it like a regulated supplier in a national security supply chain. Access must be justified. Vulnerabilities must be fixed. Network boundaries must be controlled, and you must be able to demonstrate that this isn&#8217;t aspirational, it&#8217;s operational.</p><p>Ultimately, the shift toward CPCSC Level 1 isn&#8217;t just about checking boxes or surviving an assessment. It&#8217;s about a fundamental change in how the defence supply chain operates. For the average contractor, these objectives move cybersecurity out of the IT basement and into the boardroom. Whether it&#8217;s formalizing who can log in, automating your patch cycles, or hardening your network boundaries, the common thread is verifiable control.</p><p>The tedious technical stuff is the baseline for doing business today. If you cannot prove you&#8217;re doing it, you technically aren&#8217;t doing it in the eyes of the Government of Canada. By aligning your ODPs with established benchmarks such as the DoD&#8217;s published values and treating the assessment objectives as your operational roadmap, you transform a regulatory obligation into a capability signal.</p><p>The transition is not light work. It requires structure, investment, and consistency. But what it builds is something far more valuable than compliance: a resilient, professional, and contract-ready organization positioned to compete in a regulated defence marketplace.</p><p>If you want to win defence-related contracts, accountability isn&#8217;t optional anymore. CPCSC will be the price of admission.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 7/03/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending March 7th]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326</guid><pubDate>Mon, 09 Mar 2026 14:41:29 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0364c8e9-ad45-4f34-80ea-fca893f326f9_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have completed the first rough draft of my dissertation (yay!). I will be entering a major editing phase over the next few weeks, so my availability may fluctuate.</p></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (Article on this coming soon)</p></li><li><p>Coming tomorrow, the first in Compliance is Cash! <a href="https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin">https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://betakit.com/ottawa-makes-first-rdii-investments-in-ontario-with-15-million-for-cdl-defence-and-wolf-advanced-technology/">Ottawa makes first RDII investments in Ontario with $15 million for CDL Defence and Wolf Advanced Technology</a></p><ul><li><p>A few really promising companies are being supported through this.</p></li></ul></li><li><p><a href="https://betakit.com/jetscaleai-secures-5-4-million-to-keep-cloud-costs-and-climate-impact-down/">JetScaleAI secures $5.4 million to keep cloud costs and climate impact down</a></p><ul><li><p>As compute costs continue to skyrocket amid the AI boom, there will be an increasing demand for the ability to reduce costs and increase efficiency.</p></li></ul></li><li><p><a href="https://securitybrief.ca/story/from-bill-c-26-to-c-8-canada-s-cyber-law-reboot-explained">From Bill C-26 to C-8: Canada&#8217;s cyber law reboot explained</a></p><ul><li><p>A good explainer on the current Bill C-8 making its way through Parliament.</p></li></ul></li><li><p><a href="https://betakit.com/ottawa-puts-8-5-million-behind-40-atlantic-canadian-ai-projects/">Ottawa puts $8.5 million behind 40 Atlantic Canadian AI projects</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/">Previously harmless Google API keys now expose Gemini AI data</a></p><ul><li><p>People are stealing Google API keys to use for Gemini, leading to some very shocking surpising costs.</p></li></ul></li><li><p><a href="https://www.pm.gc.ca/en/news/news-releases/2026/03/04/prime-minister-carney-announces-changes-senior-ranks-public-service">Prime Minister Carney announces changes in the senior ranks of the public service</a></p><ul><li><p>Chief Information Officer Dominic Rochon of Canada (TBS Secretariat) is now Deputy Secretary to the Cabinet (National Security and Intelligence). This is a big promotion, so props to Mr. Rochon, whom I have only heard nice things about.</p></li><li><p>Nothing yet on who the next Chief Information Officer is, which is not a good look.</p></li></ul></li><li><p>CCCS <a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-iranian-cyber-threat-response-usisrael-strikes-february-2026">Cyber threat bulletin: Iranian Cyber Threat Response to US/Israel strikes, February 2026</a></p><ul><li><p>Nothing major has surfaced yet, but we&#8217;re likely to see some reprisal operations. Iran was among the first to use wiper malware with the <a href="https://en.wikipedia.org/wiki/Shamoon">Shamoon virus against Saudi Arabia in 2012</a>. They have capabilities</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/canada/edmonton/alberta-government-budget-cybersecurity-9.7111533">Alberta to spend $40M on software upgrades after surge in cybersecurity incidents</a></p><ul><li><p>Technical debt remains one of the top sources of vulnerability. $40 million for updating &#8220;legacy application&#8221; is quite interesting and could mean a few different things. A good amount of it is likely to upgrade to software that is currently being supported.  Some of these applications are likely to be software that is no longer supported by the developer. Some cases could also be custom software where updates are needed.</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11713565/ai-generated-cra-tax-scams-increasing-cybersecurity-warning/">AI-generated CRA tax scams increasing, cybersecurity experts warn</a></p><ul><li><p>Scams and fraud has particularly been helped by AI.</p></li></ul></li><li><p><a href="https://www.bbc.com/news/articles/cly2m5e5ke4o">TikTok won&#8217;t protect DMs with end to end encryption, saying it would put users at risk</a></p><ul><li><p>Claims end to end encryption is &#8220;controversial,&#8221; which is an absolute load of bullshit. I guarantee you this means they&#8217;re scraping data from DMs. Do not use Tik Tok. </p></li></ul></li><li><p><a href="https://theijf.org/article/federal-institutions-average-259-days-to-report-privacy-breaches-theyre-supposed-to-flag-major-incidents-within-7-days">Federal institutions average 259 days to report privacy breaches. They&#8217;re supposed to flag major incidents within 7 days</a></p><ul><li><p>This is way worse than I would have expected, but I am honestly not surprised. Privacy breaches are usually treated less severe than cybersecurity breaches. While it may seem obvious, both are not the same, but often treated similarly as it involved the segmentation and protection of data. As David Fraser states in the article: "There seems to be no accountability for non-compliance with these laws and policies" </p></li></ul></li><li><p><a href="https://theijf.org/article/national-research-council-cyber-attacks">Internal briefing says Canada&#8217;s National Research Council remains exposed to high-risk cyber attacks</a></p><ul><li><p>National Research Council and any research-based organization should have a priority on cybersecurity, but it seems like they&#8217;re jumping from incident to incident.</p></li></ul></li><li><p><a href="https://www.healthcareinfosecurity.com/canadian-manufacturers-confront-rising-ot-cyber-risk-a-30911">Canadian Manufacturers Confront Rising OT Cyber Risk</a></p></li><li><p><a href="https://arstechnica.com/security/2026/03/from-iran-to-ukraine-everyones-trying-to-hack-security-cameras/">From Iran to Ukraine, everyone&#8217;s trying to hack security cameras</a></p><ul><li><p>Operational technology cybersecurity - so hot right now. More threat actors are aware of operational technology and its importance, so they&#8217;re increasingly trying to target it.</p></li></ul></li><li><p><a href="https://www.breachsettlementcanada.kpmg.ca/">Government of Canada Privacy Breach Class Action &#8211; Proposed Settlement</a></p><ul><li><p>Potential class action for privacy breach of Government of Canada account between March 1, 2020 and December 31, 2020. An Approval Hearing will be held on March 31, 2026, at 9:30 a.m. PST</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/atlantic/nova-scotia/article/halifax-water-investigating-privacy-breach-shuts-down-online-portal/">Halifax Water investigating privacy breach, shuts down online portal</a></p><ul><li><p>Hard to tell if this is a cybersecurity incident yet based on their messaging.</p></li></ul></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/">New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</a></p><ul><li><p>A new person in the middle attack that intercepts a target&#8217;s downlink traffic. </p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/">Threat Actor leveraged a Popular AI security testing platform tool for Attack</a></p></li><li><p><a href="https://cyberpress.org/apt37-air-gap-breach-campaign/">APT37 Targets Air-Gapped Networks With Novel Malware Strain</a></p><ul><li><p>Over the past few years we&#8217;ve been increasingly seeing unique methods of attack to jump air-gaps. Usually APTs, I don&#8217;t think we&#8217;ve seen one from a non-APT.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/05/google-says-half-of-all-zero-days-it-tracked-in-2025-targeted-buggy-enterprise-tech/">Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech</a></p><ul><li><p>Part of this report says that zero-days were exploited by syware makers (15) more oftenthan government-backed espionage groups (12). This should be a concern for everyone because, believe it or not, spyware firms are less trustworthy than governments.</p></li></ul></li><li><p><a href="https://www.anthropic.com/news/mozilla-firefox-security">Anthropic Partnering with Mozilla to improve Firefox&#8217;s security</a></p><ul><li><p>Claude is increasingly doing great stuff with vulnerability discovery, so we&#8217;ll likely see more and more of these partnerships.</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PRV0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PRV0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 424w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 848w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 1272w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PRV0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png" width="662" height="429" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:429,&quot;width&quot;:662,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111538,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/189657731?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PRV0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 424w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 848w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 1272w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/">Microsoft: Hackers abusing AI at every stage of cyberattacks</a></p><ul><li><p>More of what everyone is saying: AI is making it easier for everyone to conduct cyberattacks.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d0b7cb2a-e67f-44d6-b278-2bef0f8c3460&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cyber Dimensions to the Defence Industrial Strategy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-18T17:25:56.808Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a0b6015-0fff-4ff1-a9f6-5e8f304977fc_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188287976,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Read my cyber review of the Defence Industrial Strategy. TL;DR: It will help a lot of Canada&#8217;s cyber industry, but there are major gaps and hurdles to overcome regarding infrastructure and hyperscalers.</p><ul><li><p><a href="https://www.cigionline.org/publications/cross-border-data-transfer-regimes-current-landscape-and-outlook-ahead/">Cross-Border Data Transfer Regimes: Current Landscape and Outlook Ahead</a></p><ul><li><p>A good overview at global cross-border data transfer regimes, including Canada.</p></li></ul></li><li><p><a href="https://hackread.com/link11-releases-european-cyber-report-2026-ddos-attacks-become-a-constant-threat/">Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat</a></p><ul><li><p>I feel like we&#8217;ve certainly have already accepted DDoS attacks as a constant threat, but few have really elaborated on this.</p></li></ul></li><li><p><a href="https://www.rusi.org/explore-our-research/publications/commentary/fog-proxies-and-uncertainty-cyber-us-israeli-operations-iran">Fog, Proxies and Uncertainty: Cyber in US-Israeli Operations in Iran</a></p><ul><li><p>A good overview on the role of cyber in current war against Iran.</p></li></ul></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:189879839,&quot;url&quot;:&quot;https://teresascassa.substack.com/p/bcs-court-of-appeal-decision-in-clearview&quot;,&quot;publication_id&quot;:3380257,&quot;publication_name&quot;:&quot;Teresa Scassa&#8217;s Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0Wwc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;title&quot;:&quot;BC's Court of Appeal decision in Clearview AI saga is a win for privacy&quot;,&quot;truncated_body_text&quot;:&quot;The British Columbia Court of Appeal has ruled that the BC Privacy Commissioner&#8217;s enforcement order against Clearview AI is both reasonable and enforceable. Clearview AI is a US-based company that scrapes photographs from the internet, including from social media websites, to build a massive facial recognition database which it offers as a service to la&#8230;&quot;,&quot;date&quot;:&quot;2026-03-04T14:20:22.201Z&quot;,&quot;like_count&quot;:3,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:103039402,&quot;name&quot;:&quot;Teresa Scassa&quot;,&quot;handle&quot;:&quot;tscassa&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;bio&quot;:&quot;I'm a law professor at the University of Ottawa, where I hold the Canada Research Chair in Information Law and Policy. My research areas include privacy law, AI regulation, and data governance. All opinions and commentary are my own.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-11-19T15:35:43.741Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:3444266,&quot;user_id&quot;:103039402,&quot;publication_id&quot;:3380257,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3380257,&quot;name&quot;:&quot;Teresa Scassa&#8217;s Substack&quot;,&quot;subdomain&quot;:&quot;teresascassa&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Posts about developments in law and technology with a focus on AI, privacy, and data governance.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;author_id&quot;:103039402,&quot;primary_user_id&quot;:103039402,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-19T16:15:47.041Z&quot;,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;Teresa Scassa&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://teresascassa.substack.com/p/bcs-court-of-appeal-decision-in-clearview?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!0Wwc!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg" loading="lazy"><span class="embedded-post-publication-name">Teresa Scassa&#8217;s Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">BC's Court of Appeal decision in Clearview AI saga is a win for privacy</div></div><div class="embedded-post-body">The British Columbia Court of Appeal has ruled that the BC Privacy Commissioner&#8217;s enforcement order against Clearview AI is both reasonable and enforceable. Clearview AI is a US-based company that scrapes photographs from the internet, including from social media websites, to build a massive facial recognition database which it offers as a service to la&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 months ago &#183; 3 likes &#183; Teresa Scassa</div></a></div><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.nextgov.com/cybersecurity/2026/03/how-cyber-command-contributed-operation-epic-fury-against-iran/411818/">How Cyber Command contributed to Operation Epic Fury against Iran</a></p><ul><li><p>USCYBERCOM and USSPACECOM were the first to take action, degrading comms and command and control of Iran including its air defence.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/02/hacktivists-claim-to-have-hacked-homeland-security-to-release-ice-contract-data/">Hacktivists claim to have hacked Homeland Security to release ICE contract data</a></p><ul><li><p>Hacktivist group called &#8220;Department of Peace&#8221; leaked contract data between DHS Office of Industry Partnership and more than 6,000 companies including Raytheon, Anduril, Palantir, and more.</p></li></ul></li><li><p><a href="https://www.theverge.com/ai-artificial-intelligence/887309/openai-anthropic-dod-military-pentagon-contract-sam-altman-hegseth">How OpenAI caved to the Pentagon on AI surveillance</a></p><ul><li><p>Sam Altman is either lying, is grossly ignorant, or was intentionally misled by the Pentagon. The redlines that Altman thinks the Pentagon agreed to, they actually did not.</p></li></ul></li><li><p><a href="https://www.404media.co/cbp-tapped-into-the-online-advertising-ecosystem-to-track-peoples-movements/">CBP Tapped Into the Online Advertising Ecosystem To Track Peoples&#8217; Movements</a></p><ul><li><p>Every level of United States law enforcement are trying to track your every movement because everyone who isn&#8217;t law enforcement is considered a threat to them. Do not travel to the United States unless you have to.</p></li></ul></li><li><p><a href="https://archive.ph/vN8U5">A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals</a></p><ul><li><p>I am getting a lot of deja vu about this and the Wannacry ransomware attacks.</p></li></ul></li><li><p><a href="https://www.404media.co/the-fbi-is-using-ai-to-hack-targets/">The FBI Discusses the Potential to Use AI to Hack Targets</a></p><ul><li><p>The FBI states this is all hypothetical, but I trust the FBI as much as I trust the Trump administration.</p></li></ul></li><li><p><a href="https://www.techpolicy.press/will-nsos-us-lobbying-pay-off-under-trump/">Will NSO&#8217;s US Lobbying Pay Off Under Trump?</a></p><ul><li><p>Those who have bribed Trump with money have achieved significant gains. So, unless there is major internal pushback, then spyware firm NSO will benefit from bribing Trump.</p></li></ul></li><li><p><a href="https://www.theguardian.com/technology/2026/mar/03/iran-war-heralds-era-of-ai-powered-bombing-quicker-than-speed-of-thought">Iran war heralds era of AI-powered bombing quicker than &#8216;speed of thought&#8217;</a></p><ul><li><p>Anthropic&#8217;s Claude and other models used to support the attack on Iran.</p></li></ul></li><li><p><a href="https://hackread.com/ransomware-breach-university-of-hawaii-cancer-center/">Ransomware Breach at University of Hawaii Cancer Center Affects 1.2M People</a></p><ul><li><p>Ransomware groups love to target healthcare.</p></li></ul></li><li><p><a href="https://www.wired.com/story/how-vulnerable-are-computers-to-an-80-year-old-spy-technique-congress-wants-answers/">How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers</a></p></li><li><p><a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/president-trumps-cyber-strategy-for-america.pdf">United States releases its Cyber Strategy</a></p><ul><li><p>Six pillars include: Shape adversary behavior; promote common sense regulation; modernize and secure federal government networks; secure critical infrastructure; sustain supriority in critical and emerging technologies, and build talent and capacity.</p></li><li><p>Long story short: They are out of their depth and it is clear they don&#8217;t fully understand what they&#8217;re talking about. A lot of hot air. Long story short, they&#8217;ll do whatever they can get away with.</p></li></ul></li><li><p><a href="https://halifax.citynews.ca/2026/03/05/fbi-investigating-suspicious-cyber-activity-on-system-holding-sensitive-surveillance-information/">FBI investigating &#8216;suspicious&#8217; cyber activity on system holding sensitive surveillance information</a></p><ul><li><p>Chinese threat actor access FBI internal network that stores wiretaps and intelligence surveillance warrants.</p></li></ul></li><li><p><a href="https://www.whitehouse.gov/fact-sheets/2026/03/fact-sheet-president-donald-j-trump-combats-cybercrime-fraud-and-predatory-schemes-against-american-citizens/">Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens</a></p><ul><li><p>Some hints that the National Coordination Center may work with private sector orgs for hack-back.</p></li></ul></li><li><p><a href="https://cyberscoop.com/house-committee-advances-rural-utility-cybersecurity-act/">Congress looks to revive critical cyber program for rural electric utilities</a></p></li><li><p><a href="https://www.defenseone.com/policy/2026/03/dod-names-james-aaron-bishop-serve-ciso/411930/">Air Force cybersecurity chief tapped to lead Pentagon&#8217;s information-security efforts</a></p></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://hackread.com/shinyhunters-leak-dutch-telecom-odido-data/">ShinyHunters Leak 2M Records From Dutch Telecom Odido, Claim 21M Stolen</a></p><ul><li><p>This will likely continue as Odido has said it will not pay the ransom. I would honestly be a bit worried if I was ShinyHunters. The Dutch have a long history of and are well regarded for their hacking skills, so I wouldn&#8217;t be surprised if the Netherlands makes targeting ShinyHunters a priority.</p></li></ul></li><li><p><a href="https://www.bbc.com/news/articles/cz0ggkr2g77o">Transport for London hack in 2024 affected around 10 million people, BBC can reveal</a></p><ul><li><p>BBC claims this is one of the biggest hacks in British history. TfL was attacked by Scattered Spider </p></li></ul></li><li><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/project-compass-first-operational-results-against-com-network">Project Compass: first operational results against The Com network</a></p><ul><li><p>I applaud and celebrate whenever The Com members are arrested.</p></li></ul></li><li><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/major-data-leak-forum-dismantled-in-global-action-against-cybercrime-forum">Major data leak forum dismantled in global action against cybercrime forum</a></p><ul><li><p>Leakbase forum taken down.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p>North Korea&#8217;s <a href="https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/">APT37 hackers use new malware to breach air-gapped networks</a></p></li><li><p><a href="https://www.cnbc.com/2026/03/02/amazon-says-drone-strikes-damaged-3-facilities-in-uae-and-bahrain.html">Amazon says drone strikes damaged 3 facilities in UAE and Bahrain</a></p></li><li><p><a href="https://www.metacurity.com/the-iran-war-has-a-cyber-story-its-not-the-one-youre-reading/">The Iran war has a cyber story. It&#8217;s not the one you&#8217;re reading</a></p></li><li><p><a href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/">Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East</a></p><ul><li><p>Iran appears to be conducting a lot of scanning and using IP cameras to aid in missile target selection.</p></li></ul></li><li><p><a href="https://www.politico.com/news/2026/03/04/israel-iran-cyber-headquarters-00813364">Israel says it knocked out Iran&#8217;s cyber warfare headquarters</a></p><ul><li><p>Take this with a grain of salt.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/chinese-state-hackers-target-telcos-with-new-malware-toolkit/">Chinese state hackers target South American telcos with new malware toolkit</a></p><ul><li><p>If you&#8217;re a telco, China is targeting you.</p></li></ul></li><li><p><a href="https://www.svd.se/a/K8nrV4/metas-ai-smart-glasses-and-data-privacy-concerns-workers-say-we-see-everything">She Came Out of the Bathroom Naked, Employee Says</a></p><ul><li><p>Swedish investigation into the mass privacy infringement of Meta glasses.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Government Provides Next Steps to Sovereign Cloud]]></title><description><![CDATA[Is the Government of Canada headed towards true sovereign cloud?]]></description><link>https://www.cyberincontext.ca/p/canadian-government-provides-next</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-government-provides-next</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Fri, 06 Mar 2026 21:26:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0e1b4c37-bc01-4aa1-bda3-90650e2d1f9d_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><h4><strong>Canadian Cyber in Context is sponsored by</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.123cyber.ca/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png" width="442" height="170.30357142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:561,&quot;width&quot;:1456,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:26108,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.123cyber.ca/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">123 Cyber Inc.</figcaption></figure></div><h6><strong>All views expressed belong to Canadian Cyber in Context and do not reflect the position of any sponsor.</strong></h6><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-government-provides-next?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-government-provides-next?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Where are we at with Sovereign Cloud?</h3><p>Since early 2025, the Government of Canada has increasingly looked to shore up and improve Canada&#8217;s digital sovereignty. The reasons for this are myriad, including many strong economic reasons to invest in Canadian capacity to develop data centre infrastructure to support Canada&#8217;s digital technology. However, the most influential reason is the significant turn the United States has taken towards authoritarianism, and Canada&#8217;s growing realization of how much its digital sovereignty is compromised by its reliance on United States cloud providers.</p><p>Initial explorations by the federal government noted big loopholes in policy and procurement that allow major hyperscalers and United States-based corporations to refer to themselves sovereign cloud. This is problematic because <a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">United States law states that any data on a foreign server that a United States-based corporation has access to can be requested by the United States as part of a &#8220;criminal investigation,&#8221; and the country where that data is hosted will have no say in its transfer</a>. </p><p>One of the primary problems is that there are four different definitions of a &#8220;Canadian company,&#8221; including &#8220;<a href="https://core-ombuds.canada.ca/core_ombuds-ocre_ombuds/fact_sheet_9-fiche_descriptive_9.aspx?lang=eng">any company that is formed in Canada following the laws of either the Government of Canada or a provincial government. This includes government and private companies of any size</a>.&#8221; As a result, a company incorporated in Canada but owned by an American corporation still counts as a Canadian company. The Canadian Shield Institute have done some great work on this topic.</p><p><a href="https://ccianet.org/wp-content/uploads/2025/09/Canadas-Sovereign-Cloud-Initiative.pdf">Those opposed to</a>&nbsp;Canadian sovereign cloud being wholly owned by Canadian firms refuse to acknowledge Canadian national security and sovereignty issues, particularly due to United States law. Their error is ignorance and naivety in believing that their sovereignty matters more than ours. Fortunately, the Government of Canada is invoking the <a href="https://opo-boa.gc.ca/miseajour-esn-updated-nse-eng.html">national security exception</a>, which is something common in most countries that can be triggered to exclude a procurement from trade agreement obligations. This means Canada can say trade agreement rules concerning data localization and inclusion in procurement don&#8217;t matter, sovereign cloud is a matter of national security.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> </p><p>SSC updated the request for information (RFI) on March 3, which provides new information on the program's direction and who will be allowed in. Before jumping into what&#8217;s new, let us figure out what SSC first learned that may have contributed to this update.</p><div><hr></div><h3>What has SSC Learned?</h3><p>SSC released the <a href="https://web.archive.org/web/20251017093855/https://canadabuys.canada.ca/en/tender-opportunities/tender-notice/cb-416-17296820">first wave of its RFI on sovereign cloud capability last year</a>. In addition to requiring that data is processed, transmitted, and stored exclusively within Canada, the RFI also included a minimum requirement that &#8220;at all times only under the control of service providers, up to and including their ultimate parent corporations, that are not subject to foreign laws that permit foreign governments to obtain access to Canada&#8217;s data without Canada&#8217;s prior written consent.&#8221; This RFI is intended to inform the development of a procurement vehicle for a sovereign cloud Infrastructure as a Service (IaaS) and a native Platform as a Service (PaaS).</p><p>In the update to the RFI, this has been changed to &#8220;Cloud services remain at all times under the control of service providers (including their ultimate parent corporations) that are not subject to foreign laws permitting foreign governments to access or <strong>compel</strong> actions affecting Canada&#8217;s data or services without Canada&#8217;s prior written consent.&#8221;</p><p>This difference in wording is very telling as SSC figure out how to specifically frame and define the techno-legal constraints to ensure digital sovereignty. </p><p>The RFI examined a range of issues related to sovereign cloud, but that this is the basic entry point for it is a very positive sign. After the first wave, SSC released documents that elaborate upon what they are looking for and what they have learned so far:</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Rfi Dr Wave 1 Vague 1 Sovereign Cloud Webinar Questions &amp; Answers No1</div><div class="file-embed-details-h2">189KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/5a6b0a73-75d7-4a1a-a095-4a5ab65b5478.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/5a6b0a73-75d7-4a1a-a095-4a5ab65b5478.pdf"><span class="file-embed-button-text">Download</span></a></div></div><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Rfi Dr Wave 1 Wave 1 Sovereign Cloud Webinar Questions &amp; Answers No2</div><div class="file-embed-details-h2">189KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/01279546-a004-461c-b221-1cefdcbb1ea3.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/01279546-a004-461c-b221-1cefdcbb1ea3.pdf"><span class="file-embed-button-text">Download</span></a></div></div><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Rfi Dr Sovereign Cloud What We Heard Report</div><div class="file-embed-details-h2">376KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/fa6e0f30-f473-42db-b258-ffb268cf98c0.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/fa6e0f30-f473-42db-b258-ffb268cf98c0.pdf"><span class="file-embed-button-text">Download</span></a></div></div><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Rfi Dr Wave 1 Vague 1 Sovereign Cloud Supplier Webinar August 22 2025 0</div><div class="file-embed-details-h2">625KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/e6795d40-fd9d-452a-834a-c36977733612.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/e6795d40-fd9d-452a-834a-c36977733612.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-government-provides-next?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-government-provides-next?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7gFe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7gFe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 424w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 848w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 1272w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7gFe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png" width="1456" height="609" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/50585a76-5354-4702-b551-02a2400ea368_1878x785.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:609,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:567416,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/190047079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7gFe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 424w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 848w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 1272w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Carney Government is making a lot of policy and proclamations about Canadian digital sovereignty in cloud and AI, but it is doing so without understanding the extent to which Canadian industry can meet what it is calling for, or the obstacles it faces. </p><p>This RFI is intended to help with this, and as SSC determine what is possible, it will seek more granularity to inform the government and eventual competitive process. Some highlights of what they&#8217;ve learned so far (Keep in mind that this is all self-reporting):</p><ul><li><p>40 suppliers participated, and 32 met the sovereign eligibility requirements</p><ul><li><p>This is honestly more than I expected. </p></li></ul></li><li><p>Sovereign cloud options do not match the &#8220;scalability&#8221; of hyperscalers.</p><ul><li><p>This confirms what I have been saying. Canadian cloud providers exist, but they cannot match the scale of the giants.</p></li></ul></li><li><p>Limited sovereign hardware and reliance on proprietary software</p><ul><li><p>This is no surprise. I do not want to call Canadian cloud providers resellers, but Canada hasn&#8217;t had much domestic innovation or development of cloud capabilities and technology. That means relying on other&#8217;s intellectual property a lot.</p></li><li><p>However, the current landscape and investment in this space mean this will be a growing sector.</p></li></ul></li></ul><h6>I provide some additional commentary on some RFI Q&amp;A at the end.</h6><div><hr></div><h3>What&#8217;s New in the Update?</h3><p>However, the federal government appears poised to address this gap. On March 3, Shared Services Canada (SSC) updated the <a href="https://canadabuys.canada.ca/en/tender-opportunities/tender-notice/cb-416-17296820">Request for Information (RFI) - Sovereign Cloud Capability - Upcoming Competitive Processes</a> with specific, targeted requests for information that should make proponents of Canadian sovereign cloud happy. I have covered a lot of information from last year here, so what&#8217;s new and so interesting about the update?</p><ul><li><p>As I already noted above, they have slightly adjusted their definition concerning what counts as sovereign cloud: &#8220;Cloud services remain at all times under the control of service providers (including their ultimate parent corporations) that are not subject to foreign laws permitting foreign governments to access or <strong>compel</strong> actions affecting Canada&#8217;s data or services without Canada&#8217;s prior written consent.&#8221;<br></p></li><li><p>They have released details on the planned competitive process</p><ul><li><p>Only Canadian small and medium businesses (SMBs) will be able to compete.</p></li><li><p>They use the <a href="https://www.statcan.gc.ca/o1/en/plus/1253-small-and-medium-businesses-driving-large-sized-economy">Statistics Canada definition of SMBs</a>:</p><ul><li><p>A small business has 1 to 99 paid employees</p></li><li><p>A medium-sized business has between 100 and 499 paid employees.</p></li></ul></li><li><p>When talking SMBs, they again want to emphasize that neither the corporation nor any parent corporation should be compelled by a foreign government to take any action without Canadian consent.</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gmXN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gmXN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 424w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 848w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 1272w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gmXN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png" width="784" height="176" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:176,&quot;width&quot;:784,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:45687,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/190047079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gmXN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 424w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 848w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 1272w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><ul><li><p>There are likely to be one-off competitive processes that &#8220;address specific [security or] sovereignty related challenges where Canadian firms can offer concrete solutions that materially enhance Canada&#8217;s sovereign cloud posture.&#8221;</p><ul><li><p>This seems to indicate that there will potentially be contracts where SMBs cannot meet the needs. This may even mean that United States-owned Canadian corporation could compete in these one-offs, but it is unclear what definition they are using for &#8220;Canadian firm&#8221; here. It likely means the narrow one they have developed to sovereign cloud, but for these one-off contracts it could be more permissible depending on the context.</p></li></ul></li><li><p>We also have a very vague timeline, but we at least know the steps. We know they are undertaking an agile procurement process, which is much more collaborative and can at times be quicker, so this is reflected in their timeline. It appears they are aiming to have a draft solicitation as soon as possible, which will be developed through engagement with industry.</p><ul><li><p>One thing to note is that SSC/PSPC may move towards an initial technical qualification as the process progresses, because they will need to discuss some security requirements at some point.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qaY9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qaY9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 424w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 848w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 1272w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qaY9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png" width="829" height="193" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:193,&quot;width&quot;:829,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:38069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/190047079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qaY9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 424w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 848w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 1272w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div></li></ul></li></ul><div><hr></div><h3>Takeaways</h3><ul><li><p>Shared Services Canada (SSC) is specifically &#8220;leveraging an adjusted definition specific to Sovereign Cloud Services procurement.&#8221; </p><ul><li><p>This may run into some difficulty later in the procurement process as the government&#8217;s wants and needs for sovereign cloud may not align with a lot of existing policies. This is particularly reflected in many of the questions received about specifics related to qualifications and existing definitions and policies of SSC<br></p></li></ul></li><li><p>SSC are trying to determine what can be achieved with current capabilities that meet the specific guidelines they set out.</p><ul><li><p>This may mean the results are not what we want to hear, but it will help the government determine what is feasible right now and what to invest in for the long term. <br></p></li></ul></li><li><p>Because there is a major market gap for Canadian firms specializing in data centre infrastructure, this creates a potential obstacle to seeing a full-stack sovereign cloud that is Canadian, but this is a starting point<br></p></li><li><p>Post-Quantum cryptography will likely be required. They don&#8217;t have much more on this yet, but they at least acknowledge it&#8217;s likely a requirement.<br></p></li><li><p>Do not expect any sovereign cloud investment and competitive process to replace the hyperscalers. The information SSC has received indicates significant market potential, but there remains a gap between the current potential of the Canadian sovereign cloud market and that of hyperscalers. This is likely contributing to the big focus on SMBs.</p><ul><li><p>In other words, major cloud and data centre/infrastructure projects, like secret cloud, will still likely go to a hyperscaler.</p></li></ul></li></ul><div><hr></div><h3>Selected Q&amp;A Commentary</h3><ul><li><p>One question raised during the initial RFI was why the national security exception was invoked and whether this could limit competition. </p><ul><li><p>It all depends on how you view competition. As this is an RFI, it is not a competition yet, but the exception will affect the competition in the end. Canada wants a sovereign Canadian cloud so using a national security exception doesn&#8217;t limit competition if it is specifically looking for Canadian firms. For American corporations who do not want Canadian to have digital sovereignty, this could be viewed as limiting competition because they aren&#8217;t involved. The problem here is that Canada doesn&#8217;t want their involvement, which is why the national security exception is being used. Americans do not seem to understand that they are the security problem we want to avoid.</p></li></ul></li><li><p>There was a question about the involvement of American hyperscaler-owned Canadian corporations in the process, such as Microsoft Canada and AWS Canada.</p><ul><li><p>The response was that the RFI is not a qualification process and is just about collecting market information. The question is largely wanting to speak to being qualified for the eventual IaaS and PaaS of sovereign cloud, many of them claim to sell sovereign cloud as well. However, the development of this specific procurement vehicle will mean American hyperscalers will not be able to say they provide sovereign cloud, because according to the RFI, they are leaning towards a very strict definition where </p></li></ul></li><li><p>One question specifically asked about using &#8220;multiple services and technology layers&#8221; and the degree to which part or all of the components are affected by the <a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">United States CLOUD Act</a>.</p><ul><li><p>This is one of the best questions. We think of digital technology as a black box, all-inclusive, but when it comes to large data centres, cloud, servers, and everything in between, this can involve a vast range of supply chains spanning software and hardware. This is where a lot of Canadian service providers are likely to have some trouble because even if it is wholly owned by a Canadian firm, it could be using all United States products, such as software developed by an American hyperscaler.</p></li></ul></li><li><p>One of the most important questions is concerning what is meant by &#8220;subject to foreign laws.&#8221; </p><ul><li><p>The core of this question is concerning a Canadian company with operations in the United States would still be affected by the United States CLOUD Act, or really other laws for that manner.</p></li><li><p>SSC is particularly looking for input on how a Canadian-owned company would address this. A major issue is that any major Canadian-owned corporation that operates at the data centre level and provide government cloud services are likely to be operating in the United States as well.</p><ul><li><p>I am of the view that any sovereign cloud would have to either not operate in the United States or places with similar sovereignty-infringing laws or to explicitly state they will refuse all foreign requests/demands for Canadian-hosted data.</p></li></ul></li></ul></li><li><p>One question asked if a Canadian-hosted service is sufficient, insinuating it is outside the scope of the US CLOUD Act.</p><ul><li><p>This is false and part of the ongoing strategy of misinformation from American hyperscalers. It is no longer sufficient for data to only be hosted in Canada. A United States-based corporation like Microsoft or AWS, which owns its Canadian subsidiaries, is still required to give data to the United States if the courts say so, even if the data is hosted in Canada.</p></li><li><p><strong>This is the entire reason for seeking to develop sovereign Canadian cloud.</strong></p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>The exception can be challenged if it wasn&#8217;t &#8220;properly invoked,&#8221; but I believe this is extremely rare.</p></div></div>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 28/02/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending February 28]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226</guid><pubDate>Mon, 02 Mar 2026 14:30:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/960bdebf-c878-4fb0-9f08-ad3425ef638b_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have completed the first rough draft of my dissertation (yay!). I will be entering a major editing phase over the next few weeks, so my availability may fluctuate.</p></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (Article on this coming soon)</p></li><li><p>There are no indications of major Iranian cyber attacks yet, but be careful out there.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://thenarwhal.ca/olds-alberta-ai-data-centre/">A $10-billion AI data centre races ahead in a rural Alberta town, population 9,679</a></p><ul><li><p>&#8220;The project, if built, would include the second-largest power plant in Alberta and consume as much electricity as the city of Edmonton.&#8221;</p></li><li><p>Reminds me of this article I wrote last year:</p></li></ul></li><li><p><a href="https://forms-formulaires.alpha.canada.ca/en/id/cmkbdzco801d4x901rf4gqboq">Government of Canada AI Register</a></p><ul><li><p>The Government of Canada has opened the consultation on the public AI register. The <a href="https://open.canada.ca/data/en/dataset/fcbc0200-79ba-4fa4-94a6-00e32facea6b">AI Register</a> provides information on where and how AI is being used in the federal government. The consultation is specifically seeking information on if it include the right information and how the AI register could be make easier to use. Submissions end March 31</p></li></ul></li><li><p><a href="https://www.cira.ca/en/resources/news/cybersecurity/mdr-24-7-canadian-cybersecurity/">CIRA MDR delivers a 24/7 Canadian-based managed detection and response cybersecurity service</a></p><ul><li><p>I certainly did not see this coming. CIRA is the Canadian Internet Registration Authority, which is in charge of the .CA domain. This is a pretty smart move as demands for sovereign security options grow, CIRA already has a strong market position. It will be interesting to see them entering what I feel to be a already heavily competitive sector.</p></li></ul></li><li><p><a href="https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/">Meta Director of AI Safety Allows AI Agent to Accidentally Delete Her Inbox</a></p><ul><li><p>These are the people we are supposed to trust about AI safety. It appears they gave OpenClaw access to their computer and email, which led to the entire inbox being deleted. I have resisted covering OpenClaw at all because of how plain dumb it is, but may </p></li></ul></li><li><p><a href="https://industrialcyber.co/utilities-energy-power-water-waste/google-cloud-calls-for-unified-ai-defense-as-energy-sector-faces-cyber-perfect-storm/">Google Cloud calls for unified AI defense as energy sector faces cyber &#8216;perfect storm&#8217;</a></p><ul><li><p>There is a growing need to better organize and defend critical infrastructure sectors. Although they frame this as defending things, this is really trying to say we should put more things in the cloud. While they do so as a means to leverage greater security tools and security, this is just marketing.</p></li></ul></li><li><p><a href="https://www.lemanic.ca/2026/02/18/cyberattaque-au-css-du-fer-voici-ce-que-les-parents-peuvent-faire-pour-se-proteger-selon-steve-waterhouse/">Cyberattaque au CSS du Fer : voici ce que les parents peuvent faire pour se prot&#233;ger, selon Steve Waterhouse</a></p><ul><li><p>Amid so many data leaks and breaches, I like Steve&#8217;s advice: assume your data will eventually be misused and respond accordingly. Compartmentalization, two-factor authentication, and password managers should all be the norm.</p></li><li><p>For my Francophone subscribers: I am working on including more Quebec and French content in some capacity. I do not know it myself </p></li></ul></li><li><p><a href="https://www.cbc.ca/news/politics/open-ai-government-meeting-tumbler-ridge-9.7104789">AI minister &#8216;disappointed&#8217; by OpenAI meeting held in wake of Tumbler Ridge shooting</a></p><ul><li><p>Who is going to tell Evan Solomon that his rose-colored glasses, failure to recognize and address risks and security threats, approach is a product of this, and he is part of the disappointment?</p></li><li><p><a href="https://www.usnews.com/news/top-news/articles/2026-02-25/canada-tells-openai-to-boost-safety-measures-or-be-forced-to-by-government">Canada Tells OpenAI to Boost Safety Measures or Be Forced to by Government</a></p><ul><li><p>This was based on statements from Justice Minister Sean Fraser. I would say this is likely all bark and no bite, but it remains to be seen if this tragedy will change the government&#8217;s course. The Carney government and AI Minister Solomon have sent major signals that they did not intend to be restrictive or will focus on regulations, particularly to distinguish themselves from the Trudeau government and to lean into the economics of AI. </p></li><li><p><a href="https://www.politico.com/news/2026/02/26/canada-openai-chatgpt-shooting-00802746">The perpetrator had a second ChatGPT account after their first was banned</a> and OpenAI has </p></li><li><p><a href="https://thelogic.co/news/exclusive/federal-government-reconsider-online-harms-panel-ai/">Feds reconvene Trudeau-era online harms panel amid chatbot fears</a></p></li></ul></li></ul></li><li><p><a href="https://www.newswire.ca/news-releases/bell-and-hypertec-partner-to-strengthen-canada-s-sovereign-ai-ecosystem-868073613.html">Bell and Hypertec partner to strengthen Canada&#8217;s sovereign AI ecosystem</a></p><ul><li><p>I have said that the best short term pathway for Canada to quickly develop a capacity to compete domestically is for Canada&#8217;s big telecoms, such as Bell, to get into the game. This is potentially one step in that direction. </p></li><li><p>The problem with US corporations is geographic and legal. If a corporation operates in the United States, it is exposing itself to the US Cloud Act. This is why we need a Canadian corporation that either does not operate or minimal liability in the United States.</p></li></ul></li><li><p><a href="https://telconews.ca/story/videotron-taps-samsung-to-modernise-canadian-5g-core">Videotron taps Samsung to modernise Canadian 5G core</a></p><ul><li><p>An example of when I talk about Canada does not have the ability to compete with hyperscalers and often must partner with non-Canadians. Time and again they have to partner with others, usually for infrastructure needs.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/02/minister-anand-and-minister-mcguinty-welcomed-republic-of-korea-counterparts-to-ottawa.html">Minister Anand and Minister McGuinty welcomed Republic of Korea counterparts to Ottawa</a></p><ul><li><p>Includes major cyber component. North Korea is one of the most prolific state cyber threat actors, and the Republic of Korea is often a target for this. Increasing cyber relations and cooperation is good and cyber is a major component to Canada&#8217;s Indo-Pacific strategy.</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/video/deception-decoded/2026/02/25/canadas-critical-infrastructure-is-being-targeted-in-cyber-attacks-deception-decoded/">Canada&#8217;s critical infrastructure is being targeted in cyber attacks | Deception Decoded</a></p><ul><li><p>Short interview with the Head of the Canadian Centre for Cyber Security Rajiv Gupta</p></li></ul></li><li><p><a href="https://www.bce.ca/news-and-media/newsroom?article=bell-invests-1-million-in-mckenna-institute-to-strengthen-canadas-cybersecurity-talent-pipeline">Bell invests $1 million in McKenna Institute to strengthen Canada&#8217;s cybersecurity talent pipeline</a></p><ul><li><p>This investment will help establish the &#8220;McKenna Institute Cyber Talent Program powered by Bell Canada. This 12-to-16 week, full-time, industry-led intensive program is designed to complement existing academic pathways by providing applied, real-world experience that reflects the rapidly evolving needs of the cybersecurity sector.&#8221; Sounds like this is setting up a co-op program.</p></li></ul></li><li><p><a href="https://haveibeenpwned.com/Breach/CanadianTire">Canadian Tire Data Breach</a></p><ul><li><p>HaveIBeenPwned confirms Canadian Tire data breach.</p></li></ul></li><li><p><a href="https://securitybrief.ca/story/quantum-cloud-and-cyber-take-shape-in-canadian-defence-plan">Quantum, cloud and cyber take shape in Canadian defence plan</a></p><ul><li><p>I was interviewed for this news story on the role of quantum, cloud, and cyber in the Defence Industrial Strategy.</p></li></ul></li><li><p><a href="https://www.cyber.gc.ca/en/news-events/cse-calls-canadian-organizations-critical-infrastructure-providers-strengthen-defences-fourth-anniversary-russias-invasion-ukraine">CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on fourth anniversary of Russia&#8217;s invasion of Ukraine</a></p><ul><li><p>Canada remains a favorite target for Russian cyber threat actors.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/02/crtc-takes-action-to-connect-canadians-through-technology-and-culture.html">CRTC Releases Updated Strategic Plan: CRTC takes action to connect Canadians through technology and culture</a></p><ul><li><p>Focus appears to be on connectivity and competition.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/prairies-economic-development/news/2026/02/minister-olszewski-to-announce-federal-support-to-help-an-alberta-business-adopt-artificial-intelligence-technologies-and-compete-in-global-markets.html">Federal support to help an Alberta business adopt artificial intelligence technologies and compete in global markets</a></p></li><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/02/canada-and-india-deepen-education-collaboration-with-new-talent-and-innovation-strategy.html">Canada and India deepen education collaboration with new talent and innovation strategy</a></p><ul><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/02/backgrounder--canada-and-india-welcomed-13-new-partnerships-between-canadian-and-indian-universities.html">Includes 13 MOUs between Canadian and Indian universities</a> of tech/research organizations. A few of these include AI, computer science/engineering, and other cyber-related.</p></li></ul></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-004-critical-vulnerability-affecting-cisco-catalyst-sd-wan-cve-2026-20127">Alert - AL26-004 - Critical vulnerability affecting Cisco Catalyst SD-WAN - CVE-2026-20127</a></p></li><li><p><a href="https://www.cyber.gc.ca/en/news-events/joint-guidance-malicious-cyber-threats-sd-wan-networks">CCCS Joint guidance on malicious cyber threats to SD-WAN networks</a></p></li><li><p><a href="https://ir.crowdstrike.com/news-releases/news-release-details/2026-crowdstrike-global-threat-report-ai-accelerates-adversaries">2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface</a></p><ul><li><p>A crazy figure: Breakout time for initial access to network compromise went from 98 minutes in 2021 to 29 minutes in 2025.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VC9C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VC9C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VC9C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg" width="371" height="340.3440134907251" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:544,&quot;width&quot;:593,&quot;resizeWidth&quot;:371,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VC9C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul></li><li><p><a href="https://bytevanguard.com/2026/02/18/critical-zero-day-ransomware-surge-feb-2026/">ByteVanguard Threat Brief Notes Canada as a Top Ransomware Victim</a></p></li><li><p><a href="https://assets.revolut.com/pdf/Revolut_Consumer_Security_and_FinCrime_Report_compressed.pdf">Revolut says Telegram now Rivals Facebook as Top Fraud Source</a></p><ul><li><p>Woohoo! Go Telegram and Facebook/Meta! You two are really knocking it out of the park for making the world a worse place.</p></li></ul></li><li><p><a href="https://canada.newsroom.ibm.com/2026-02-25-IBM-Threat-Index-Report-AI-is-Speeding-Up-Cyberattacks,-IBM-Cautions-Canadian-Organizations">IBM Threat Index Report: AI is Speeding Up Cyberattacks, IBM Cautions Canadian Organizations</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-payment-rate-drops-to-record-low-as-attacks-surge/">Ransomware payment rate drops to record low as attacks surge</a></p><ul><li><p>Ransomware victims only pay approximately 28% of the time</p></li></ul></li><li><p><a href="https://www.dataminr.com/resources/intel-brief/slh-recruiting-women-for-vishing/">Scattered Lapsus$ Hunters (SLH) Kicks Off Campaign to Recruit Women</a></p><ul><li><p>With the prevelance of AI voice tools, it is interesting they are focusing on cruiting real women.</p></li></ul></li><li><p><a href="https://www.forbes.com/sites/daveywinder/2026/03/01/check-your-gmail-account-security-now-ongoing-attacks-reported/">New Gmail Account Attack Warning&#8212;Hackers Abuse Critical Security Check</a></p></li><li><p><a href="https://www.cybersecurity-insiders.com/when-copilot-can-see-too-much-why-ai-security-starts-with-data-governance/">When Copilot Can See Too Much: Why AI Security Starts with Data Governance</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d0b7cb2a-e67f-44d6-b278-2bef0f8c3460&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cyber Dimensions to the Defence Industrial Strategy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-18T17:25:56.808Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a0b6015-0fff-4ff1-a9f6-5e8f304977fc_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188287976,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Read my cyber review of the Defence Industrial Strategy. TL;DR: It will help a lot of Canada&#8217;s cyber industry, but there are gaps to overcome major hurdles regarding infrastructure and hyperscalers.</p><ul><li><p><a href="https://financialpost.com/technology/tech-news/the-cybersecurity-market-is-not-consolidating-it-is-rewiring-itself">The cybersecurity market is not consolidating. It is rewiring itself</a></p><ul><li><p>Article by Francois Guay, creator of the Canadian Cybersecurity Network. It&#8217;s an interesting article. I especially like his emphasis on the importance of leadership, which is exactly the thing that I have been saying the Government of Canada is lacking on cybersecurity.</p></li></ul></li></ul><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/">North Korean Lazarus group linked to Medusa ransomware attacks</a></p><ul><li><p>Medusa ransomware is a ransomware-as-a-service, which has been in operation for a few years now. North Korea is widely known to be heavily investing in ransomware operations to fund its regime, so this is continues to show it will use whatever tools are out there to get this done. Further, the fact that they appear to specifically be targeting healthcare is concerning for geopolitical reasons and because healthcare tends to be very cyber insecure.</p></li></ul></li><li><p>US <a href="https://techcrunch.com/2026/02/24/treasury-sanctions-russian-zero-day-broker-accused-of-buying-exploits-stolen-from-u-s-defense-contractor/">Treasury sanctions Russian zero-day broker accused of buying exploits stolen from US defense contractor</a></p><ul><li><p>They sanctioned OperationZero, which is the broker that purchased the exploits from the former L3Harris executive who was recently jailed:</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/24/former-l3harris-trenchant-boss-jailed-for-selling-hacking-tools-to-russian-broker/">Former L3Harris Trenchant boss jailed for selling hacking tools to Russian broker</a></p><ul><li><p>Sentenced to 7 years for selling 0day exploits to Russian buyer OperationZero.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/24/marquis-sonicwall-lawsuit-ransomware-firewall-breach/">Marquis sues firewall provider SonicWall, alleges security failings with its firewall backup led to ransomware attack</a></p><ul><li><p>Ouch. Cybersecurity companies, regardless of their services or products, should ensure their contracts are sound.</p></li></ul></li><li><p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/us-orders-diplomats-fight-data-sovereignty-initiatives-2026-02-25/">Exclusive: US orders diplomats to fight data sovereignty initiatives</a></p><ul><li><p>The United States does not want Canada to have digital sovereignty. For Canada to control what happens within its laws with data is apparently a concern for the United States. This should be a wake up call.</p></li></ul></li><li><p><a href="https://www.anthropic.com/news/statement-department-of-war">Anthrophic Refuses to Remove Safeguards Preventing Autonomous Killing</a></p><ul><li><p>Pentagon wanted no safeguards. Anthrophic reasonably understand why that&#8217;s a problem. Then Hegseth and the Trump Admin has proceeded to throw a temper tantrum <a href="https://www.politico.com/news/2026/02/27/trump-orders-all-federal-agencies-to-stop-using-anthropic-00804517">and ban all federal agencies to cease using Anthrophic</a>.</p></li><li><p><a href="https://archive.ph/MShGP">According to the New York Times: &#8220;the Pentagon wanted the company to allow for the collection and analysis of unclassified, commercial bulk data on Americans, such as geolocation and web browsing data&#8221;</a></p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/27/cisa-replaces-acting-director-gottumukkala-after-a-bumbling-year-on-the-job/">CISA replaces acting director after a bumbling year on the job</a></p><ul><li><p>CISA has been gutted by the Trump admin and is stumbling at every step.</p></li><li><p><a href="https://www.politico.com/news/2026/02/28/cisa-cyber-leadership-madhu-gottumukkala-00804515">Canceled contracts, a failed polygraph and personal disputes: Inside the turbulent tenure of Noem&#8217;s former cyber czar</a></p></li></ul></li><li><p><a href="https://www.peacecorps.gov/tech/">Peace Corps Announces the Tech Corps</a></p><ul><li><p>Using the Peace Corps to help people use&#8230; AI</p></li><li><p>This would be a good idea if it wasn&#8217;t focused on AI.</p></li></ul></li><li><p><a href="https://www.defenseone.com/threats/2026/02/strikes-iran-will-test-us-cyber-strategy-abroad-and-defenses-home/411782/">Strikes on Iran will test US cyber strategy abroad, and defenses at home</a></p><ul><li><p>There is a lot we still do not know about the use of cyber operations in the war against Iran, but we do know that Iran was innundated with attacks before Internet was cut.</p></li></ul></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-extortion-gang-claims-odido-breach-affecting-millions/">ShinyHunters extortion gang claims Odido breach affecting millions</a></p><ul><li><p>Obido is the Dutch telecom that I included last week. ShinyHunters is one of the top extortion gangs working right now.</p></li></ul></li><li><p><a href="https://therecord.media/netherlands-arrest-confidential-files-police">Dutch police arrest man who refused to delete confidential files shared by mistake</a></p><ul><li><p>Dutch police accidentaly gave a man access to confidential police documents and refused to give them back unless he receceived something in return. <a href="https://www.politie.nl/nieuws/2026/februari/13/07-man-aangehouden-voor-computervredebreuk-na-vergissing-politie.html">Police proceeded to arrest him for computer hacking</a>. &#8220;Computer hacking&#8221; is an absolute major stretch here as the police accidentally sent a download instead of an upload link. The man (allegedly) willingly downloaded the files and tried to extort the police, so there is some level of wrongdoing here.</p></li></ul></li><li><p><a href="https://therecord.media/ransomware-gangs-advancing-moscow-geopolitical-interests-warns-romania">Ransomware gangs advancing Moscow&#8217;s geopolitical aims, Romanian cyber chief warns</a></p><ul><li><p>It&#8217;s long been known in the information security community that there is cooperation, or at least some level of communication, between Russia&#8217;s intelligence organizations and Russian cyber criminals. There has been some research to show that there are direct connections between the government and intelligence organizations and criminal groups. It&#8217;s why it is always noteworthy when Russia arrests any cyber criminals. </p></li></ul></li><li><p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/us-orders-diplomats-fight-data-sovereignty-initiatives-2026-02-25/">US Orders diplomats to fight data sovereignty initiatives</a></p><ul><li><p>This is not a surprise and the natural escalation of activities from a country who doesn&#8217;t want your business but your subjugation, but will punish you for not wanting their business. The best solution is to stop using US products. The United States does not want Canada to have digital sovereignty.</p></li></ul></li><li><p><a href="https://cltc.berkeley.edu/2026/02/19/new-cltc-report-analyzes-cybersecurity-policy-across-state-legislatures/">New CLTC Report Analyzes Cybersecurity Policy Across State Legislatures</a></p><ul><li><p>&#8220;lawmakers across 37 states passed 99 cybersecurity-related bills in 2025, establishing 393 new cybersecurity rules cumulatively.&#8221;</p></li></ul></li><li><p><a href="https://united24media.com/latest-news/ukraine-turns-hackers-and-ai-loose-on-its-own-weapons-marketplace-to-hunt-cyber-threats-16157">Ukraine Turns Hackers and AI Loose on Its Own Weapons Marketplace to Hunt Cyber Threats</a></p><ul><li><p>AIs and LLMs are increasingly being used for bug and vulnerability hunting, so it&#8217;s not a surprise that Ukraine is one of the first to scale this.</p></li></ul></li><li><p><a href="https://edition.cnn.com/2022/03/30/politics/ukraine-hack-russian-ransomware-gang">&#8216;I can fight with a keyboard&#8217;: How one Ukrainian IT specialist exposed a notorious Russian ransomware gang</a></p><ul><li><p>Ukraine has some of the best cyber operators in the world.</p></li></ul></li><li><p><a href="https://www.by.cpartisans.org/post/kiberataka-kiberpartizan-na-himvolokno">Belarusian Cyber Partisans hacked Industrial Plant</a></p><ul><li><p>Cyber Partisans hacked a plant belonging to Khimvolokno, which produces nylon uses for Russian military body armour.</p></li></ul></li><li><p><a href="https://www.acm.nl/nl/publicaties/acm-zorgen-rondom-overname-solvinity-zien-niet-op-concurrentie">Netherlands Approves Sale of Solvinity</a> to Kyndryl</p><ul><li><p>Despite the Netherlands often being on the forefront of ensuring digital sovereignty, this means that a US company now owns most of the government&#8217;s cloud networks are now run by a US corportion. </p></li><li><p>As a Canadian I say welcome to the club!</p></li></ul></li><li><p><a href="https://www.techdirt.com/2026/02/27/palantir-sues-swiss-magazine-for-accurately-reporting-that-the-swiss-government-didnt-want-palantir/">Palantir Sues Swiss Magazine For Accurately Reporting That The Swiss Government Didn&#8217;t Want Palantir</a></p><ul><li><p>I am increasing hearing that Palatir is overrated anyways. Being overly litigious to protect your reptutation is increasing evidence maybe your product just sucks and the issue is the company just has no ethics and was the first in the game.</p></li></ul></li><li><p><a href="https://www.gov.uk/government/news/government-cuts-cyber-attack-fix-times-by-84-and-launches-new-profession-to-protect-public-services">UK Government cuts cyber-attack fix times by 84% and launches new profession to protect public services</a></p><ul><li><p>A very cool initiative that I wish the Canadian federal government would also adopt.</p></li></ul></li><li><p><a href="https://www.thelondoneconomic.com/business-economics/the-cyber-attack-that-accidentally-fixed-ms-402848/">The cyber attack that accidentally fixed M&amp;S</a></p><ul><li><p>An interesting story that suggest M&amp;S took time during their recovery from a cyber attack to rework its business that seems to have been a success.</p></li></ul></li><li><p><a href="https://openai.com/index/our-agreement-with-the-department-of-war/">OpenAI agreement with the Department of War</a></p><ul><li><p>OpenAI to allow Department of Defense to conduct domestic surveillance using Executive Order 12333, which allows the NSA to hide its domestic surveillance by tapping into infrastructure outside of the United States. This means OpenAI will be used by the NSA to conduct domestic surveillance against Americans.</p></li><li><p>Stop using OpenAI. Sam Altman is either a liar or is too stupid for his own good. This is a stepping stone to autonomous killing. This is Sam Altman and OpenAI helping the United States develop a means to avoid blame in war crimes by allowing them to blame AI.</p></li></ul></li><li><p><a href="https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes">Ukraine says cyberattacks on energy grid now used to guide missile strikes</a></p><ul><li><p>Cyberattacks on energy grid are used to collect intellligence to guide missiles strikes.</p></li></ul></li><li><p><a href="https://datamatters.sidley.com/2026/02/27/geopolitics-and-cybersecurity-japan-and-the-uk-announce-strategic-cyber-partnership-among-growing-global-focus-on-privacy-and-cyber-risks-posed-by-foreign-actors/">Japan and the UK Announce Strategic Cyber Partnership Among Growing Global Focus on Privacy and Cyber Risks Posed by Foreign Actors</a></p><ul><li><p>Canada has also signed a cyber-agreement with Japan and I believe Canada and Japan are already conducting defensive cyber ops together as well.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p><a href="https://therecord.media/uae-claims-it-stopped-terrorist-ransomware-attack">UAE claims it stopped &#8216;terrorist&#8217; ransomware attack</a></p><ul><li><p>Not sure I would say terrorist, but it&#8217;s not out of the question for a terrorist group to try ransomware as a source of funding.</p></li></ul></li><li><p><a href="https://edition.cnn.com/2026/02/25/politics/chatgpt-china-intimidation-operation">A Chinese official&#8217;s use of ChatGPT accidentally revealed a global intimidation operation</a></p><ul><li><p>Chinese information operations are slowly picking up intensity..</p></li></ul></li><li><p><a href="https://www.upguard.com/news/air-c-te-d-ivoire-data-breach-2026-02-24">Air C&#244;te d&#8217;Ivoire Data Breach</a></p><ul><li><p>Cote d&#8217;Ivoire airline hit by INC Ransomware.</p></li></ul></li><li><p><a href="https://archive.ph/VztRd#selection-1247.0-1247.58">Hacker Used Anthropic&#8217;s Claude to Steal Mexican Data Trove</a></p><ul><li><p>&#8220;They don&#8217;t believe the attack is tied to a Foreign government.&#8221; The limited details about this attack are quite interesting. Does not sound like a normal cyber threat actor, but potentially domestic actor or espionage. This is a lot of data they stole.</p></li></ul></li><li><p><a href="https://www.dpmc.govt.nz/our-programmes/national-security/cyber-security-strategy">New Zealand Releases new Cyber Security Strategy</a></p></li><li><p><a href="https://www.datacenterdynamics.com/en/news/aws-uae-outage-after-objects-struck-the-data-center-cause-fire-amid-iran-attacks/">AWS UAE suffers AZ outage after &#8220;objects strike data center&#8221; and cause fire, amid Iran attacks</a></p><ul><li><p>Physical attack affecting infrastructure, but nothing major on cyber front yet.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 21/02/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending February 21]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226</guid><pubDate>Mon, 23 Feb 2026 15:19:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ab1c0012-e33c-41f1-91fd-4da1b0a8d041_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have completed the first rough draft of my dissertation (yay!). I will be entering a big editing phase over the next few weeks, so my availability may fluctuate over the coming weeks.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://www.ctvnews.ca/sci-tech/article/canadian-researchers-develop-ai-tool-to-fight-online-disinformation/">Canadian researchers develop AI tool to fight online disinformation</a></p><ul><li><p>Feels like a drop in the bucket of the overwhelming amount of AI contributing to disinformation, but the people behind this are good people, so I hope it succeeds.</p></li></ul></li><li><p><a href="https://www.404media.co/leaked-email-suggests-ring-plans-to-expand-search-party-surveillance-beyond-dogs/">Leaked Email Suggests Ring Plans to Expand &#8216;Search Party&#8217; Surveillance Beyond Dogs</a></p><ul><li><p>&#8220;Search party&#8221; is an AI application that uses Ring Cameras to scan for lost pets. Emails now suggest that Ring has long term plans to not keep this to just pets. Ring cameras are growing in use in Canada, just as they are in the United States, and are essentially becoming private surveillance companies, not for households, but for themselves to eventually leverage for profit. </p></li></ul></li><li><p><a href="https://haveibeenpwned.com/Breach/CanadaGoose">HaveIBeenPwned Verifies Canada Goose Data Breach</a></p><ul><li><p>Canada Goose customer data stolen from a third party (supply chain!). Compromised data includes partial credit card, IP, physical address, names, phone numbers, email addresses. Lots of data stolen here.</p></li></ul></li><li><p><a href="https://cybernews.com/security/canada-goose-data-breach-claims/">Hackers claim Canada Goose breach but researchers reveal data is &#8220;several years old&#8221;</a></p><ul><li><p>Sounds like a third-party was attacked, but still an attack and Canada Goose is gauging the impact.</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/canada/nova-scotia/some-nova-scotia-power-customers-arent-paying-because-they-dont-trust-their-bills-9.7079819">Some Nova Scotia Power customers aren&#8217;t paying because they don&#8217;t trust their bills</a></p><ul><li><p>Nova Scotia Power&#8217;s customer base has lost a lot of trust in them following the cyberattack.</p></li></ul></li><li><p><a href="https://archive.ph/62YHY#selection-2419.0-2419.71">Organized crime groups targeting police data across Canada, report says</a></p><ul><li><p>One reason it is so difficult to govern cyberspace is that the state lacks a monopoly on violence, and private actors have the same capacity to infiltrate or access databases the state does not want them to access. Many cyber threat actors readily sell their services to organized crime, so law enforcement must respond and protect their systems accordingly.</p></li></ul></li><li><p><a href="https://betakit.com/quebec-has-a-new-digital-sovereignty-plan-will-it-work/">Qu&#233;bec has a new digital sovereignty plan. Will it work?</a></p><ul><li><p><a href="https://ici.radio-canada.ca/nouvelle/2228456/projet-numerique-gouvernement-quebec">Quebec has committed $1.4 billion for digital projects</a> to be developed in the province. Long story short, everyone loves to commit to digital sovereignty until it actually means making the tough decisions to cut out those that would put Canada&#8217;s digital sovereignty at risk. Current Quebec contracts with US corporations raise doubts on their actual commitment. Part of the trouble comes down to definitions of digital soverignty, which US corporations and governments use to ignore the actual issue and to continue business as usual with clear word play and legal definitions of what qualifies as &#8220;Canadian.&#8221; Hint: Being built in Canada is no longer enough because United States law dictates that it can force corporations in the United States to hand over data regardless of where it is in the world.</p></li></ul></li><li><p><a href="https://cybernews.com/security/global-data-leak-exposes-billion-records/">IDMerit data breach: 1 billion records of personal data exposed in KYC data leak</a></p><ul><li><p>Pretty massive supply chain attack. Unsure of the degree to which this affects Canada, but the degree to which IDMerit is used likely means Canadians are caught up with this.</p></li></ul></li><li><p><a href="https://ici.radio-canada.ca/nouvelle/2229291/choc-fm-cyberattaque-radio-station">A cyberattack paralyzes the CHOC FM radio station in Portneuf</a></p><ul><li><p>No matter how big or small, you are a target for ransomware. </p></li></ul></li><li><p><a href="https://secure.viewer.zmags.com/publication/6300b26c#/6300b26c/80">Canadian Defence Review has a nice survery of some of the top Canadian AI defence companies</a></p><ul><li><p>These articles are often little more than free marketing, but take this as an introduction to the topic.</p></li></ul></li><li><p><a href="https://defensescoop.com/2026/02/19/cryptocurrency-ai-cybercriminals-dod-cyber-crime-center/">DOD leaders warn AI, cryptocurrency &#8216;lowers the bar&#8217; for cybercriminals</a></p><ul><li><p>This is talking about the United States, but this is very much true globally. The barrier to entry was already relatively low, but AI/LLMs and cryptocurrency have made the barrier to entry simply getting around the weak controls of an LLM to tell you what to do.</p></li></ul></li><li><p><a href="https://archive.ph/VNtu8#selection-2493.0-2493.101">Ottawa plans major investment in non-profit launched by AI pioneer to build safe, trustworthy systems</a></p><ul><li><p>I&#8217;m a heavy critic of Evan Solomon as AI Minister, butr this is a good move. I don&#8217;t know much about LawZero, but it has a big focus on security and trust, so I am a big proponent of this.</p></li></ul></li><li><p><a href="https://rcmp.ca/en/news/2026/02/4350451">Youth involved in terrorist activities of the 764 Network/The Com placed on Peace Bond by RCMP</a></p><ul><li><p>The Com is one of the more heinous groups operating.</p></li></ul></li><li><p><a href="https://mda.space/article/mda-space-launches-49north-a-canadian-defence-business-delivering-multi-domain-and-mission-critical-capabilities">MDA Space Launches 49North, a Canadian defence business delivering multi-domain and mission-critical capabilities</a></p><ul><li><p>MDA Space is one of Canada&#8217;s top space capabilities firm, so this move is no surprise and I anticipate that they will have a lot of success.</p></li></ul></li><li><p><a href="https://archive.ph/WD8PQ">Tumbler Ridge shooter&#8217;s ChatGPT messages were flagged months before attack</a></p><ul><li><p>&#8220;The Wall Street Journal reported Friday that employees at ChatGPT wanted law enforcement to be warned after the shooter&#8217;s posts about gun violence last June were flagged by OpenAI&#8217;s automatic review systems. Their concerns were rebuffed, the WSJ reported, quoting unnamed sources familiar with the matter.&#8221;</p></li></ul></li><li><p><a href="https://www.newswire.ca/news-releases/bell-cyber-and-radware-expand-ai-driven-cloud-delivered-security-services-to-address-evolving-cyber-threats-869526559.html">Bell Cyber and Radware expand AI-driven, cloud-delivered security services to address evolving cyber threats</a></p><ul><li><p>What&#8217;s the solution to more vulnerabilities and threats because of AI? Add more AI to the mix for the defenders.</p></li></ul></li><li><p><a href="https://www.newswire.ca/news-releases/micrologic-partners-with-cohesity-to-become-the-leading-sovereign-cloud-data-protection-solution-in-canada-880032567.html">Micrologic Partners with Cohesity to Become the Leading Sovereign Cloud Data Protection Solution in Canada</a></p><ul><li><p>Digital sovereignty is the it product to sell right now, so if you can develop and sell a capability that promotes digital sovereignty you&#8217;re in for a smooth ride.</p></li></ul></li><li><p><a href="https://www.anthropic.com/news/claude-code-security">Anthropic announces Clause Code Security</a></p><ul><li><p>Anthropic&#8217;s Claude LLM was already popular for programming and being used for code review for vulnerabilities and Claude has now developed a model specifically for this.</p></li></ul></li><li><p><a href="https://www.pcgamer.com/hardware/as-many-seek-a-discord-alternative-teamspeak-claims-an-incredible-surge-of-new-users-has-maxed-out-its-hosting-capacity-in-multiple-regions/">TeamSpeak claims an &#8216;incredible surge of new users&#8217; has maxed out its hosting capacity in multiple regions as many would-be voice chatters seek a Discord alternative</a></p><ul><li><p>Feeling like the 2000s again! Can&#8217;t blame everyone for avoiding Discord following its announcement that it would require ID scans. Discord had a data leak last year, so raises doubts about their security.</p></li></ul></li><li><p><a href="https://www150.statcan.gc.ca/n1/daily-quotidien/260218/dq260218d-eng.htm">2024 Canadian Defence, Aerospace, Marine and Cybersecurity Industries Survey Released</a></p><ul><li><p>You have to actually request them, but I think I may request them and see if I can pull any interesting information from it.</p></li></ul></li><li><p><a href="https://news.gov.bc.ca/releases/2026JEG0015-000167">BC Invests in Quantum Computing Research</a></p><ul><li><p>Functional quantum computing is still quite a way out, but the stepping stones to it will have major impacts.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/government/system/laws/developing-improving-federal-regulations/red-tape-reduction-office/horizontal-red-tape-reviews.html">Horizontal Red Tape Reviews</a></p><ul><li><p>The federal government wants to hear from you about regulations which may impede business activities.</p></li></ul></li><li><p><a href="https://www.ourcommons.ca/DocumentViewer/en/45-1/SECU/meeting-25/notice?">The House of Commons Public Safety and National Security committee will be doing a clause-by-clause consideration of Bill C-8</a></p><ul><li><p>I largely haven&#8217;t covered Bill C-8 because of burnout from its predecessor, but this is one to keep an eye on. While it&#8217;s a good step forward, it does have its issues.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/news/2026/02/government-of-canada-launches-call-for-proposals-to-establish-defence-innovations-secure-hubs-for-quantum-and-uncrewed-system-technologies.html">Government of Canada launches CFP to establish Defence Innovations Secure Hubs for quantum and uncrewed system technologies</a></p><ul><li><p>The Bureau of Research, Engineering, and Advanced Leadership in Innovation and Science (BOREALIS) is launching a CFP to establish secure hubs for quantum. A great difficulty in quantum is being able to interact with defence officials and the military, so this should be a big help in contributing to cross-sector discussion, innovation, and advancement.</p></li></ul></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-003-vulnerability-affecting-beyondtrust-cve-2026-1731">Alert - AL26-003 - Vulnerability affecting BeyondTrust - CVE-2026-1731</a></p></li><li><p><a href="https://www.dexpose.io/play-ransomware-targets-canadian-organization-makivik/">Play Ransomware Targets Canadian Organization Makivik</a></p><ul><li><p>Play ransomware claims to have targeted <a href="https://www.makivvik.ca/">Makivvik</a>, a Quebec Inuit organization.</p></li></ul></li><li><p><a href="https://hackread.com/china-hackers-dell-recoverpoint-flaw-grimbolt-malware/">China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware</a></p><ul><li><p>The federal government uses a lot of Dell equipment. I do not think RecoverPoint is used, or at least not common, but I would not be surprised if there is some limited exposure to this.</p></li></ul></li><li><p><a href="https://securelist.com/keenadu-android-backdoor/118913/">Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets</a></p><ul><li><p>A really interesting botnet to watch out for on Android devices: &#8220;[deploys] components that click on ads inside a hidden container, hijack browser search settings, or deploy unwanted apps in pay-per-install schemes.&#8221;</p></li></ul></li><li><p><a href="https://www.cyderes.com/howler-cell/0apt-bluff-campaign-evolves-into-potential-threat">0APT Bluff Campaign Evolves Into Potential Threat</a></p><ul><li><p>Despite a lot of 0APT fake intrusions, they are in fact deploying an encryptor.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/ai-platforms-can-be-abused-for-stealthy-malware-communication/">AI platforms can be abused for stealthy malware communication</a></p><ul><li><p>Not surprised at all. If you can get something to point anywhere, it will be used for C2.</p></li></ul></li><li><p><a href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AI-augmented threat actor accesses FortiGate devices at scale</a></p><ul><li><p>A closer look at how a threat actor used commercial AI to compromise 600 FortiGate devices in more than 55 countries.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/">CISA: BeyondTrust RCE flaw now exploited in ransomware attacks</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d0b7cb2a-e67f-44d6-b278-2bef0f8c3460&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cyber Dimensions to the Defence Industrial Strategy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-18T17:25:56.808Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a0b6015-0fff-4ff1-a9f6-5e8f304977fc_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188287976,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Read my cyber review of the Defence Industrial Strategy. TL;DR: It will help a lot of Canada&#8217;s cyber industry, but there are gaps to overcome major hurdles regarding infrastructure and hyperscalers.</p><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.nextgov.com/cybersecurity/2026/02/cisa-threat-hunting-leader-depart-private-sector-role/411457/">CISA threat-hunting leader to depart for private sector role</a></p><ul><li><p>CISA used to be one of the most respected cyber security organizations in the world. Now it&#8217;s a hollow shell.</p></li></ul></li><li><p><a href="https://www.federalregister.gov/documents/2026/02/13/2026-02948/cyber-incident-reporting-for-critical-infrastructure-act-circia-rulemaking-town-hall-meetings">CISA and DHS Conducting Town Hall Meetings Regarding Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Rulemaking</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/">Data breach at fintech firm Figure affects nearly 1 million accounts</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/">Mississippi Medical Center closes all clinics after ransomware attack</a></p><ul><li><p>Hospitals often fight cybersecurity regulations, yet are some of the favourite targets for threat actors. They have closed all clinics and rescheduled many appointments, including surgeries.</p></li></ul></li><li><p><a href="https://www.nextgov.com/cybersecurity/2026/02/us-cyber-responses-will-be-linked-adversary-actions-and-involve-industry-coordination-official-says/411525/">US cyber responses will be &#8216;linked to adversary actions&#8217; and involve industry coordination, official says</a></p><ul><li><p><a href="https://therecord.media/usa-cyber-actors-consequences">US needs to impose &#8216;real costs&#8217; on bad actors, State Department cyber official says</a></p></li><li><p>A lot of statements from US government about imposing costs on cyber threat actors and including industry in this response. Remains to be seen how or what this response will be or if it&#8217;s a lot of hot air.</p></li></ul></li><li><p><a href="https://www.ic3.gov/CSA/2026/260219.pdf">Increase in Malware Enabled ATM Jackpotting Incidents Across United States</a></p><ul><li><p>FBI Flash report on the increase in ATM jackpotting malware.</p></li></ul></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://thehackernews.com/2026/02/safe-and-inclusive-esociety-how.html">Safe and Inclusive E&#8209;Society: How Lithuania Is Bracing for AI&#8209;Driven Cyber Fraud</a></p><ul><li><p>The Baltic states tend to be on the forefront of addressing deception-based attacks in part due to being undering constant attack from Russian through information confrontation.</p></li></ul></li><li><p><a href="https://cyberhub.am/en/blog/2026/02/16/massive-wave-of-whatsapp-takeover-attacks-targeting-armenian-users-what-happened/">Massive Wave of WhatsApp Takeover Attacks Targeting Armenian Users &#8212; What Happened</a></p></li><li><p><a href="https://www.haaretz.com/israel-news/security-aviation/2026-02-16/ty-article-magazine/.premium/your-car-is-spying-on-you-and-israeli-firms-are-leading-the-surveillance-race/0000019c-6651-d2f0-a19c-7fdd81920000">Your Car Is Spying on You &#8211; and Israeli Firms Are Leading the Surveillance Race</a></p></li><li><p><a href="https://cyberinsider.com/dutch-telco-odido-suffers-data-breach-exposing-data-of-6-2-million-customers/">Dutch telco Odido suffers data breach exposing data of 6.2 million customers</a></p><ul><li><p>Pretty significant breach.</p></li></ul></li><li><p><a href="https://meduza.io/news/2026/02/17/gosduma-prinyala-zakon-pozvolyayuschiy-blokirovat-svyaz-po-trebovaniyu-fsb-dazhe-esli-net-ugrozy-bezopasnosti">The State Duma passed a law allowing communications to be blocked at the request of the FSB, even if there is no security threat</a></p><ul><li><p>Bureaucratic efficiency in Russia is passing laws that mean that your security services no longer have to lie to do what they were already doing.</p></li></ul></li><li><p><a href="https://www.politico.eu/article/eu-parliament-blocks-ai-features-over-cyber-privacy-fears/">EU Parliament blocks AI tools over cyber, privacy fears</a></p><ul><li><p>Blocked in large part because that such tools sent data to servers outside the control of the EU. This is what taking digital sovereignty seriously looks like.</p></li></ul></li><li><p><a href="https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-opens-investigation-x-xiuc">Ireland&#8217;s Data Protection Commission opens investigation into X (XIUC)</a></p><ul><li><p>Ireland joining many other ethical countries by iniating an investigation into Twitter/X due to the profiting of of Grok&#8217;s use of deepfakes for nonconsensual sexual material and child sexual abuse material.</p></li></ul></li><li><p><a href="https://www.theregister.com/2026/02/18/adidas_investigates_thirdparty_data_breach/">Adidas investigates third-party data breach after criminals claim they pwned the sportswear giant</a></p><ul><li><p>Allegedly includes technical data.</p></li></ul></li><li><p><a href="https://decode39.com/13552/hack-exposes-data-of-5000-italian-counterterrorism-officers/">A Chinese hack exposes data of 5,000 Italian counterterrorism officers</a></p><ul><li><p>A pretty major attack and intelligence win for China.</p></li></ul></li><li><p><a href="https://www.dw.com/en/deutsche-bahn-says-cyberattack-hit-ticket-and-info-systems/a-76024130">Deutsche Bahn says cyberattack hit ticket and info systems</a></p><ul><li><p>German rail operator is being hit with a significant DDoS attack that is described as coming in waves.</p></li></ul></li><li><p><a href="https://digital-strategy.ec.europa.eu/en/news/eu-cyber-census-2025">EU Cyber Census 2025</a></p><ul><li><p>EU Cyber Census tracks the implementation of the <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:52022JC0049">EU Policy on Cyber Defence</a>. Full report is classified, but executive summary indicates EU members are all slowly developing their own cyber commands and cyber forces.</p></li></ul></li><li><p><a href="https://therecord.media/attackers-breach-france-national-bank-account-database">Attackers breach France&#8217;s national bank account database</a></p><ul><li><p>This is a pretty major attack, the first of its kind on a target of this type, as far as I know, in terms of accessing the country&#8217;s National Bank Accounts File (FICOBA), recording all bank accounts in the country. Depending on how much information the attacker accessed, this could be leveraged for all sorts of fraud and phishing.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p><a href="https://therecord.media/hackers-target-iran-protest-supporters-cyber-campaign">Hackers target supporters of Iran protests in new espionage campaign</a></p></li><li><p><a href="https://www.abc.net.au/news/2026-02-17/transcripts-federal-court-viq-solutions-e24-technologies-india/106349338">Highly sensitive Australian court data accessed by foreign entity based in India</a></p><ul><li><p>An Indian subcontractor that was hired by an Australian firm in breach of a contract accessed Australian court data.</p></li></ul></li><li><p><a href="https://archive.ph/tb5qF#selection-693.0-693.53">A Wave of Unexplained Bot Traffic Is Sweeping the Web</a></p><ul><li><p>Traffic is linked to Lanzhou, China</p></li></ul></li><li><p><a href="https://archive.ph/BkzSX#selection-1199.0-1199.66">How Private Equity Debt Left a Leading VPN Open to Chinese Hackers</a></p><ul><li><p>Chinese hackers breached Ivanti&#8217;s internal networks back in 2021.</p></li></ul></li><li><p><a href="https://therecord.media/leading-japanese-semiconductor-supplier-ransomware">Advantest Responds to Cybersecurity Incident</a></p><ul><li><p>Advantest makes semiconductor test equipment and is responding to ransomware attack.</p></li></ul></li><li><p><a href="https://www.nationalcrimeagency.gov.uk/news/fraudsters-arrested-in-nigeria-following-nca-intelligence-sharing">Fraudsters arrested in Nigeria following NCA intelligence sharing</a></p><ul><li><p>Cambodia isn&#8217;t the only one with scam compounds. Nigeria is historically known for fraud (who remembers the Nigerian prince scams?), so it&#8217;s not a surprise the &#8220;compound&#8221; organizational concept is being globalized.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cyber Dimensions to the Defence Industrial Strategy]]></title><description><![CDATA[I breakdown where cyber and cyber security play a role in Canada's Defence Industrial Strategy]]></description><link>https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Wed, 18 Feb 2026 17:25:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3a0b6015-0fff-4ff1-a9f6-5e8f304977fc_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><strong>Canadian Cyber in Context is sponsored by</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.123cyber.ca/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png" width="442" height="170.30357142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:561,&quot;width&quot;:1456,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:26108,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.123cyber.ca/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">123 Cyber Inc.</figcaption></figure></div><h6><strong>All views expressed belong to Canadian Cyber in Context and do not reflect the position of any sponsor.</strong></h6><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p></p><div><hr></div><p>On February 17th, the Government of Canada finally released its long-awaited <a href="https://www.canada.ca/en/department-national-defence/corporate/reports-publications/industrial-strategy.html">Security, Sovereignty and Prosperity: Canada&#8217;s Defence Industrial Strategy</a>. As authoritarian states rise and seek to dismantle the rules-based international order established since the end of World War 2, Canada cannot rely on its allies and must increase its own defence investments to counter decades of inattention. The Defence Industrial Strategy is meant to accomplish this and I will breakdown and highlight where cyber and broader ICT plays a role in the strategy.</p><p>The vision of the Defence Industrial Strategy is to build "A robust Canadian defence industry that provides technological and operational advantage to the Canadian Armed Forces and its security partners in their mission to defend Canada, and maximizes growth, job creation and economic benefits for all Canadians."</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>The Strategy has five pillars:</p><ol><li><p>Renewing the government&#8217;s relationship with industry</p></li><li><p>Procuring strategically through the new Defence Investment Agency and a new Build-Partner-Buy framework</p></li><li><p>Investing purposefully to strengthen an innovative Canadian defence sector</p></li><li><p>Securing supply chains for key inputs and goods</p></li><li><p>Working with domestic partners, including in Canada&#8217;s North and Arctic</p></li></ol><p>The Strategy identifies seven key areas where Canada already has strengths: space, <strong>artificial intelligence</strong>, <strong>cyber</strong>, <strong>quantum technologies</strong>, medical countermeasures, robotics, and drones. These are key areas that area repeated throughout the strategy and where we will see some of the largest and most focused investments.</p><p>Many of the key 10-year goals of the strategy will impact including build world-leading Canadian firms in key sovereign capability areas; increase the share of defence acquisitions awarded to Canadian firms to 70%; accelerate procurement of successful Canadian R&amp;D innovations; boost government investment in defence-related reseach and development by 85%; increase total Canadian defence industry revenues by more than 240%; grow defence revenues for Canadian SMEs by more than $5.1 billion annually; increase Canada&#8217;s defence exports by 50%; create 125,000 new jobs.</p><p>All of these goals tie directly into Canada&#8217;s cybersecurity industry, which is as dual-use of a technology as you can get.</p><div><hr></div><h3>Cyber as a Key Sovereign Capability</h3><p>The federal government&#8217;s increased focus on defence matters has also coincided with a greater emphasis on cyber as a key capability, yet it is often overlooked because many capabilities are not considered intrinsically required for national security. In the Defence Industrial Strategy, the government actually lays out the Canada&#8217;s key sovereign capabilities. While there is no specific &#8220;cyber&#8221; capability, the closest is Digital Systems, with some overlap with other key capabilities areas.</p><p>Key Area 3: Digital Systems</p><ul><li><p>Secure Cloud; Artificial Intelligence; Quantum Computing and Communications; Integrated Command, Control and Communications; High-Assurance Communications Equipment</p></li></ul><p>You can also say cyber touches on:</p><p>Key Area 1: Aerospace:</p><ul><li><p>Aerospace Platforms; Avionics; and Aircraft Communications.</p></li></ul><p>Key Area 6: Sensors</p><ul><li><p>Marine Sensors; Quantum Sensors; Electronic Warfare.</p></li></ul><p>Key Area 7: Space</p><ul><li><p>Space-based intelligence; Surveillance and Reconnaissance; Space Domain Awareness; Satellite Communications; Space Launch.</p></li></ul><p>Cyber and digital capabilities touch nearly everything. Although the areas above are most directly connected to cyber, it can be argued that everything relies on cyber in some capacity; the question is how large or small that role is. The future of warfare is data and connectivity, which means cyber is at the heart of everything.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bIr6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bIr6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 424w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 848w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 1272w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bIr6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png" width="694" height="436" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:436,&quot;width&quot;:694,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:102578,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bIr6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 424w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 848w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 1272w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Canadian Cyber Security Industry Quick Facts</h3><ul><li><p>Canada is the 4th largest hub for cybersecurity in the world</p></li><li><p>The broader cyber security industry and value chain contribute more than $3.2 billion to Canada&#8217;s annual GDP, representing more than 30,000 jobs.</p></li><li><p>In 2020, Canadian cyber security services produced over $1.15 billion in exports, with nearly 80% going to Five Eyes partners.</p></li><li><p>94% of Canada&#8217;s cyber firms are SMEs and 99.7% of Canadian AI firms are SMEs</p></li><li><p>The research and development intensity in the cyber security industry was close to 2.5 times the Canadian ICT average in 2020.</p></li><li><p>Growth in cyber security revenues is nearly double that of the broader ICT sector</p></li></ul><p>In other words, Canada&#8217;s cyber security is a major economic force in the country and was already growing quickly without the additional support and investments via the defence industrial strategy. Many of these figures are old, but the stats remain the same or are even higher in 2025/26. </p><p>The strategy estimates that more than <strong>half a trillion</strong> <strong>dollars</strong> of downstream economic activity and overall investment will occur. This is a massive opportunity for Canada&#8217;s cyber industry that must take advantage, but it will take some adjusting to understand the nuances of the defence sector compared to the general market. </p><div><hr></div><h3>Pillar 1: Renewing Relationship with Industry</h3><p>While no one will dispute that there is an inefficient and unproductive relationship between the federal government and defence industry, the cyber security industry wishes it had the relationship with the government that the defence industry does.</p><p>In Canada&#8217;s National Cyber Security Strategy, forging whole-of-society partnerships was the first objective that centred on a Canadian Cyber Defence Collective. <a href="https://www.cyberincontext.ca/p/whats-happening-with-the-canadian">However, the government&#8217;s efforts to do this are not off to a great start</a>. The cyber industry should not expect any cyber-specific gains or advantages from Pillar 1 efforts, but there is still room for cyber to benefit from this, as with all other sectors. </p><p>This pillar focuses on how the government will improve its engagement with industry, including through procurement and partnerships. This includes the already launched <a href="https://www.canada.ca/en/defence-investment-agency.html">Defence Investment Agency</a>, as well as two other key actions of interest to the cyber industry in security clearance and ISED support.</p><p>The government will invest to speed up the security clearance process. This is something that everyone, including cyber folk, is hit with. Many people must go through the process to work in a field that many complain is overly classified, which can bottleneck operations due to security clearance requirements. This is good news for everyone.</p><p>The Government will also be investing in &#8220;dedicated ISED &#8216;concierge&#8217; service for companies working on defence and dual-use technologies.&#8221; This includes cyber and is likely to be of a massive benefit once implemented. Given the niche, small areas cyber firms can cover, this concierge service and the many opportunities listed are likely to be a significant advantage for the cyber industry and the broader defence industry in integrating Canadian cyber.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xpYQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xpYQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 424w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 848w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 1272w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png" width="324" height="306" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:306,&quot;width&quot;:324,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50923,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xpYQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 424w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 848w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 1272w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Pillar 2: Procuring Strategically/Build-Partner-Buy Framework</h3><p>This pillar centers on Canada&#8217;s need to develop strategic capabilities domestically, supported by the Build-Partner-Buy framework to guide this process. A significant focus here is on developing and securing Canadian intellectual property (IP) to ensure Canada maintains strategic capability and that the economic benefits of that IP remain in Canada.</p><p>The Build-Partner-Buy framework will be an approach led by the Defence Investment Agency to integrate the separate defence, industry, and procurement authorities and inputs to enable faster, coordinated decisions on capability acquisition. The framework seeks to prioritize purchasing from Canadian suppliers, investing in Canadian capabilities, including frontier areas such as AI and cyber, and partnering to build and maintain sovereign control. The <a href="https://www.canada.ca/en/defence-investment-agency/programs/projects-partnerships.html">Defence Investment Agency has already taken on multiple projects</a>, including the Enhanced Satellite Communications Project &#8211; Polar, Airborne Early Warning and Control, Operational Training Infrastructure Enterprise Modernization, and others that are cyber or overlap with cyber. </p><p>Part of this pillar that has already been making headlines is that the Government will enter into partnerships with &#8220;champions&#8221; to help &#8220;[secure] domestic ownership and control over critical intellectual property and capacities - while also supporting Canada&#8217;s larger geopolitical objectives&#8230;&#8221; The government has already been doing this to a degree If you have been following the <a href="https://www.canada.ca/en/innovation-science-economic-development/news/2025/08/canada-partners-with-cohere-to-accelerate-world-leading-artificial-intelligence.html">government&#8217;s approach to AI at all and their support of Cohere</a>. This is a good approach and something that could be good with championing certain cyber firms, but it comes down to their process.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Tdmj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Tdmj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 424w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 848w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 1272w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png" width="554" height="390" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:390,&quot;width&quot;:554,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:148550,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Tdmj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 424w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 848w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 1272w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It is important to note that this approach is intended to protect IP and the economic benefits thereof <strong>AND</strong> to safeguard strategic capabilities and knowledge for Canada&#8217;s security. The framework&#8217;s emphasis on domestic reinvestment and sovereign control has a major impact on cyber capabilities. As the top cloud and AI hyperscalers are all American, there are no Canadian firms occupying the same space and competing at the same level as AWS, Microsoft, or Google. This means that there will need to be a middle ground between investment and purchasing of Canada products balanced with non-Canadian products and services that the Government of Canada will need to find ways to invest in while avoiding risks to Canada&#8217;s digital sovereignty. However, the Government of Canada has yet to demonstrate a full understanding of how to maintain digital sovereignty, <a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">as current policies still risk it by using cloud and AI data centres owned by American corporations</a>. Despite these troubles, the partner dimension of the framework opens major opportunities with European enterprises, many of which are in a similar position as Canada, to leverage mutual efforts to build American-free cloud and AI infrastructure.</p><p>It appears the government will use the Industrial and Technical Benefits (ITB) Policy as a key lever to achieve many of these objectives. I have long advised any company or individual in the Canadian cyber space dealing with defence that ITBs are your key.  ITBs are massive math equations for businesses that quantify how a government contract with said business will benefit the Canadian economy. The government&#8217;s intent to reform this system could benefit Canada's cyber sector by enhancing the benefits of hiring Canadian cyber firms. I have long said the ITB is the lever to actually build a coherent and strong Canadian defence ecosystem, not just defence industry. This is likely to be of incredible importance and benefit as the <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada.html">Canadian Program for Cyber Security Certification</a> slowly enters into force over the next few years and increases cyber security compliance demands for Canada&#8217;s defence industrial base. </p><p>The proposed changes include: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CLxI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CLxI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 424w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 848w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 1272w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CLxI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png" width="551" height="654" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2692540-294f-4c38-bd91-aa6689e1f804_551x654.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:654,&quot;width&quot;:551,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:196323,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CLxI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 424w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 848w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 1272w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4ygY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4ygY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 424w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 848w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 1272w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4ygY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png" width="577" height="378" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:378,&quot;width&quot;:577,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:71509,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4ygY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 424w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 848w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 1272w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Pillar 3: Investing to Strengthen Canadian Defence Innovation</h3><p>This pillar focuses on broad mechanisms that support defence innovation, including government initiatives and broader economic conditions that encourage investment. Many of the listed mechanisms are applicable to cyber, but it depends on finding the right program and CFP. It can be difficult for cyber capabilities to fit into many of these programs due to the niche nature of their work or product, so I at least hope they are developing these new programs with this in mind and recognizing that cyber is a frontier and key sovereign capability that needs to be recognized and included.</p><p>Where cyber is likely to see the biggest benefit is the additional capital for investment and support for defence exports. There is significant competition right now, but if you have a key sovereign capability, you should engage with all of these instruments. As noted above, Canada already is a major player in cyber security and support from the government can help to maintain and grow Canada&#8217;s cyber industry. The strategy also touches on growing the defence workforce, which should include cyber security professionals, but unfortunately, this is unlikely to be the case.</p><div><hr></div><h3>Pillar 4: Securing Supply Chains</h3><p>This section discusses securing supply chains in a way that differs from how we do in cyber. A very loose definition of the supply chain in cyber refers to the components and applications that make up an individual piece of software or business suite. A compromise of a single supplier in a cyber supply chain can compromise the entire product or service. This is increasingly a common vector for cyber attacks. However, this section focuses on securing capacity or access to physical supply chains such as critical minerals or steel. As a result, these initiatives are unlikely to have a major impact on cyber.</p><p>One area which could impact cyber is the government&#8217;s commitment to looking at &#8220;legislative and policy tools to safeguard its most sensitive technologies, research, and know-how from malign actors.&#8221; Two potential dimensions to this instantly come to mind. First, as cyber operations are a common mode for intellectual property theft, the government may be seeking ways to punish cyber threat actors. Second, the government could be looking at levers to punish actors which try to export intellectual property illicitly. The section is quite unclear about this, but both raise interesting questions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2apF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2apF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 424w, https://substackcdn.com/image/fetch/$s_!2apF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 848w, https://substackcdn.com/image/fetch/$s_!2apF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 1272w, https://substackcdn.com/image/fetch/$s_!2apF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2apF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png" width="340" height="336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:336,&quot;width&quot;:340,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:56116,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2apF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 424w, https://substackcdn.com/image/fetch/$s_!2apF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 848w, https://substackcdn.com/image/fetch/$s_!2apF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 1272w, https://substackcdn.com/image/fetch/$s_!2apF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div><hr></div><h3>Pillar 5: Working with Domestic Partners, including in Canada&#8217;s North and Arctic</h3><p>Of the categories, Pillar 5 is likely the least directly connected to cyber issues, but that does not make it any less important. Pillar 5 includes collaborating with provinces and territories, indigenous groups, and Northern and Arctic partners. Much of this section discusses partnering with local communities to ensure the critical infrastructure and capacity needed to secure Canadian sovereignty. </p><p>The most direct connections to cyber here are that in the North and Arctic there is very little digital infrastructure. The government is currently investing in satellites to improve connectivity in the North and Arctic, but relying solely on satellites is risky; you will also need on-the-ground infrastructure. Satellites are prime real estate for cyber threat actors, especially during an invasion or active conflict. Nevertheless, to accomplish anything the government wants, cyber or otherwise, you need people, which is much easier said than done. Cyber security and cyber overall are often known for their labour shortages, while it is debatable about how much of a shortage there actually is, this is something that should be really addressed in the workforce of the future and in the North and Arctic. </p><p>There is a significant opportunity among people in the North and Arctic, and cyber is a powerful vehicle and sector to support this enable further growth.</p><p></p><div><hr></div><h3>Takeaways - So What?</h3><p>There is much to commend in the Defence Industrial Strategy overall, and it is well received in part because it is well constructed. Over the past few years, Canada has been bad at developing strategies. As Phil Lagasse says, Canada doesn&#8217;t do strategy. So, it is good to see them actually hit it out of the park on this one.</p><p>That said, from a cyber and digital perspective, this strategy is likely to benefit Canada&#8217;s cyber industries overall but is unlikely to affect capabilities that require a hyperscaler-level corporation. Ultimately, many of these efforts will help support and grow Canada&#8217;s defence and cyber industries, but current investment plans do not provide the means to counter the major risks to Canada&#8217;s digital sovereignty posed by hyperscalers. The reason I included stats about Canada&#8217;s cyber industry at the start is to highlight just how many are SMEs, which struggle to engage with DND/CAF. They often rely on attaching themselves to a large, prime contractor to contribute to a larger contract or do task-based contracts. Defence traditionally has a very difficult time engaging with start ups and small businesses, which is where most of the advanced, emerging cyber innovation is done. There is a lot of room for improvement in how DND/CAF engaged with Canada&#8217;s cyber industry and ecosystem, which this strategy is certain to help, we must be realistic about its limitations in affecting the broader economic realities of cyber and broader ICT industry.</p><p>Cyber and ICT are among the most dual-use technologies you can get. Individuals, businesses, and government agencies largely use the same software, run on the same operating systems, use the same protocols, and employ similar network technologies (for the most part). The difference between civilian and security or defence software or ICT, in most cases, is often about scale, uptime, use case, and additional security and protection. You can find many Canadian SMEs that develop niche software or hardware applications, but in certain major hyperscaler capabilities, you are unable to find a major Canadian corporation that can readily fill this spot anytime soon. </p><p>Secure Cloud/Secret Cloud is a perfect example of this and why I have been talking about it non-stop for 5 years. Secret Cloud refers to the military capability of a cloud networking environment that supports the use of secret-level data, including operational data. There is no single &#8220;Secure Cloud&#8221; or &#8220;Secret Cloud&#8221; project for DND/CAF; however,&nbsp;<a href="https://apps.forces.gc.ca/en/defence-capabilities-blueprint/project-details.asp?id=1546">Information Technology Infrastructure in Support of Command and Control</a>&nbsp;(ITI in SP of C2) is the primary one discussed when we talk about military secret cloud. The $250 to $499 million funding range is very small. To get a secret cloud in the way DND/CAF wants/needs will likely be more expensive than this. This is part of why the project has been taking so long: the cost expectations and the lack of a sole-source Canadian option. </p><p>ITI in SP of C2 is software- and hardware-intensive, with a large infrastructure footprint that likely requires a hyperscaler to support. That means either Amazon Web Services, Microsoft, Google Cloud, or potentially Oracle (All American). <a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">As I have discussed, there are significant sovereignty concerns with using any American cloud option</a>. The only potential Canadian option that I am aware of is ThinkOn, but the scale and depth of security and control required may be beyond what ThinkOn can provide at this time, given its relatively new position in the government cloud space compared to its American competitors. However, investment in ThinkOn or another sovereign Canadian option could position it as one of the &#8220;Canadian champions&#8221; competing with American hyperscalers for security- and defence-related cloud capabilities, but this will take time, which is not on our side.</p><p>The problem with these options is that, strategically, DND/CAF needed a secret cloud a couple of years ago. The ITI in SP of C2 has been stuck in the definition phase for many years. The implementation is (currently) scheduled to begin in 2025/2026, with initial delivery in 2028/29 and final delivery in 2030/31. Although the project is delayed and has encountered difficulties, the timeline can still be met, but it would require an American hyperscaler. Digital transformation and broader military modernization increasingly require cloud networking to enable seamless data transfer and support capabilities, including NORAD's cloud-based command and control and the many electronic and information capability suites of the F-35. As these capabilities are currently being acquired, there cannot be any further delay in DND/CAF acquiring its own secret cloud.</p><p>To compete with hyperscalers, the Government of Canada needs to think about sovereign Canadian cloud in terms of major government projects and understand the limits of the current economies of scale which make cloud, AI and other infrastructure-dependent capabilities difficult to overcome with the present Canadian business landscape. Canada&#8217;s cyber industry is world-leading and its SMEs are some of the best in the industry, but they usually cannot compete with hyperscaler capabilities in data centre and data infrastructure. If we fail to recognize the overreliance on last-mile technologies, we overlook that it is the first-mile technologies and infrastructure, like data centres, that the first-mile relies upon and determine if Canada maintains digital sovereignty.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 14/02/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending February 14]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226</guid><pubDate>Tue, 17 Feb 2026 12:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xNeN!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>Rewire is out on Tuesday due to the holiday, regular will be released on Monday next week.</p></li><li><p>I have begun receiving large batches of completed ATIPS that I requested, which are available to subscribers <a href="https://www.cyberincontext.ca/p/atip-archive-dndcaf-digital-and-cyber">here</a>.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://www.cbc.ca/news/canada/saskatchewan/crypto-mining-hacking-cyber-crime-us-extradition-james-roach-9.7074161">U.S. seeks to extradite Saskatoon man accused of hacking educational systems to mine crypto</a></p><ul><li><p>Hacking a supercomputer just to mine crypto. That&#8217;s just sad.</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11659160/nova-scotia-power-inquiry-cyberattack/">Regulator plans two-part inquiry into last year&#8217;s cyberattack at N.S. utility</a></p><ul><li><p>I think that Nova Scotia has handled this incident tremendously by studying it in depth and being quite open about the process.</p></li></ul></li><li><p><a href="https://medium.com/@pjhillier/architect-of-canadas-early-military-cyber-capability-f95b12ed8b2a">Architect of Canada&#8217;s Early Military Cyber Capability</a></p><ul><li><p>A great article from my friend Pete Hillier, who is a pillar of Canada&#8217;s cyber defence community. Pete goes into some of the beginning of the Canadian Armed Forces&#8217; cyber capabilities, particularly focusing on the important work of Lieutenant-Commander (Ret&#8217;d) Robert Garigue.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/">Volvo Group North America customer data exposed in Conduent hack</a></p><ul><li><p>Supply chain attack: The compromise of Conduent led to the data breach of Volvo Group North America, which includes Canadian operations.</p></li></ul></li><li><p><a href="https://betakit.com/canadas-new-ai-strategy-is-off-to-a-bad-start/">Canada&#8217;s new AI strategy is off to a bad start</a></p><ul><li><p>The AI Minister wants to build trust in AI, but keeps using AI terribly. This is why you need more social scientists in government to develop better methodology for you.</p></li></ul></li><li><p><a href="https://www.dal.ca/news/2026/02/10/dal-solutions-data-mapping-national-security.html">Mapping the data that quietly threatens Canada&#8217;s national security</a></p><ul><li><p>An article on the partnership between Calian and Dalhousie University. A bit of a puff piece and not too much details, but an interesting look into the partnership nonetheless.</p></li><li><p><a href="https://www.calian.com/news-media/calian-invests-in-groundbreaking-data-exhaust-research-through-partnership-with-dalhousie-university-cyber-labs/">Write up from Calian about the partnership from 2022</a></p></li></ul></li><li><p><a href="https://www.securityweek.com/hacktivists-state-actors-cybercriminals-target-global-defense-industry-google-warns/">Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns</a></p><ul><li><p>While already a common target, the major boom in the defence industry means that defense companies are increasingly a prime target. With how much everyone is focused on profits, actual security often gets overlooked.</p></li></ul></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a></p><ul><li><p>Google Threat Intelligence Group is basically saying that many APTs are making heavy use of AI in some capacity.</p></li></ul></li><li><p><a href="https://www.vimyforge.ca/cohorts">Vimy Forge announces its first cohort</a></p><ul><li><p><a href="https://www.vimyforge.ca/about">Vimy Forge is a national defence accelerator</a> based in Fredericton, NB that aims to support Canadian innovation in defence. The first cohort includes a few cyber-related firms including <a href="https://www.123cyber.ca/">123 Cyber</a> (our sponsor, woohoo!), <a href="https://prodigyintel.com/">Prodigy Intelligence</a>, <a href="https://seafarerai.ca/">SeafarerAI</a>, and <a href="https://tehama.io/">Tehama</a>.</p></li><li><p><a href="https://canadiandefencereview.com/atlantic-canada-invests-997000-in-vimy-forge-accelerator-program-for-canadian-defence-smes/">Atlantic Canada invested almost $1million in Vimy Forge</a></p></li></ul></li><li><p><a href="https://www.ctvnews.ca/ottawa/article/ottawa-gatineau-launch-task-force-to-create-defence-innovation-hub-bid-for-proposed-bank/">Ottawa-Gatineau launch task force to create defence innovation hub, bid for proposed bank</a></p><ul><li><p>What is often lost in the discussion of defence is that cyber security is always part of the discussion. Cyber security is one of the most universal dual-use technologies that we can talk about. This is why I am glad that Invest Ottawa specifically mentions cyber security as one of the key areas for investment and and growth.</p></li></ul></li><li><p><a href="https://distribution-a617274656661637473.pbo-dpb.ca/839ef4e9ba07cd16145c52538876e2180bb0e74c53418835590dcf3172d90603">Fiscal Implications of Meeting NATO&#8217;s 5% Commitment</a></p><ul><li><p>NATO&#8217;s 5% defence commitments break down to 3.5% on core defence spending and 1.5% on &#8220;ancillary defence and security-related spending.&#8221; The Office of the Parliamentary Budget Officer released a report on the fiscal implications of these defence commitments, but I&#8217;m most interested in that 1.5% because it specifically impacts networks and information infrastructure. Approximately $60 billion must be spent to reach the 1.5% commitments. A great way to spend this money would be on secret cloud and actually developing a sovereign cloud beyond the control of US corporations.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/02/canada-and-germany-sign-ai-joint-declaration-and-launch-sovereign-technology-alliance.html">Canada and Germany sign AI joint declaration and launch Sovereign Technology Alliance</a></p><ul><li><p>Maybe under the previous Trudeau government, Canada could say it was focused on &#8220;secure," but current AI Minister Evan Solomon and the government have made it clear they don&#8217;t care about security in digital issues. I would not be surprised if they simply do not understand it and accuse those wanting security as holding back economic investments. Evan Solomon is neither a serious person nor a serious minister. This government only cares about security as long as you can invest in it.</p></li></ul></li><li><p><a href="https://theijf.org/article/rcmp-firearms-program-hack">Hack linked to gun licensing program was biggest federal data breach in last 5 years: documents</a></p><ul><li><p>Great piece from Matt Malone. The federal government has has multiple breaches the past few years, but they have provided very little information about any of them.</p></li></ul></li><li><p><a href="https://opencanada.org/canadas-sovereign-ai-compute-gap-why-were-still-treating-a-strategic-asset-as-a-service/">Canada&#8217;s Sovereign AI Compute Gap: Why We&#8217;re Still Treating a Strategic Assets as a Service</a></p><ul><li><p>Despite many claims by the Government of Canada, nothing has changed about current policies and approaches, and Canada is just as exposed to United States infringement on Canadian digital sovereignty.</p></li></ul></li><li><p><a href="https://vancouver.ctvnews.ca/ottawa/article/ottawa-gatineau-to-host-international-cybersecurity-summit-in-december/">Ottawa-Gatineau to host international cybersecurity summit in December</a></p><ul><li><p>INCYBER Forum was a pretty big deal last year, so I am sure having the event in the capital will continue this.</p></li></ul></li><li><p><a href="https://www.alberta.ca/personal-information-protection-act-engagement">Alberta Begins Personal Information Protection Act engagement</a></p><ul><li><p>I don&#8217;t normally cover provincial-level activities, but this crossed my feed. Canada still does not have modern privacy legislation, which puts additional onus on provinces to try to fill in the gaps that the federal government is failing to address.</p></li></ul></li><li><p><a href="https://thewatch-journal.com/2026/02/03/canadas-norad-commander-outlines-defense-upgrades/">Canada&#8217;s NORAD commander outlines defense upgrades</a></p><ul><li><p>We always think about radars and F-35s as NORAD modernization upgrades, but the core to NORAD modernization are digital upgrades. Radars also happen to be one of the most targeted military assets for cyber attacks, so cybersecurity is imperative for them and NORAD modernization.</p></li></ul></li><li><p><a href="https://arstechnica.com/tech-policy/2026/02/discord-faces-backlash-over-age-checks-after-data-breach-exposed-70000-ids/">Discord faces backlash over age checks after data breach exposed 70,000 IDs</a></p><ul><li><p>Everyone is turning to ID and facial checks for age verification, but everyone is ignoring the calls from security researchers and advocates about how dangerous this is without instituting sufficient levels of controls to protect users privacy.</p></li></ul></li><li><p><a href="https://cyberscoop.com/0apt-ransomware-group-hoax-technical-capabilities/">0APT ransomware group rises swiftly with bluster, along with genuine threat of attack</a></p><ul><li><p>A new ransomware group called oAPT has popped up claiming approximately 200 victims, including Canadian victims like Global News. However, majority of these claims appear to be hoaxes with only a few genuine attacks. </p></li><li><p>This is why you should always be suspicious of ransomware groups. They will always claim something is worse than it actually is, even outright lying that they have access or locked down anything. This is why in any circumstance where you are attacked or a ransomware actor reaches out to you, lock down your network and contact a professional.</p></li></ul></li><li><p>C4ISR and Beyond is a one-day conference in Ottawa focused on the defence ecosystem around C4ISR (including cyber!). Canadian Cyber in Context subscribers don&#8217;t have to worry about missing the event:</p><p></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d51d24d7-f1be-4b4f-b949-86b4cb285ecd&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Missed C4ISR and Beyond? Don't Worry&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-02T13:53:17.681Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40d53ce5-71bc-4122-ae7f-edfe4c828f23_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/missed-c4isr-and-beyond-dont-worry&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:186610655,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://cyberpress.org/fake-ticket-portals-harvest-data/">Cybercriminals Exploit Fake Traffic Ticket Portals To Harvest Sensitive Information</a></p></li><li><p><a href="https://www.koi.ai/blog/agreetosteal-the-first-malicious-outlook-add-in-leads-to-4-000-stolen-credentials#heading-5">AgreeToSteal: The First Malicious Outlook Add-In Leads to 4,000 Stolen Credentials</a></p><ul><li><p>Be careful about the in-office tools you use; they could be malware.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws/">Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws</a></p><ul><li><p>I&#8217;m not usually one to cover patch Tuesday, but the fact that 6 zero-days were addressed I think it indicative of just how active the cyber threat environment is right now. (For those unfamiliar, Tuesday tends to be the day Microsoft and others release a lot of patches, hence Patch Tuesday)</p></li></ul></li><li><p><a href="https://www.theregister.com/2026/02/12/apple_ios_263/">Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware</a></p><ul><li><p>Another step in Apple&#8217;s long battle against commercial spyware.</p></li></ul></li><li><p><a href="https://haveibeenpwned.com/Breach/Substack">Substack breach affected approximately 663K accounts.</a></p></li><li><p><a href="https://stairwell.com/resources/stairwell-detects-widespread-exposure-to-critical-winrar-vulnerability-across-customer-environments/">Stairwell detects widespread exposure to critical WinRAR vulnerability across customer environments</a></p><ul><li><p>Et tu, Winrar?</p></li></ul></li><li><p><a href="https://age-verifier.kibty.town/">Social media and other platforms are increasingly require age verification. Unfortunately it seems easy to bypass.</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/">Crazy ransomware gang abuses employee monitoring tool in attacks</a></p><ul><li><p>Alternative headline: Ransomware gang uses abusive employee monitoring tools in attack</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><ul><li><p><a href="https://assets.recordedfuture.com/insikt-report-pdfs/2026/cta-2026-0212.pdf">Recorded Future&#8217;s 2026 State of Security: How Global Fragmentation is Redfining Conflict Across Cyber, crime and Influence</a></p><ul><li><p>Recorded Future is a favourite cybersecurity firm of mine, so their 2026 state of security report is a must-read in my opinion. </p></li></ul></li><li><p><a href="https://www.secureworld.io/industry-news/first-forecast-cves-surpass-50k">FIRST Forecast: CVEs Expected to Surpass 50,000 in 2026 for First Time</a></p><ul><li><p>CVE stands for Common Vulnerabilities and Exposures, which is a type of classification for a known vulnerability in software, which are verified and catalogued to inform defenders about them and to take appropriate action. CVEs are what is exploited by threat actors, so the active CVE expecting to pass 50,000 in 2026 is very noteworthy about the cyber threat environment.</p></li></ul></li><li><p><a href="https://archive.ph/cyOLI">AI will disrupt millions of jobs, so what is Ottawa&#8217;s plan?</a></p><ul><li><p>There is such an overwhelming focus on securing Canada&#8217;s role in AI as an economic force, but little attention is being paid to how AI will seriously impact society.</p></li></ul></li><li><p><a href="https://www.lesaffaires.com/opinions/filiere-defense-sans-trajectoire-pas-de-souverainete/">Fili&#232;re d&#233;fense: sans trajectoire, pas de souverainet&#233;( Defense sector: without a trajectory, there is no sovereignty)</a></p><ul><li><p>We talk a big game on sovereignty, but we continue to let doors open which only provide a performative show of sovereignty and digital sovereignty issues are a top one.</p></li></ul></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:179329206,&quot;url&quot;:&quot;https://netaskari.substack.com/p/train-to-kill-chinas-secret-training&quot;,&quot;publication_id&quot;:3812955,&quot;publication_name&quot;:&quot;NetAskari&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BsZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;title&quot;:&quot;Critical strike: China's hacking training grounds (PART 1)&quot;,&quot;truncated_body_text&quot;:&quot;China&#8217;s state-backed hackers have intensified their attacks on the critical infrastructure of other nations in recent years&#8212;often with notable success. Their techniques are highly sophisticated, but just as significant is the support ecosystem that enables them to develop and refine those attacks. Hidden &#8220;digital shooting ranges&#8221; allow operatives to pra&#8230;&quot;,&quot;date&quot;:&quot;2025-11-19T14:19:23.796Z&quot;,&quot;like_count&quot;:21,&quot;comment_count&quot;:5,&quot;bylines&quot;:[{&quot;id&quot;:43092822,&quot;name&quot;:&quot;NetAskari&quot;,&quot;handle&quot;:&quot;netaskari&quot;,&quot;previous_name&quot;:&quot;Marc Hofer&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;bio&quot;:&quot;Over 16 years of all sorts of journalism: wars, troubles and where the wild things are. If you have data or info to leak, use: deaddrop.netaskari.online.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-08-04T07:37:41.859Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-08-04T07:39:13.534Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:3887885,&quot;user_id&quot;:43092822,&quot;publication_id&quot;:3812955,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3812955,&quot;name&quot;:&quot;NetAskari&quot;,&quot;subdomain&quot;:&quot;netaskari&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Over 16 years of visual journalism from around the globe. I have always questions. &quot;,&quot;logo_url&quot;:null,&quot;author_id&quot;:43092822,&quot;primary_user_id&quot;:43092822,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-01-20T07:22:21.937Z&quot;,&quot;email_from_name&quot;:&quot;NetAskari &quot;,&quot;copyright&quot;:&quot;NetAskari&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;profile&quot;,&quot;is_personal_mode&quot;:true}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://netaskari.substack.com/p/train-to-kill-chinas-secret-training?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!BsZQ!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png" loading="lazy"><span class="embedded-post-publication-name">NetAskari</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Critical strike: China's hacking training grounds (PART 1)</div></div><div class="embedded-post-body">China&#8217;s state-backed hackers have intensified their attacks on the critical infrastructure of other nations in recent years&#8212;often with notable success. Their techniques are highly sophisticated, but just as significant is the support ecosystem that enables them to develop and refine those attacks. Hidden &#8220;digital shooting ranges&#8221; allow operatives to pra&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">5 months ago &#183; 21 likes &#183; 5 comments &#183; NetAskari</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:187441784,&quot;url&quot;:&quot;https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps&quot;,&quot;publication_id&quot;:835088,&quot;publication_name&quot;:&quot;Natto Thoughts&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!lq1x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48fca4-3380-43d1-99d9-bf438e0b295d_182x182.png&quot;,&quot;title&quot;:&quot;The Tianfu Cup Returns Under MPS Leadership as AI Takes Center Stage&quot;,&quot;truncated_body_text&quot;:&quot;The Tianfu Cup (&#22825;&#24220;&#26479;), China&#8217;s premier exploit hacking competition, has returned to Chengdu, Sichuan Province, for its sixth edition, held from January 29 to 30, 2026. This time, under the organizational lead of China&#8217;s Ministry of Public Security (MPS), China&#8217;s domestic law-enforcement authority. Launched in 2018 after Chinese authorities&quot;,&quot;date&quot;:&quot;2026-02-11T14:02:47.161Z&quot;,&quot;like_count&quot;:4,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:5401290,&quot;name&quot;:&quot;Eugenio Benincasa&quot;,&quot;handle&quot;:&quot;eubenincasa&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09a1f79e-07d1-4938-9147-e0df8440802f_800x800.jpeg&quot;,&quot;bio&quot;:&quot;Eugenio Benincasa is a Senior Cyberdefense Researcher at the Center for Security Studies (CSS) at ETH Zurich.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-07-24T18:51:25.154Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-07-25T11:56:25.954Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:2863377,&quot;user_id&quot;:5401290,&quot;publication_id&quot;:835088,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:835088,&quot;name&quot;:&quot;Natto Thoughts&quot;,&quot;subdomain&quot;:&quot;nattothoughts&quot;,&quot;custom_domain&quot;:&quot;www.nattothoughts.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Stories, analysis and insights from the intersection of culture, technology, and security.\n&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c48fca4-3380-43d1-99d9-bf438e0b295d_182x182.png&quot;,&quot;author_id&quot;:86550903,&quot;primary_user_id&quot;:86550903,&quot;theme_var_background_pop&quot;:&quot;#EA410B&quot;,&quot;created_at&quot;:&quot;2022-04-07T01:41:45.349Z&quot;,&quot;email_from_name&quot;:&quot;Natto Thoughts&quot;,&quot;copyright&quot;:&quot;Natto Thoughts&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!lq1x!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48fca4-3380-43d1-99d9-bf438e0b295d_182x182.png" loading="lazy"><span class="embedded-post-publication-name">Natto Thoughts</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The Tianfu Cup Returns Under MPS Leadership as AI Takes Center Stage</div></div><div class="embedded-post-body">The Tianfu Cup (&#22825;&#24220;&#26479;), China&#8217;s premier exploit hacking competition, has returned to Chengdu, Sichuan Province, for its sixth edition, held from January 29 to 30, 2026. This time, under the organizational lead of China&#8217;s Ministry of Public Security (MPS), China&#8217;s domestic law-enforcement authority. Launched in 2018 after Chinese authorities&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 months ago &#183; 4 likes &#183; Eugenio Benincasa</div></a></div><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.reuters.com/business/media-telecom/us-china-trade-detente-fuels-mothballing-key-china-tech-curbs-2026-02-12/">Exclusive: Trump pauses China tech bans ahead of Xi summit</a></p><ul><li><p>Everyone is claiming this is a negotiating tactic, but the United States&#8217; lack of consistency and bold facing lying about everything means that we can only assume the most selfish and short sighted ambitions and purposes for any action that the United States undertakes. We especially cannot assume any action taken is the result of intelligent action, but is just as likely to be an emotional, shallow action with no strategy behind them.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/11/doj-says-trenchant-boss-sold-exploits-to-russian-broker-capable-of-accessing-millions-of-computers-and-devices/">DOJ says Trenchant boss sold exploits to Russian broker capable of accessing &#8216;millions of computers and devices&#8217;</a></p><ul><li><p>The market for zero-days and hacking exploits is still very unregulated and there are private actors that make a killing in this space, but usually they aren&#8217;t the ones leaving companies and selling their data. Usually it&#8217;s neutral, third parties that do the best on the open market, although if you&#8217;re in a Western country, Russia, or China usually you only have one option on who to sell your wares.</p></li></ul></li><li><p><a href="https://therecord.media/usa-cyber-actors-consequences">US needs to impose &#8216;real costs&#8217; on bad actors, State Department cyber official says</a></p><ul><li><p>If cyber threat actors operate without concern for consequences, then they will continue to act as if there are no consequences. </p></li></ul></li><li><p><a href="https://www.ftc.gov/news-events/news/press-releases/2026/02/ftc-issues-second-report-congress-its-work-fight-ransomware-other-cyberattacks">FTC Issues Second Report to Congress on its Work to Fight Ransomware and other Cyberattacks</a></p></li><li><p><a href="https://www.texasattorneygeneral.gov/news/releases/attorney-general-ken-paxton-demands-information-blue-cross-blue-shield-texas-and-conduent-part">Attor&#173;ney Gen&#173;er&#173;al Ken Pax&#173;ton Demands Infor&#173;ma&#173;tion from Blue Cross Blue Shield of Texas and Con&#173;duent as Part of Inves&#173;ti&#173;ga&#173;tion into Largest Data Breach in U.S. History</a></p></li><li><p><a href="https://defensescoop.com/2026/02/10/cia-military-special-operations-forces-capability-assessment/">CIA, SOCOM gearing up for rapid capability assessment with an eye toward &#8216;field-forward&#8217; ops</a></p><ul><li><p>The future of warfare and conflict lies in leveraging data. Access to greater amounts of accurate data with quick and intricate data analysis will give actors a major decision-making advantage.</p><ul><li><p>This is at the foundation of CJADC2 and the Canadian version of Pan-Domain Command and Control (PDC2). <a href="https://www.cgai.ca/digital_transformation_and_pan_domain_the_cafs_quiet_revolution_in_military_affairs">I have written an introduction to Canada&#8217;s approach to multi-domain operations and pan-domain for CGAI here</a>. The core capabilities to this are cloud networking, big data analytics and processing, and AI.</p></li></ul></li></ul></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://therecord.media/eu-dutch-government-announce-hacks-ivanti-zero-days">EU, Dutch government announce hacks following Ivanti zero-days</a></p><ul><li><p>Ivanti is having major success in targeting European countries and organizations.</p></li></ul></li><li><p><a href="https://www.theguardian.com/world/2026/feb/09/russia-scrambles-starlink-access-deactivated-elon-musk-space-x">Russian military scrambles to find Starlink alternative after access blocked</a></p><ul><li><p>I gave big props to SpaceX for moving quickly on this, and this highlights just how important infrastructure is for modern capabilities. Secure and reliable data connectivity is paramount to modern military operations that Canada and other militaries are increasingly reliant upon. This is why fiber optic drones are increasingly common as the lack of infrastructure and secure data connectivity amid degraded electro-magnetic environment makes this very difficult to achieve.</p></li></ul></li><li><p><a href="https://archive.ph/n4AFy#selection-1059.0-1059.45">Russia&#8217;s sabotage campaign is becoming bolder</a></p><ul><li><p>Russia is increasingly using cyber operations to continue its sabotage campaign targeting Europe and Ukraine-allied countries.</p></li></ul></li><li><p><a href="https://nltimes.nl/2026/02/11/parliament-tells-dutch-govt-prevent-digid-ending-american-hands">Parliament again tells Dutch gov&#8217;t to prevent DigiD from ending up in American hands</a></p><ul><li><p>Canada, unfortunately, is not in a position to do the same unless the government take a dramatically more risk-prone approach than they have been. </p></li></ul></li><li><p><a href="https://www.kommersant.ru/doc/8421763">WhatsApp domain disappeared from Roskomnadzor&#8217;s DNS server.</a></p><ul><li><p>Russia blocks Whatsapp, YouTube, and many other services.</p></li></ul></li><li><p><a href="https://nationalsecuritynews.com/2026/02/the-grid-is-the-battlefield-what-the-munich-security-report-reveals-about-cyber-warfare-and-the-fight-for-europes-energy-infrastructure/">The grid is the battlefield: what the Munich Security Report reveals about cyber warfare and the fight for Europe&#8217;s energy infrastructure</a></p><ul><li><p>Cyber attacks are a top discussion at the Munich Security Conference this year and for good reason. Europe has been getting hit particularly</p></li></ul></li><li><p><a href="https://fortune.com/2026/02/13/binance-investigators-fired-iran-sanctions-potential-violations/">Exclusive: Binance fires top investigators who claim to have uncovered evidence of Iranian sanctions violations</a></p><ul><li><p>You remember Binance. The ones who were convicted of violating sanctions and anti-money laundering laws in 2023, but were able to avoid a lot of the punishments after providing bribes to the Trump administration.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p><a href="https://therecord.media/leaked-china-documents-show-testing-cyber-neighbors">Leaked technical documents show China rehearsing cyberattacks on neighbors&#8217; critical infrastructure</a></p><ul><li><p>First reported by NetAskari (linked above), this news article is based on that report. This shouldn&#8217;t be a surprise to anyone. This technology is readily available given how common large cloud infrastructures are, so it makes sense that China would be looking for gaps and practicing penetration testing against them daily. We should expect our cyber forces to do the same.</p></li></ul></li><li><p><a href="https://www.techpolicy.press/x-tried-to-sidestep-brazils-inquiry-on-ai-deepfakes-the-government-just-pushed-back/">X Tried to Sidestep Brazil&#8217;s Inquiry on AI Deepfakes. The Government Just Pushed Back.</a></p></li><li><p><a href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/">Largest Multi-Agency Cyber Operation Mounted to Counter Threat Posed by Advanced Persistent Threat (APT) Actor UNC3886 to Singapore&#8217;s Telecommunications Sector</a></p><ul><li><p>Chinese APTs have penetrated all of Singapore&#8217;s major telecoms. This is not a surprise. Most telecoms have been penetrated by Chinese APTs at this point due to salt/volt typhoon.</p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breach-singapores-four-largest-telcos/">News article about this.</a></p></li></ul></li><li><p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/south-korea-says-coupang-must-address-security-loopholes-probe-data-breach-2026-02-10/">South Korea blames Coupang data breach on management failure, not sophisticated attack</a></p><ul><li><p>Sometimes it isn&#8217;t external threat actors, but your own management that cause incidents. This is why CPCSC and CMMC are quite important for the defence industry, because they are meant to ensure internal compliance is sound so that we can focus on external threats.</p></li></ul></li><li><p><a href="https://www.timesofisrael.com/liveblog_entry/security-bodies-say-they-foiled-hundreds-of-iranian-cyberattacks-against-senior-israelis-in-past-months/">Security bodies say they foiled hundreds of Iranian cyberattacks against senior Israelis in past months</a></p><ul><li><p>Iran has a comparatively large and prolific cyber operations capabilities. Two of the countries targeted the earliest with cyber operations also happen to be the ones that now have major cyber forces: Iran and North Korea.</p></li></ul></li><li><p><a href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</a></p><ul><li><p>This is the type of stuff that should absolutely kill a cyber threat intelligence business. If you&#8217;re not here to be truthful about threats, then you&#8217;re actively helping the state. Congrats, Palo Alto Networks, you now support the Chinese Communist Party.</p></li></ul></li><li><p><a href="https://www.information.gov.kh/articles/183676">His Excellency General Sar Thet is highly determined and orders the National Police Force to eradicate online scams from Cambodia</a></p><ul><li><p>Cambodia is doing a big crackdown on scam compounds.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 7/02/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending February 7]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70226</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70226</guid><pubDate>Mon, 09 Feb 2026 14:07:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/cdc468ec-ad6a-4b48-81d0-81a30793a1a0_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>Thank you to those that filled out the <a href="https://www.cyberincontext.ca/survey/5929747">Cyber News Rewire survey</a>! Respondents favored releasing the Rewire on Monday, which will be the release day going forward. The survey will remain open and I will share it periodically.</p></li><li><p>I had my wisdom teeth removed last week, so this Rewire and next might be a little light side as I recover.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70226/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70226/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://thewalrus.ca/canada-is-building-a-surveillance-network-in-space/">Canada Is Building a Surveillance Network in Space</a></p><ul><li><p>The great Wesley Wark discusses how and why Canada is developing surveillance satellites to reduce dependence on allies and increase Canadian sovereignty and situational awareness. Cyber security for satellites is increasing in importance and remains a major gap area for protections compared to other areas. Over the last few years as attacks have increased, things have improved, but satellites of all types are increasingly becoming a lynchpin for militaries. People are growing aware and things are shifting towards the better, but we&#8217;re barely making progress.</p></li></ul></li><li><p><a href="https://cyberscoop.com/whatsapp-strict-account-settings-lockdown-style-spyware-protection/">WhatsApp releases account feature that looks to combat spyware</a></p><ul><li><p>WhatsApp is a common vector for attacks, so anything to improve security in encrypted messaging apps is good.</p></li></ul></li><li><p><a href="https://www.theguardian.com/society/2026/jan/30/hacking-network-targeting-vulnerable-children-charity-warns-com">&#8216;Chilling&#8217; hacking network is targeting vulnerable children, charity warns</a></p><ul><li><p>This is an article focused on the UK, but the group discussed here (The Com) is also targeting Canada and Canadians. One of the worst, most despicable threat actors whose members often targets children for extortion and to show off.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/army/news-publications/2026/01/ai-digital-defence.html">AI and Digital Defence: Canada Among the Global Elite</a></p><ul><li><p>&#8220;A Canadian Army team attended  the event and showcased their AI-powered cyber defence system, which earned first prize at the NATO TIDE Hackathon in France earlier this year.&#8221;</p></li><li><p>This is cool stuff, but I believe this is a prototype and not in widespread use yet. There is a mention of <a href="https://canadianarmytoday.com/sunny-with-a-chance-of-cloud-tak/">CloudTAK</a>, a cloud-based tactical network, which started in a similar small testing and now is in pretty widespread use.</p></li></ul></li><li><p><a href="https://betakit.com/building-with-ai-is-now-the-price-of-admission-for-software-startups-inovia-report-says/">Building with AI is now the &#8220;price of admission&#8221; for software startups, Inovia report says</a></p><ul><li><p>AI for the sake of AI is leading to the creation of a bubble. Yes, AI can produce great things with productivity gains. However, this is not a given. Not all AI products are made the same and there is a lot that really sucks. And even amongst the models that do work well, their application are very narrow and there remains a lot unintentional errors in LLM. This will produce more bad than good.</p></li></ul></li><li><p><a href="https://betakit.com/earth-is-full-of-power-hungry-data-centres-is-shooting-them-into-space-the-answer/">Earth is full of power-hungry data centres. Is shooting them into space the answer?</a></p><ul><li><p>No. Full stop. This is a hole to waste money and time. Data centres in space would be more expensive and have far less capacity. All you&#8217;re doing is creating more congestion in orbit.</p></li></ul></li><li><p><a href="https://www.theverge.com/tech/874255/substack-data-breach-user-emails-phone-numbers">Substack data breach exposed users&#8217; emails and phone numbers</a></p><ul><li><p>Our emails and phone numbers were stolen in a Substack data breach. It sounds like this was data scrapping and login credentials and financial information was not obtained, but the information obtained could still enable criminals to commit fraud.</p></li></ul></li><li><p><a href="https://www.anisoftgroup.com/anisoft-group-inc-secures-cybersecurity-attribution-data-centre-contract-with-the-canadian-institute-for-cybersecurity-at-the-university-of-new-brunswick">AniSoft Group Inc. Secures Cybersecurity Attribution Data Centre Contract with the Canadian Institute for Cybersecurity</a></p><ul><li><p>A major part of Canada&#8217;s latest National Cyber Security Strategy was to provide <a href="https://unb.ca/cadc/">Cyber Attribution Data Centre (CADC)</a> at the Canadian Institute for Cybersecurity (CIC) at the University of New Brunswick. The <a href="https://www.canada.ca/en/public-safety-canada/news/2024/12/government-of-canada-announces-financial-support-for-the-establishment-of-a-cyber-attribution-data-centre-at-the-university-of-new-brunswick.html">government is providing $10 million over 5 years to fund this project</a>, which I hope is the start of things as the CADC has potential to do global good. The idea behind the CADC is to collect and analyze data on cyber attacks to improve the attribution and our collective understanding of cyber attacks.</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/business/canada-computers-data-breach-scope-9.7074605">Nearly 1,300 customers affected by Canada Computers data breach, company says</a></p><ul><li><p>More developments on this story. 1,300 customers affected by card skimming, which feels like a low estimate for a national brand whose website was affected during the holidays.</p></li></ul></li><li><p><a href="https://betakit.com/y-combinator-reverses-decision-will-invest-in-canadian-domiciled-startups-again/">Y Combinator reverses decision, will invest in Canadian-domiciled startups again</a></p><ul><li><p>This decision is quite confusing. Y Combinator president claims the move was because all its top-performing Canadian companies reincorporate in the US. Yet, he also claimed that they weren&#8217;t saying &#8220;not saying Canadians should leave Canada,&#8221; just that &#8220;Where you are incorporated increases your access to capital. That&#8217;s it.&#8221; In other words, they got a lot of heat and are backpedaling due to their decision. For people with a lot of access to capital, they seem to lack a spine like most American corporations at the moment.<br><br>This should be a wake up call for the Canadian ecosystem to build the means to bring capital to Canada, not to authoritarian states. </p></li></ul></li><li><p><a href="https://www.ctvnews.ca/atlantic/new-brunswick/article/in-letter-to-premier-nb-advocate-strongly-urges-government-to-move-away-from-social-media-platform-x/">N.B. government will no longer use X after child and youth advocate raises concerns</a></p><ul><li><p>New Brunswick shows that it cares more about stopping deep fake child sexual pornography than the federal government as Minister of AI Evan Soloman still proclaims his love for the platform that produced deep fake child pornography for profit.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/02/insider-risk-security-start.html">Insider risk &#8212; Security starts with you</a></p><ul><li><p>DND releases article on insider threat/risks. Cyber threat actors, particularly ransomware, are increasingly looking for insiders to provide them access in exchange for a kickback.</p></li></ul></li><li><p><a href="https://www.cyber.gc.ca/en/guidance/ransomware-threat-outlook-2025-2027">Ransomware Threat Outlook 2025-2027</a></p><ul><li><p>&#8220;We assess that threat actors carrying out ransomware attacks impacting Canadian organizations are almost certainly opportunistic and financially motivated. All Canadian organizations, regardless of size or sector, are at risk of being targeted by ransomware. In addition to impacting the infrastructure, data, supply chain, and operations of organizations, a ransomware attack can also impact Canadians&#8217; livelihoods by disrupting the critical services they depend on.&#8221;</p></li><li><p>Canada continues to be a favorite target for ransomware operators. Like all other threat actors, they&#8217;re now using AI tools as well.</p></li></ul></li><li><p><a href="https://blog.google/innovation-and-ai/technology/safety-security/the-quantum-era-is-coming-are-we-ready-to-secure-it/">The quantum era is coming. Are we ready to secure it?</a></p><ul><li><p>Quantum technology is advancing quite steadily. We will see the slow integration of quantum sensing and related technology in the next 5 years, which will increasingly risk cyber security long before quantum computers will be worthwhile.</p></li></ul></li><li><p><a href="https://archive.ph/6ibDN#selection-1485.0-1485.36">Canada&#8217;s digital sovereignty dilemma</a></p><ul><li><p>Honestly, not a great article (it&#8217;s really just the opening for a newsletter), but summarizes a lot of the variables. What is missed from this is how a lot of the standing Canadian policies on digital sovereignty does not even ensure Canadian digital sovereignty in the first place. As long as the software, infrastructure, or anything used is owned by a US corporation, it risks Canadian sovereignty as it forces the corporation to turn any data over to the United States due to a &#8220;criminal investigation.&#8221; The corporations will claim they it doesn&#8217;t &#8220;force&#8221; them, but it does if they do not decide to fight it in court. It thus means that you have to trust the United States judicial system to treat this accordingly and that the corporation will refuse and fight it. I will then ask you if you trust the current United States justice department and United States-based corporations? <br><br>If you do, then I have a million dollar idea to sell you, you mark.</p></li></ul></li><li><p><a href="https://ised-isde.canada.ca/site/ised/sites/default/files/documents/AiStrategyReport_EN.pdf">ISED releases Summary of Inputs for Canada&#8217;s next AI Strategy</a></p><ul><li><p>Results aren&#8217;t too surprising. Businesses want unfettered investment and growth without a care of how AI impacts anyone but them, whereas public institutions wants a coordinated response that regulates AI to offset the negatives. With Evan Soloman at the helm, we are likely to see things lean towards doing whatever businesses want and ignore the major negative impacts on the rest of society. I&#8217;ll be shocked if anything rational and nuanced is done comes out of this government on AI.</p></li></ul></li><li><p>A<a href="https://redteamhack.ca/"> Defence-focused Red Team Hack-a-Thon will be taking place at University of British Columbia begins March 7</a></p><ul><li><p>A very interesting event coming up. There&#8217;s been an explosion of hack-a-thons over the past year, especially focused on defence. This might be the first red team-focused one I have seen, or at least advertised.</p></li></ul></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/">Notepad++ Hijacked by State-Sponsored Hackers</a></p><ul><li><p>Hosting provider was compromised leading to Notepad++ being attacked. They have since changed hosting providers. Another supply chain attack, which attempted to hijack the update process for older versions of Notepad++. Suggests that it was a Chinese APT, which is not a surprise based on the TTPs.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-exploit-recently-patched-microsoft-office-bug-in-attacks/">Russian hackers exploit recently patched Microsoft Office bug in attacks</a></p><ul><li><p>When we are all dead and gone, the only thing that will remain are Microsoft Office bugs and exploits.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/">Wave of Citrix NetScaler scans use thousands of residential proxies</a></p><ul><li><p>Citrix is often targeted by cyber threat actors due to its use by so many businesses. Scanning on this scale means a well resourced threat actor, which GreyNoise is specifically calling this an indication for pre-exploitation.</p></li></ul></li><li><p>Lakelands Public Health: <a href="https://globalnews.ca/news/11650844/lakelands-public-health-cyberattack/">Infectious disease data safe from cyberattack, Ontario public health unit says</a></p></li><li><p><a href="https://www.dexpose.io/qilin-ransomware-strikes-workers-health-safety-centre/">Qilin Ransomware Strikes Ontario Workers Health &amp; Safety Centre</a></p></li><li><p><a href="https://www.cyber.gc.ca/sites/default/files/itsm-80-101.en_.pdf">Canadian Centre for Cyber Security: Security considerations for edge devices</a></p><ul><li><p>As the United States pulls edge devices, CCCS has released a guidance document with international partners on how to protect edge devices.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/flickr-discloses-potential-data-breach-exposing-users-names-emails/">Flickr discloses potential data breach exposing users&#8217; names, emails</a></p><ul><li><p>DND/CAF use Flickr quite a bit, so I hope this is on their radar. Looks like logins are safe, but still a decent amount of details captured that could enable fraud or phishing.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><div id="youtube2-nqiySna0sXk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nqiySna0sXk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nqiySna0sXk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p><a href="https://youtu.be/nqiySna0sXk">Max Smeets&#8217; Keynote at Black Hat Europe 2025 (60 minute keynote talk)</a></p><ul><li><p>Max Smeets is the best political scientist researching cyber conflict today. Anything his name is attached to is worth a read/listen/watch.</p></li></ul></li><li><p><a href="https://greydynamics.com/chinas-intelligence-community-an-overview-cic/">China&#8217;s Intelligence Community: An Overview</a></p><ul><li><p>Over the last decade, China has completely reorganized its military and intelligence communities, including how it uses cyber operations. This reorganization, along with major investments into building an offensive security industry, has contributed to China&#8217;s massive success with cyber operations in the past 6 years. If you thought China was prolific in industrial espionage in the 90s, that has nothing on what they&#8217;re doing today.</p></li></ul></li><li><p><a href="https://bindinghook.com/how-european-and-allied-cybersecurity-strategies-are-shifting-from-defence-to-offence/">How European and allied cybersecurity strategies are shifting from defence to offence</a></p><ul><li><p>The shift from pure defence to incorporating offensive is because only relying upon defence means you&#8217;re allowing threat actors the initiative to constantly attack you without stopping their means to constantly attack you. Western countries are still trying to figure out how to scale their offensive operations because it is difficult skill to master, but also Western countries primarily relegate offensive operations to their signals intelligence organization and military, which is often difficult to recruit individuals for because the private sector pays so much more and the heavy restrictions as a government employee or military member is a hard sell. (I am literally finishing my dissertation on this, so I could talk all day about this.)</p></li></ul></li></ul><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.stopice.net/news/server_attack_against_stopicenet_traced_to_local_cbp_agents_personal_server">StopICE App blames hack on &#8220;a CBP agent here in SoCal.&#8221;</a></p><ul><li><p>StopICE, an app that helps Americans track the location of US ICE raids has had a security breach, which they have blamed on a Customs and Border Protection agent. This is part of a series of attacks by partisan hackers on apps or websites that helps Americans track the activities of ICE.</p></li></ul></li><li><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4378980/nsa-releases-first-in-series-of-zero-trust-implementation-guidelines/">NSA Releases First in Series of Zero Trust Implementation Guidelines</a></p><ul><li><p>Something I missed from last month. The NSA is released a series of guides on zero trust architecture, which is essentially becoming the default architecture for all networks.</p></li></ul></li><li><p><a href="https://archive.ph/dDT7O#selection-1071.0-1071.76">Exclusive: Pentagon clashes with Anthropic over military AI use, sources say</a></p><ul><li><p>This is how the United States will continue to have significant control and influence over Canad. By relying upon United States technology and corporations, the United States&#8217; continued descent into authoritarianism risks compromise a lot of information and communications technology. The United States&#8217; support of science denialism and attempt to control what chat bots says will mean that AI LLMs and others which adhere to these principles of denialism and lies cannot be trusted and will ultimately make those who use them dumber.</p></li></ul></li><li><p><a href="https://www.govtech.com/security/tulsa-okla-airport-tech-teams-contain-ransomware-attack">Tulsa, Okla., Airport Tech Teams Contain Ransomware Attack</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/panera-bread-data-breach-impacts-51-million-accounts-not-14-million-customers/">Panera Bread breach impacts 5.1 million accounts</a></p></li><li><p><a href="https://www.cybersecuritydive.com/news/fcc-telecommunications-ransomware-warning/811100/">FCC urges telecoms to boost cybersecurity amid growing ransomware threat</a></p><ul><li><p>Telecoms in North American, including Canada, are increasingly targeted by cyber threat actors, particularly China&#8217;s Volt Typhoon. Despite what Canadian telecoms will lie telling you, they have been victims of these attacks.</p></li></ul></li><li><p><a href="https://archive.ph/1ILVS#selection-529.0-529.81">FBI Couldn&#8217;t Get into WaPo Reporter&#8217;s iPhone Because It Had Lockdown Mode Enabled</a></p><ul><li><p>Lockdown mode was originally developed to prevent remote access spyware, but increasingly is shown to help prevent authoritarian regime thugs from accessing a journalist&#8217;s phone they physically have.</p></li></ul></li><li><p><a href="https://therecord.media/iran-nuclear-cyber-strikes-us">Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes</a></p><ul><li><p>The #1 target for cyber operations during a conflict are air defences. This has been happening for over 20 years. The earliest public one we know of is Israel taking down Syrian air defenses when they bombed their nuclear facilities.</p></li></ul></li><li><p><a href="https://www.linkedin.com/posts/candicefrost1776_cybercom-20-activity-7424104365155778561-qpCi/">Department of Defense Establishes CYBERCOM 2.0 - Revised Cyber Force Generation Model</a></p><ul><li><p>DOD releases implementation overview for CYBERCOM 2.0 with three pillars: domain mastery; specialization; agility. Some interesting stuff in this plan, but will like save it for a research article to unpack for implications for Canada/CAFCYBERCOM. Won&#8217;t affect Canada much, but may influence future CAF cyber force development.</p></li></ul></li><li><p><a href="https://www.wired.com/story/cbp-ice-dhs-mobile-fortify-face-recognition-verify-identity/">ICE and CBP&#8217;s Face-Recognition App Can&#8217;t Actually Verify Who People Are</a></p><ul><li><p>This is the case for a lot of this type technology and cannot be trusted, just like the people using it. </p></li></ul></li><li><p><a href="https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices">BOD 26-02: Mitigating Risk From End-of-Support Edge Devices</a></p><ul><li><p>CISA issues binding order for the removal of edge devices that are no longer supported by the developer. Edge devices refers to networking devices on the outer &#8220;edge&#8221; of your network that </p></li></ul></li><li><p><a href="https://www.inquirer.com/education/university-of-pennsylvania-data-breach-filing-20260203.html">Penn&#8217;s October data breach impacted fewer than 10 people, despite hackers&#8217; claims it was 1.2 million</a></p><ul><li><p>I really like this article because it highlights something that all ransomware groups do: lie. They&#8217;re going to lie to you about how bad the attack is, they&#8217;re going to lie that there&#8217;s nothing you can do, they&#8217;re going to lie that they&#8217;ll unlock everything if you pay. The criminal will say and do anything to do a payment from you. </p><p>If worse case scenario happens and you are hit with ransomware with a criminal that wants to negotiate, listen to WOPR: The only winning move is to not play. (If you don&#8217;t understand this reference, I recommend watching the historically important hacking movie of <a href="https://www.imdb.com/title/tt0086567/">WarGames</a>.)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NU_a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NU_a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NU_a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NU_a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NU_a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NU_a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg" width="440" height="293.5625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/de9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:854,&quot;width&quot;:1280,&quot;resizeWidth&quot;:440,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;WOPR &#8212; Raspberry Pi Official Magazine&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="WOPR &#8212; Raspberry Pi Official Magazine" title="WOPR &#8212; Raspberry Pi Official Magazine" srcset="https://substackcdn.com/image/fetch/$s_!NU_a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NU_a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NU_a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NU_a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde9be895-6fe8-41a6-bd42-430ddc737ead_1280x854.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/03/homeland-security-is-trying-to-force-tech-companies-to-hand-over-data-about-trump-critics/">Homeland Security is trying to force tech companies to hand over data about Trump critics</a></p><ul><li><p>This is precisely why you cannot trust US-based corporations at the moment when they claim they will not just hand information over to the government. The United States government is already abusing the system to request information on its citizens. They will have even less qualms in demanding non-citizen data if they deem it necessary. There is no &#8220;but,&#8221; this is a United States administration actively seeking to break or stretch the law in ways it was not intended to intimidate, threaten, and turn the United States into an authoritarian state. This will only get worse.</p></li></ul></li><li><p><a href="https://www.defenseone.com/technology/2026/01/us-developed-non-kinetic-cell-ahead-venezuela-mission-push-cyber-operations/411034/">US military used new &#8216;non-kinetic&#8217; cell to guide cyber ops during Maduro capture</a></p><ul><li><p>Similar groups have been used before at lower operational and tactical levels, so it is not surprised there is now one at the Pentagon for strategic and operational oversight of the whole of the forces to help guide. Western militaries overall are moving in this direction, particularly with Cyber Electromagnetic Activities (CEMA) which is the overlapping functions and use of cyber and traditional electronic warfare capabilities. This is a big reason why CAFCYBERCOM has charge of cyber and electro-magnetic  capabilities, with eletro-magnetic being a big area for attention to grow right now based on learned experiences from Ukraine.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/">Payments platform BridgePay confirms ransomware attack behind outage</a></p><ul><li><p>What would happen if a similar attack targeted Interac in Canada?  </p></li></ul></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://www.reuters.com/business/aerospace-defense/ukraine-share-wartime-combat-data-with-allies-help-train-ai-2026-01-20/">Ukraine to share wartime combat data with allies to help train AI</a></p><ul><li><p>The future of warfare is in big data analytics and AI/ML. Not surprising Ukraine is attempting to leverage this. I am more surprised it took them this long and I hope they receive a lot of money for this data.</p></li></ul></li><li><p><a href="https://www.infosecurity-magazine.com/news/fancy-bear-exploits-office-flaw">Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks</a></p><ul><li><p>Fancy Bear is a Russian military cyber unit. Good to keep in mind that Russia continues to focus is cyber activities on Ukraine, which faces</p></li></ul></li><li><p><a href="https://archive.ph/bhUzn#selection-1071.0-1071.79">Nobel Committee says Peace Prize winner likely revealed early by digital spying</a></p><ul><li><p>&#8220;And while financial bets were placed, it was not known whether the ultimate purpose was to profit from the incident or to inflict damage to the credibility of the prize&#8221;</p></li><li><p>They seem to be suggesting they either think the hack is linked to polymarket betting or a state actor conducting a hack and leak operation. Either is a major possibility. I can definitely see both of them being likely, but the financial aspect seems the most likely.</p></li></ul></li><li><p><a href="https://www.govinfosecurity.com/police-raid-elon-musks-x-paris-office-in-criminal-probe-a-30668">Police Raid Elon Musk&#8217;s X Paris Office in Criminal Probe</a></p><ul><li><p>French police raid Twitter (X) offices in France as part of investigation into systematic, authorized production and profiting from Child Sexual Abuse Material (CSAM) by Grok and other alleged crimes. </p></li></ul></li><li><p><a href="https://www.sgdsn.gouv.fr/files/files/Publications/20260129_SNC%20EN_0.pdf">France releases National Cybersecurity Strategy</a></p><ul><li><p>I am not too familiar with specifics of French policy, but I do like this strategy. However, reading it makes me depressed about just how bad Canada&#8217;s most recent National Cyber Security Strategy is and how much we lost out and continue to lose out from the Canadian government treating cyber security as a tertiary issue.</p></li><li><p><a href="https://www.bbc.com/news/articles/cly94qe3yr0o?xtor=AL-71-">Ukraine hails &#8216;real results&#8217; after Musk restricts Russian Starlink use</a></p><ul><li><p>After reports that Russia was using Starlink for drones, an update was pushed to prevent the use of starlink on vehicles moving faster than 75 km/hr.</p></li></ul></li></ul></li><li><p><a href="https://www.fe-ddis.dk/da/nyheder/2026/fe-soger-landets-skarpeste-hoveder-til-hackerakademi/">Danish Defence Intelligence Service open applications for its Hacker Academy</a></p></li><li><p><a href="https://www.theregister.com/2026/02/05/winter_olympics_russian_attacks">Italy claims cyberattacks &#8216;of Russian origin&#8217; are pelting Winter Olympics</a></p><ul><li><p>Olympic Destroyer 2. Russia targeted the Japan Olympics a few years ago as well.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/05/one-of-europes-largest-universities-knocked-offline-for-days-after-cyberattack/">One of Europe&#8217;s largest universities knocked offline for days after cyberattack</a></p><ul><li><p>La Sapienza in Rome hit with ransomware. Everyone is a target, especially public institutions. Invest in cyber security or you&#8217;re next.</p></li></ul></li><li><p><a href="https://www.rusi.org/explore-our-research/publications/insights-papers/rebooting-uks-cyber-strategy">Rebooting the UK&#8217;s Cyber Strategy</a></p><ul><li><p>A good write up about the UK&#8217;s new cyber strategy.</p></li><li><p>&#8220;The paper calls for bold action to address market failures, enhance resilience and ensure the UK is prepared to tackle evolving cyber threats. It provides a roadmap for policymakers to protect critical infrastructure, secure economic growth and safeguard national security in an increasingly uncertain global landscape.&#8221;</p></li></ul></li><li><p><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_342">Commission responds to cyber-attack on its central mobile infrastructure</a></p></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p><a href="https://threadreaderapp.com/thread/2018348435699544329.html">In 2024 we traveled to the Chinese city of Chengdu to find follow the trails of three APT groups: I-Soon, No Sugar Tech, Chengdu404 and Sichuan Silence.</a></p><ul><li><p>A fascinating read of individuals traveling to Chengdu, China to do site visits to Chinese APTs.</p></li><li><p>Full write up here:</p></li></ul></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:155672015,&quot;url&quot;:&quot;https://netaskari.substack.com/p/chasing-chengdu404-sichuan-silenceand&quot;,&quot;publication_id&quot;:3812955,&quot;publication_name&quot;:&quot;NetAskari&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BsZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;title&quot;:&quot;Chasing Chengdu404, Sichuan Silence....and NoSugar Technology !?&quot;,&quot;truncated_body_text&quot;:&quot;In the recent months, there was quite some flurry around Chinese Cyber Security companies. Some spectacular operations around infiltrating the United States telecom networks, corporate firewalls of the company Sophos and other bigger and smaller breaches have woken Washington from its slumber on Chinese offensive cyber operations. Who knows if the atten&#8230;&quot;,&quot;date&quot;:&quot;2025-01-25T07:07:04.235Z&quot;,&quot;like_count&quot;:1,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:43092822,&quot;name&quot;:&quot;NetAskari&quot;,&quot;handle&quot;:&quot;netaskari&quot;,&quot;previous_name&quot;:&quot;Marc Hofer&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;bio&quot;:&quot;Over 16 years of all sorts of journalism: wars, troubles and where the wild things are. If you have data or info to leak, use: deaddrop.netaskari.online.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-08-04T07:37:41.859Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-08-04T07:39:13.534Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:3887885,&quot;user_id&quot;:43092822,&quot;publication_id&quot;:3812955,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3812955,&quot;name&quot;:&quot;NetAskari&quot;,&quot;subdomain&quot;:&quot;netaskari&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Over 16 years of visual journalism from around the globe. I have always questions. &quot;,&quot;logo_url&quot;:null,&quot;author_id&quot;:43092822,&quot;primary_user_id&quot;:43092822,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-01-20T07:22:21.937Z&quot;,&quot;email_from_name&quot;:&quot;NetAskari &quot;,&quot;copyright&quot;:&quot;NetAskari&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;profile&quot;,&quot;is_personal_mode&quot;:true}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://netaskari.substack.com/p/chasing-chengdu404-sichuan-silenceand?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!BsZQ!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png" loading="lazy"><span class="embedded-post-publication-name">NetAskari</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Chasing Chengdu404, Sichuan Silence....and NoSugar Technology !?</div></div><div class="embedded-post-body">In the recent months, there was quite some flurry around Chinese Cyber Security companies. Some spectacular operations around infiltrating the United States telecom networks, corporate firewalls of the company Sophos and other bigger and smaller breaches have woken Washington from its slumber on Chinese offensive cyber operations. Who knows if the atten&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">a year ago &#183; 1 like &#183; NetAskari</div></a></div><ul><li><p><a href="https://www.zataz.com/cyberattack-in-senegal-dgid-targeted-by-black-shrantac-group/">Cyberattack in Senegal: DGID targeted by Black Shrantac group</a></p><ul><li><p>Major attack on Senegal&#8217;s government</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Media of the Week</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2KP7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2KP7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png 424w, https://substackcdn.com/image/fetch/$s_!2KP7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png 848w, https://substackcdn.com/image/fetch/$s_!2KP7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png 1272w, https://substackcdn.com/image/fetch/$s_!2KP7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2KP7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png" width="484" height="578.4065934065934" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1740,&quot;width&quot;:1456,&quot;resizeWidth&quot;:484,&quot;bytes&quot;:283906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/186606564?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2KP7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png 424w, https://substackcdn.com/image/fetch/$s_!2KP7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png 848w, https://substackcdn.com/image/fetch/$s_!2KP7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png 1272w, https://substackcdn.com/image/fetch/$s_!2KP7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f13b365-f145-4ff7-8df6-ffcfac624076_2160x2582.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Credit to the TLDR newsletter team at Wealthsimple for this. Media literacy has grown more important over the last 30 years, but it has not kept up pace with the breakdown of our information space that continues to be degraded with mis/disinformation and toxic, bad actors. Canada is not immune to this and it continues to get worse.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Missed C4ISR and Beyond? Don't Worry]]></title><description><![CDATA[Catch up on what happened at C4ISR and Beyond]]></description><link>https://www.cyberincontext.ca/p/missed-c4isr-and-beyond-dont-worry</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/missed-c4isr-and-beyond-dont-worry</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Mon, 02 Feb 2026 13:53:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/40d53ce5-71bc-4122-ae7f-edfe4c828f23_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://www.cyberincontext.ca/p/missed-c4isr-and-beyond-dont-worry">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 31/01/26]]></title><description><![CDATA[Wiring you into the cyber news the week ending January 31]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-310126</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-310126</guid><pubDate>Sat, 31 Jan 2026 16:47:20 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bd5305b2-ba09-4a41-a9ff-3fd019f1967e_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>We are hitting the head of the first month of the revival of News Rewire. I have created a short survey to help determine when the best day to release the News Rewire. I have been releasing the News Rewire on Saturdays, but want to hear from you if I should change this: <a href="https://www.cyberincontext.ca/survey/5929747">Take the survey here</a>.</p></li><li><p>It appears amid resolving my DNS issues my email got disrupted, so if you sent me an email this past week please resend.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-310126/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-310126/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-310126?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-310126?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://theijf.org/article/c4-political-parties-privacy">Canada&#8217;s political parties want to be exempt from provincial privacy laws</a></p></li><li><p><a href="https://www.reuters.com/technology/russian-military-intelligence-hackers-likely-behind-december-cyberattacks-polish-2026-01-23/">Russian military intelligence hackers likely behind December cyberattacks on Polish energy targets, researchers say</a></p></li><li><p><a href="https://archive.ph/fJ5cg#selection-2429.0-2429.89">Vancouver-based Hootsuite CEO says ICE contract will stand as long as agency honours terms and conditions</a></p></li><li><p><a href="https://www.calian.com/resources/news-media/calian-mobilizes-initial-100-million-to-accelerate-canadas-c5isrt-defence-capabilities/">Calian Mobilizes Initial $100 Million to Accelerate Canada&#8217;s C5ISRT Defence Capabilities</a></p><ul><li><p><a href="https://betakit.com/calian-outlines-new-100-million-platform-to-bolster-canadian-defence-businesses/">Calian outlines new $100 million platform to bolster Canadian defence businesses</a></p></li></ul></li><li><p><a href="https://thelogic.co/news/exclusive/y-combinator-canada-startups/">Y Combinator is no longer investing in Canadian startups</a></p><ul><li><p>&#8220;YC now only backs firms registered in the U.S., Cayman Islands or Singapore, according to its standard deal terms. Canada was previously listed as an acceptable jurisdiction, but was removed in November 2025.&#8221;</p></li></ul></li><li><p><a href="https://thelogic.co/news/exclusive/ottawa-ice-wiretap-jsi-telecom/">Ottawa is subsidizing a tech firm that provides wiretapping tools to ICE</a></p><ul><li><p>&#8220;In December, the Canadian government gave $1 million to Ottawa&#8217;s JSI Telecom to commercialize AI-driven data analytics. JSI, a wiretaps and investigation support firm, had a banner year in U.S. government sales in 2025, including a big new contract with ICE.&#8221;</p></li></ul></li><li><p><a href="https://www.iphoneincanada.ca/2026/01/26/major-canada-computers-breach-customers-warned-to-cancel-cards/">Major Canada Computers Breach: Customers Warned to Cancel Cards</a></p><ul><li><p>A classic case of someone trying to report a breach or cyber security problem to the company, but being ignored until the individual goes public.</p></li></ul></li><li><p><a href="https://arstechnica.com/gadgets/2026/01/how-to-encrypt-your-pcs-disk-without-giving-the-keys-to-microsoft/">How to encrypt your PC&#8217;s disk without giving the keys to Microsoft</a></p></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Parliamentary petition to require secure coding in federal software</a></p><ul><li><p>I signed it and so should you.</p></li></ul></li><li><p><a href="https://canadiancybersecuritynetwork.com/hubfs/Reports/State%20of%20Cybersecurity/2026/StateofCyber-26-04-2.pdf">Canadian Cyber Security Network released its State of Cybersecurity</a></p><p><a href="https://canadiancybersecuritynetwork.com/hubfs/Reports/State%20of%20Cybersecurity/2026/StateofCyber-26-04-2.pdf">in Canada report.</a></p></li><li><p><a href="https://globalnews.ca/news/11640228/cybersecurity-bill-internet-freedom-speech-minister/">Cybersecurity bill won&#8217;t be used to kick people off internet, minister says</a></p></li><li><p><a href="https://globalnews.ca/news/11625147/chinese-electric-vehicles-security-risks/">Canada deal on Chinese EVs shows trade &#8216;trumped national security&#8217;: experts</a></p><ul><li><p>If you&#8217;re so concerned about Chinese EV cyber security, then you should be just as concerned about North American vehicle cyber security. It&#8217;s not just a Chinese EV problem, it is almost all new vehicles with digital systems. In fact, this is really an internet of things problem.</p></li></ul></li><li><p><a href="https://www.cyber.gc.ca/sites/default/files/cse-ransomware-threat-outlook-2025-2027.pdf">Canadian Centre for Cyber Security releases Ransomware Outlook 2025 to 2027</a></p></li><li><p><a href="https://nrc.canada.ca/en/irap/about/international/?action=view&amp;id=275">Canada&#8211;Japan Keihanna Global Acceleration Program&#8212;Spring 2026</a></p><ul><li><p>&#8220;The NRC IRAP, in partnership with Japan&#8217;s Keihanna Research Complex, is pleased to invite Canadian small and medium-sized enterprises (SMEs) to submit an expression of interest to participate in a 5-minute pitch event to seek co-innovation partnerships with world-class Japanese corporations. Selected Canadian SMEs may be invited to meetings in Osaka, Japan, to solidify their partnerships with interested Japanese corporations.&#8221;</p></li></ul></li><li><p><a href="https://thelogic.co/news/canada-tech-jobs-hiring-layoffs">Why it&#8217;s so hard to get a tech job in Canada right now</a></p><ul><li><p>&#8220;Layoffs and a hiring slowdown have combined to create nightmarish conditions for some job seekers in the Canadian tech sector.&#8221;</p></li><li><p>It is not going to get easier anytime soon. Training academies/schools are already going under.</p></li></ul></li><li><p><a href="https://thelogic.co/news/manulife-ai-life-insurance-maude">Manulife says your life insurance isn&#8217;t important enough to be reviewed by human</a></p></li><li><p><a href="https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/">Massive AI Chat App Leaked Millions of Users Private Conversations</a></p></li><li><p><a href="https://www.cbc.ca/news/politics/ai-ransomeware-attacks-9.7065169">More criminals are using AI for ransomware attacks, cybersecurity centre warns</a></p></li><li><p><a href="https://betakit.com/rachel-clark-is-taking-on-cybersecuritys-scalability-problem/">Rachel Clark is taking on cybersecurity&#8217;s scalability problem</a></p></li><li><p><a href="https://cybersecurecatalyst.ca/canadian-cybersecurity-expert-flags-u-s-interference-concerns-urges-caution-onai-adoption/">Catalyst Executive Director, Charles Finlay flags US interference concerns, urges security and speed in Al adoption</a></p><ul><li><p>Original paywalled article <a href="https://www.thewirereport.ca/2026/01/26/canadian-cybersecurity-expert-flags-u-s-interference-concerns-urges-caution-on-ai-adoption/">here</a></p></li></ul></li><li><p><a href="https://www.linkedin.com/pulse/digital-government-leaders-summit-2026-working-together-better-alncc/">Digital Government Leaders Summit 2026: Working together for a better tomorrow</a></p></li><li><p><a href="https://www.youtube.com/shorts/VIjppKxB1Ns">Linus Tech Tips: Explaining the RAM Crisis in 60 Seconds</a></p></li><li><p><a href="https://www.theverge.com/ai-artificial-intelligence/867874/stripe-visa-mastercard-amex-csam-grok">Payment processors were against CSAM until Grok started making it</a></p></li><li><p><a href="https://betakit.com/canadas-cybersecurity-startups-have-no-room-for-error/">Canada&#8217;s cybersecurity startups have no room for error</a></p></li><li><p><a href="https://www.ourcommons.ca/DocumentViewer/en/45-1/PACP/meeting-22/minutes">House of Commons Standing Committee on Public Accounts holds hearing on the 2025 Auditor General Report on Cyber Security of Government Networks and Systems</a></p><ul><li><p>I plan to write an overview/analysis of this meeting in February.</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/video/2026/01/28/cybersecurity-expert-cyber-crime-and-ransomware-becoming-most-impactful-threat-to-canadians/">CCCS Head Rajiv Gupta: Cyber crime and ransomware becoming &#8216;most impactful&#8217; threat to Canadians</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Canada Cyber Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://cybernoz.com/hackers-use-rn-typo-trick-to-impersonate-marriott-in-new-phishing-attack/">Hackers Use &#8216;rn&#8217; Typo Trick to Impersonate Marriott in New Phishing Attack</a></p></li><li><p><a href="https://www.ransomware.live/country/CAN">Clop ransomware group claims to have targeted multiple Canadian entities</a></p></li><li><p><a href="https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html">Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation</a></p></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability">Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088</a></p></li><li><p><a href="https://archive.ph/ne2eI#selection-529.0-529.63">Hackers Say They&#8217;ve Hacked Match Group, Maker of Hinge, OkCupid</a></p></li><li><p><a href="https://www.computerweekly.com/news/366637762/Wave-of-ShinyHunters-vishing-attacks-spreading-fast">Wave of ShinyHunters vishing attacks spreading fast</a></p></li><li><p>CCCS <a href="https://www.cyber.gc.ca/en/alerts-advisories/al25-019-vulnerabilities-impacting-fortinet-products-forticloud-sso-login-authentication-bypass-cve-2025-59718-cve-2025-59719">Alert - AL25-019 - Vulnerabilities impacting Fortinet products - FortiCloud SSO Login Authentication Bypass - CVE-2025-59718 and CVE-2025-59719 - Update 2</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/aisuru-botnet-sets-new-record-with-314-tbps-ddos-attack/amp/">Aisuru botnet sets new record with 31.4 Tbps DDoS attack</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/escan-confirms-update-server-breached-to-push-malicious-update/">eScan confirms update server breached to push malicious update</a></p><ul><li><p>Major supply chain attack.</p></li></ul></li></ul><div><hr></div><h3>Research and Op-Eds</h3><ul><li><p><a href="https://www.iiss.org/online-analysis/cyber-power-matrix/2026/01/volt-typhoons-long-shadow/">Volt Typhoon&#8217;s long shadow</a> - IISS</p><ul><li><p>Volt Typhoon is one of the top cyber threats to Canada</p></li></ul></li><li><p><a href="https://warontherocks.com/2026/01/the-primes-arent-the-real-bottleneck-in-u-s-weapons-production/">The Primes Aren&#8217;t the Real Bottleneck in U.S. Weapons Production</a> - War on the Rocks</p><ul><li><p>Although this is focused on US weapons production, a lot of its discussion applies to Canada. HOWEVER, I dislike the framing of this as if there is no issue with the primes. There is blame to go around to everyone in the defence industry.</p></li></ul></li><li><p><a href="https://www.cigionline.org/publications/rethinking-tiktok-regulation-in-canada/">Rethinking TikTok Regulation in Canada</a> - CIGI</p><ul><li><p>Policy Brief by Matt Malone and Oren Tsur</p></li></ul></li><li><p><a href="https://www.cfr.org/articles/the-trump-administrations-cyber-strategy-fundamentally-misunderstands-chinas-threat">The Trump Administration&#8217;s Cyber Strategy Fundamentally Misunderstands China&#8217;s Threat</a> - Council on Foreign Relations</p><ul><li><p>New US cyber security strategy is likely to emphasize offensive cyber operations.</p></li></ul></li><li><p><a href="https://warontherocks.com/2026/01/is-americas-cyber-weakness-self-inflicted/">Is America&#8217;s Cyber Weakness Self-Inflicted?</a> - War on the Rocks</p><ul><li><p>I love this article, a must read.</p></li></ul></li><li><p><a href="https://balsillieschool.ca/wp-content/uploads/2026/01/Canadian-Data-Protection-and-Cybersecurity.pdf">Canadian Data Protection and Cybersecurity in an Era of Diminishing North American Cooperation</a></p><ul><li><p>A good policy brief by two Balsillie School MA students.</p></li></ul></li></ul><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://defensescoop.com/2026/01/23/disa-mission-network-as-a-service-cocomnet/?utm_campaign=DefenseScoop%20-%20Editorial%20Content&amp;utm_content=366774567">DISA moving out on Mission Network-as-a-Service effort in 2026</a></p><ul><li><p>&#8220;DISA will prioritize an effort to unify all of the combatant commands&#8217; networks worldwide into a single, cloud-based platform to improve security and interoperability.&#8221;</p></li></ul></li><li><p><a href="https://www.politico.com/news/2026/01/22/5-things-to-know-about-the-tiktok-deal-00743316">5 things to know about the TikTok deal</a></p></li><li><p><a href="https://homeland.house.gov/wp-content/uploads/2026/01/2026-01-23-Chairman-Ogles-to-LinkedIn-re-Request-to-Testify.pdf">The Chair for the Subcommittee on Cybersecurity and Infrastructure Protection of the House Committee on Homeland Security sent letters to </a>LinkedIn, Amazon Web Services and Palo Alto Networks to testify on threats of North Korean IT workers. </p></li><li><p><a href="https://home.treasury.gov/news/press-releases/sb0371">US Treasury Cancels Contracts with Booz Allen Hamilton</a></p><ul><li><p>&#8220;Booz Allen failed to implement adequate safeguards to protect sensitive data&#8230;&#8221; Data breach cited as reason for US Treasury to cancel all current contracts with Booz Allen Hamilton.</p></li><li><p>Theoretically a similar action could happen against a company under CPCSC where a company could lose all their contracts based on a singular failure.</p></li></ul></li><li><p><a href="https://www.yahoo.com/news/articles/amazons-internet-beaming-satellites-bright-110000373.html">Amazon&#8217;s internet-beaming satellites are bright enough to disrupt astronomical research, study finds</a></p></li><li><p><a href="https://defensescoop.com/2026/01/26/salesforce-army-contract-data-analytics-cloud-agentic-ai/">Salesforce lands $5.6B Army contract for data analytics, cloud capabilities</a></p><ul><li><p>The three key technologies for future US and CAF military operations are cloud, data analytics, and AI/ML.</p></li></ul></li><li><p><a href="https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361">Trump&#8217;s acting cyber chief uploaded sensitive files into a public version of ChatGPT</a></p></li><li><p><a href="https://defensescoop.com/2026/01/28/cybercom-2-0-cyber-force-generation-china-living-off-the-land/">Pentagon leaders expect Cybercom 2.0 to help thwart Chinese actors &#8216;living off the land&#8217;</a></p></li><li><p><a href="https://www.wsj.com/tech/google-aims-knockout-blow-at-chinese-company-linked-to-massive-cyber-weapon-3c3fdc40?st=NchLZq&amp;reflink=desktopwebshare_permalink">Google Aims Knockout Blow at Chinese Company Linked to Massive Cyber Weapon</a></p></li><li><p><a href="https://www.investing.com/news/stock-market-news/software-stocks-fall-premarket-as-microsoft-and-sap-results-weigh-4473160">Software stocks fall premarket as Microsoft and SAP results weigh</a></p><ul><li><p>&#8220;Software shares fell sharply in premarket U.S. trading Thursday after updates from Microsoft and SAP raised fresh questions about the durability of cloud and AI spending.&#8221;</p></li></ul></li><li><p><a href="https://archive.ph/ClhQ0">Here is the User Guide for ELITE, the Tool Palantir Made for ICE</a></p></li><li><p><a href="https://archive.ph/Dqpqv">Silicon Valley&#8217;s Favorite New AI Agent Has Serious Security Flaws</a></p></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://therecord.media/uk-national-policing-overhaul-cybercrime">UK plans sweeping overhaul of policing amid surge in online crimes</a></p></li><li><p><a href="https://www.theguardian.com/world/2026/jan/26/saudi-arabia-ordered-pay-london-dissident-pegasus-spying-ghanem-al-masarir">Saudi Arabia ordered to pay &#163;3m to London dissident over Pegasus spying</a></p><ul><li><p>Pegasus spyware is a particular favorite amongst authoritarian governments</p></li></ul></li><li><p>Russian Attack on Polish Power Sector</p><ul><li><p><a href="https://thehackernews.com/2026/01/new-dynowiper-malware-used-in-attempted.html">New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector</a></p></li><li><p><a href="https://www.zetter-zeroday.com/attack-against-polands-grid-disrupted-communication-devices-at-about-30-sites">Attack Against Poland&#8217;s Grid Disrupted Communication Devices at About 30 Sites</a></p></li><li><p><a href="https://www.zetter-zeroday.com/polish-grid-systems-targeted-in-cyberattack-had-little-security-per-new-report">Polish Grid Systems Targeted in Cyberattack Had Little Security, Per New Report</a></p></li></ul></li><li><p><a href="https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/">China hacked Downing Street phones for years</a></p></li><li><p><a href="https://nltimes.nl/2026/01/27/dutch-cloud-service-within-reach-mps-demand-govt-action-amid-us-concerns">Dutch cloud service &#8220;within reach&#8221;; MP&#8217;s demand gov&#8217;t action amid U.S. concerns</a></p></li><li><p><a href="https://mahadk.com/posts/ai-skills-hub">The UK paid &#163;4.1 million for a bookmarks site</a></p><ul><li><p>I was waiting for a good article on the UK&#8217;s AI Skills Hub debacle. I feel like this encapsulates it well.</p></li></ul></li><li><p><a href="https://therecord.media/uk-government-warned-cyber-hybrid-threats-offensive-operations">UK leaders warned country risks &#8216;absorbing&#8217; cyber and hybrid attacks without offensive deterrence</a></p></li><li><p><a href="https://www.cnil.fr/en/data-breach-5million-fine-france-travail">Data breach: FRANCE TRAVAIL fined &#8364;5 million</a></p><ul><li><p>France&#8217;s data protection authority fines France Travail, the French government agency responsible for assisting unemployed with financial assistance and finding employment.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p><a href="https://www.ghanaweb.com/GhanaHomePage/NewsArchive/Ghana-to-establish-first-cyber-and-electronic-warfare-centre-President-Mahama-2018668">Ghana to establish first cyber and electronic warfare centre - President Mahama</a></p></li><li><p><a href="https://www.albawaba.com/business/jordans-king-orders-three-year-military-1620849">Jordan&#8217;s king Orders three-Year military restructuring, focus on cyber and AI</a></p></li><li><p><a href="https://cybernews.com/science/starlink-in-europe-us-satellites/">Starlink in Europe &#8211; US satellites, EU security, and space sovereignty</a></p></li><li><p><a href="https://lankanewsweb.net/archives/167493/police-report-surge-in-cybercrime-as-hundreds-arrested-nationwide/">Sri Lankan Police Report Surge in Cybercrime as Hundreds Arrested Nationwide</a></p><ul><li><p>As global economies continue to fracture and poverty increases, we will see an increase in cybercrime due to its low barrier to entry and the increasing prevelance of AI tools that make it even easier to do.</p></li></ul></li><li><p><a href="https://archive.ph/CqQSO">He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive</a></p></li><li><p><a href="https://cybernews.com/security/luxshare-apple-iphone-assembler-breach/">Apple, Nvidia, and Tesla confidential files allegedly exposed in supplier breach</a></p></li><li><p><a href="https://www.euronews.com/next/2026/01/27/france-to-ditch-us-platforms-microsoft-teams-zoom-for-sovereign-platform-amid-security-con">France to ditch US platforms Microsoft Teams, Zoom for &#8216;sovereign platform&#8217; amid security concerns</a></p></li><li><p><a href="https://thehackernews.com/2026/01/experts-detect-pakistan-linked-cyber.html">Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities</a></p></li><li><p><a href="https://therecord.media/latvia-says-russia-remains-top-cyber-threat-record-attacks">Latvia says Russia remains its top cyber threat as attacks hit record high</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Q&amp;A</h3><p>Every week, I will answer any questions that I receive through the <strong><a href="https://app.sli.do/event/cS22dCickNYfwnz2zKN34v">Weekly News Rewire Slido here</a></strong>. Slido allows readers to anonymously submit questions they would like answered. </p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Weekly News Rewire - 24/01/26]]></title><description><![CDATA[Wiring you into the cyber news the week ending January 24]]></description><link>https://www.cyberincontext.ca/p/weekly-news-rewire-240126</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/weekly-news-rewire-240126</guid><pubDate>Sun, 25 Jan 2026 14:31:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3a0d0b3c-0ae3-4af0-9fc3-164a616a0779_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber-related or adjacent news stories that I read this week (or recently). Please leave a comment if you think I missed anything.</p><p>Editor Notes: </p><ul><li><p>I am increasingly thinking I should create a specific United Kingdom/EU section. If you would like me to do so, feel free to leave a comment.</p></li><li><p>I am working to resolve some issues with my DNS and domain name, so if you have issues accessing Canadian Cyber in Context, you can always reach it at <strong>canadiancyber.substack.com</strong></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/weekly-news-rewire-240126/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/weekly-news-rewire-240126/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/weekly-news-rewire-240126?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/weekly-news-rewire-240126?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://betakit.com/hootsuite-dhs-contract/">Vancouver-based Hootsuite could receive up to $2.8 million USD for contract with US immigration enforcement (ICE)</a> </p></li><li><p><a href="https://www.ngen.ca/hannover-messe">NGen is hosting the Canada Pavilion at Hannover Messe 2026.</a></p><ul><li><p>Hannover Messe is one of the world&#8217;s largest industrial trade fairs that includes a lot of cyber security and emerging technologies.</p></li></ul></li><li><p><a href="https://www.pm.gc.ca/en/news/news-releases/2026/01/16/prime-minister-carney-forges-new-strategic-partnership-peoples">Prime Minister Carney forges new strategic partnership with the People&#8217;s Republic of China focused on energy, agri-food, and trade</a></p><ul><li><p><a href="https://www.pm.gc.ca/en/news/statements/2026/01/16/joint-statement-canada-china-leaders-meeting">Joint statement of the Canada-China Leaders&#8217; Meeting</a></p></li><li><p>A few mentions of technology and exchanges including &#8220;digital content creators&#8221;</p></li></ul></li><li><p><a href="https://www.pm.gc.ca/en/news/news-releases/2026/01/18/prime-minister-carney-secures-new-partnership-qatar-increase-trade">Prime Minister Carney secures new partnership with Qatar to increase trade, investment, and defence cooperation</a></p><ul><li><p><a href="https://www.pm.gc.ca/en/news/statements/2026/01/18/prime-minister-mark-carney-canada-and-amir-qatar-his-highness-sheikh">Prime Minister Mark Carney of Canada and Amir of Qatar His Highness Sheikh Tamim bin Hamad Al Thani commit to deepening bilateral engagement and economic cooperation</a></p></li><li><p>Among the bilateral agreements signed is a Memorandum of Understanding for Cooperation in the Field of Information Technology</p></li></ul></li><li><p><a href="https://www.linkedin.com/posts/cafcybercom-comcyberfac_mcsoc-cafcybercom-philippine-activity-7419061331984703488-oQRQ?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABL3hukB51fSNZQe9LLfxA4pDsPcets2XbU">Military Cyber Security Operations Course officially begins in Manila, Philippines</a></p><ul><li><p>Additional social media coverage: <a href="https://www.linkedin.com/posts/cafcybercom-comcyberfac_philippines-cafcybercom-legal-activity-7419786107724148736-H7yh?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABL3hukB51fSNZQe9LLfxA4pDsPcets2XbU">#1</a>, <a href="https://www.linkedin.com/posts/cafcybercom-comcyberfac_cybersecurity-manila-cafcybercom-activity-7420510883451146240-21Pq?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABL3hukB51fSNZQe9LLfxA4pDsPcets2XbU">#2</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PWgc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PWgc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png 424w, https://substackcdn.com/image/fetch/$s_!PWgc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png 848w, https://substackcdn.com/image/fetch/$s_!PWgc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png 1272w, https://substackcdn.com/image/fetch/$s_!PWgc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PWgc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png" width="1112" height="658" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:658,&quot;width&quot;:1112,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:696482,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/184968996?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PWgc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png 424w, https://substackcdn.com/image/fetch/$s_!PWgc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png 848w, https://substackcdn.com/image/fetch/$s_!PWgc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png 1272w, https://substackcdn.com/image/fetch/$s_!PWgc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39e31217-ceb0-4bd3-bef6-851e5f59dea0_1112x658.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p></li></ul></li><li><p><a href="https://www.nationalobserver.com/2026/01/20/news/cpp-canada-pension-investments-xai">Canada&#8217;s pension plan invested $416 million in Musk&#8217;s deepfake porn-generating AI</a></p></li><li><p><a href="https://www.cbc.ca/news/canada/calgary/risk-report-calgary-city-council-9.7052025">Infrastructure failure and cybersecurity threats top list of risks for City of Calgary</a></p></li><li><p><a href="https://www.priv.gc.ca/en/for-federal-institutions/privacy-act-bulletins/pab_20260119/">Data Privacy Week 2026: Prioritizing privacy by design</a></p></li><li><p><a href="https://www.cbc.ca/news/canada/ottawa/canada-federal-government-public-service-job-cuts-losses-9.7045427">Shared Services Canada hit with major layoffs among federal government layoffs</a></p><ul><li><p>Digital services and cyber security are often one of the first to receive funding cuts regardless of if it is government or private sector.</p></li><li><p><a href="https://archive.ph/yNxOp">Public service job cuts will be &#8216;minimal&#8217; in procurement and contracting roles, says PSPC</a></p></li></ul></li><li><p><a href="https://www.ctvnews.ca/canada/article/cse-breached-law-by-directing-actions-at-canadian-report/">CSE breached law by directing actions at Canadian: report</a></p><ul><li><p>The National Security and Intelligence Review Agency determined that CSIS providing a Canadian&#8217;s information to CSE to analyze for foreign intelligence was a breach of the law because CSE&#8217;s action still targeted a Canadian (via their information).<br><br>This makes sense legally, but I worry about the potential gaps in Canadian intelligence this reveals. If I understand this right, theoretically what could have happened here is CSIS obtains a warrant on a Canadian that is spying on behalf of a foreign power, but because they are still a Canadian, CSE cannot use anything obtained from that individual to analyze the role of the foreign power involved because this would still involve CSE targeting a Canadian. Little is known about the case other than CSIS had a lawfully obtained warrant against the Canadian, which is allowed under CSIS&#8217; mandate, so this is all speculative but does suggest that Canada&#8217;s intelligence services may have gaps in their cyber capabilities if they are unable to cooperate with CSE in such a manner.</p></li></ul></li><li><p><a href="https://archive.ph/5YXLa#selection-2117.0-2117.105">Experts say 6G networks still years away, but Canada&#8217;s already preparing for the technology of the future</a></p><ul><li><p>Canada and a lot of Western countries learned the lessons of 5G where China strategically ensured that it had an advantage by putting a lot of investment into developing and formalizing 5G. This gave Chinese firms like Huawei an advantage by aligning industry to deploy 5G earlier than many Western telecom companies. </p></li></ul></li><li><p><a href="https://www.ctvnews.ca/ottawa/article/new-defence-tech-company-opening-factory-in-kanata/">Dominon Dynamics opening factory in Ottawa, Ontario Canada</a> </p><ul><li><p>Dominion Dynamics is a new Canadian defence firm focused on developing C4ISR/sensing technology for Canada&#8217;s North and Arctic.</p></li></ul></li><li><p><a href="https://archive.ph/fs4Nl#selection-739.0-739.87">TikTok Is Now Collecting Even More Data About Its Users. Here Are the 3 Biggest Changes</a></p><ul><li><p>&#8220;According to its new privacy policy, TikTok now collects more data on its users, including their precise location, after majority ownership officially switched to a group based in the US&#8221;</p><p>I would normally put this in the US section, but it&#8217;s likely this affects Canada as well.</p></li></ul></li><li><p><a href="https://www.tanium.com/press-releases/tanium-and-computacenter-partner-to-secure-the-government-of-canada/">Tanium and Computacenter Partner to Secure for Government of Canada&#8217;s Endpoint Visibility, Awareness and Security (EVAS) program</a></p><ul><li><p>This is the program CSE/SSC will be using for better network visibility and identify where they need to deploy more of CSE&#8217;s sensors.</p></li></ul></li><li><p><a href="https://nationalnewswatch.com/2026/01/21/federal-court-sets-aside-tiktok-canada-shutdown-orderhttps://nationalnewswatch.com/2026/01/21/federal-court-sets-aside-tiktok-canada-shutdown-order">Federal Court sets aside TikTok Canada shutdown order</a></p></li><li><p><a href="https://ottawa.citynews.ca/2026/01/23/government-to-bring-forward-online-harms-bill-ai-minister-says/">Government plans to bring forward online harms bill, AI minister says</a></p><p></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Canada Cyber Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here and not all advisories, follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/grubhub-confirms-hackers-stole-data-in-recent-security-breach/">Grubhub confirms hackers stole data in recent security breach</a></p></li><li><p><a href="https://medium.com/s2wblog/detailed-analysis-of-lockbit-5-0-de92c03441f8">Detailed Analysis of LockBit 5.0</a></p><ul><li><p>&#8220;The update from LockBit 4.0 to 5.0 significantly enhances analysis evasion and attack efficiency.&#8221;</p></li></ul></li><li><p><a href="https://blog.lastpass.com/posts/new-phishing-campaign-targeting-lastpass-customers">New Phishing Campaign Targeting LastPass Customers</a></p></li><li><p><a href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/">Arctic Wolf Observes Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts</a></p><ul><li><p>Threat actors are bypassing Single Sign-On (SSO) creating their own admin account for future access and stealing the device&#8217;s current configuration file. Fortinet patched the bug in December but now says the vulnerability continues to be exploited in the newer firmware.</p></li></ul></li><li><p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b">Cisco Unified Communications Products Remote Code Execution Vulnerability</a></p></li><li><p><a href="https://thehackernews.com/2026/01/china-linked-apt-exploits-sitecore-zero.html">China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusion</a></p><ul><li><p>Focused on critical infrastructure in North America</p></li></ul></li><li><p><a href="https://thehackernews.com/2026/01/hackers-use-linkedin-messages-to-spread.html">Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading</a></p></li><li><p><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-002-vulnerability-affecting-gnu-inetutils-telnetd-cve-2026-24061">Alert - AL26-002 -Vulnerability affecting GNU Inetutils Telnetd - CVE-2026-24061</a> </p></li></ul><div><hr></div><h3>Research and Op-Eds</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9711f0ee-1cf6-4cb8-9aaf-4e15ef6ccddd&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Rudderless Management of Canadian Federal Cyber Security&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-01-20T13:55:24.918Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29ff9f8d-0a69-496f-aa06-cedf1fb72b83_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/the-rudderless-management-of-canadian&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:184252122,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><a href="https://archive.ph/V28Qk">Le Canada se voit-il vassal ou souverain? </a>(Does Canada see itself as a vassal or a sovereign?)</p><ul><li><p>Although not directly talking about cyber, information and communication technologies is at the heart of this discussion due to US dominance in this space.</p></li></ul></li><li><p><a href="https://counterhate.com/research/grok-floods-x-with-sexualized-images/">Center for Counter Digital Hate: Grok floods X with sexualized images of women and children</a></p><ul><li><p>&#8220;Grok generated an estimated 3 million sexualized images, including 23,000 of children, based on our sampling.&#8221;</p></li></ul></li><li><p>Silverado Policy Accelerator: <a href="https://silverado.org/data-dashboards/china-global-exports-rare-earth-elements-rare-earth-permanent-magnets/">China&#8217;s Global Exports of Rare Earth Elements and Rare Earth Permanent Magnets</a></p></li><li><p>Reflectiz: <a href="https://files.reflectiz.com/hubfs/Gated%20Content/Research%20The%20State%20of%20Web%20Exposure%20Report%202026.pdf">The State of Web Exposure 2026</a></p><ul><li><p>According to the report, based on an analysis of 4,700 leading websites, 64% of third&#8209;party applications access sensitive data without legitimate business justification</p></li></ul></li><li><p>Globe and Mail Opinion: <a href="https://archive.ph/dp4DE">Your e-mail to your co-worker might pass through the U.S. before returning</a></p><ul><li><p>Byron Holland is the president and chief executive of the Canadian Internet Registration Authority, which manages the .CA domain.</p></li></ul></li></ul><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/">Microsoft Gave FBI Keys To Unlock Encrypted Data, Exposing Major Privacy Flaw</a></p><ul><li><p>This needs to be a major wake up call for Canada. &#8220;A valid legal order&#8221; increasingly does not mean much in the United States, but American corporations are complying in advance.</p></li></ul></li><li><p><a href="https://www.anchoragepolice.com/news/apd-proactively-monitoring-third-party-service-provider-for-cybersecurity-incidenthttps://www.anchoragepolice.com/news/apd-proactively-monitoring-third-party-service-provider-for-cybersecurity-incident">Anchorage PD Proactively Monitoring Third-Party Service Provider for Cybersecurity Incident</a></p></li><li><p><a href="https://www.justice.gov/usao-nj/pr/jordanian-man-admits-selling-unauthorized-access-computer-networks-50-companies">Jordanian Man Admits Selling Unauthorized Access to Computer Networks of 50 Companies</a></p></li><li><p><a href="https://www.washingtontimes.com/news/2026/jan/20/critical-infrastructures-face-major-threat-chinese-cyberattacks/">U.S. cyber chief nominee warns Congress of Chinese pre&#8209;positioning in critical infrastructure</a></p></li><li><p><a href="https://www.fdd.org/analysis/2026/01/21/china-may-have-accessed-u-s-supercomputing-resources-to-fuel-its-military-modernization-efforts/">China May Have Accessed U.S. Supercomputing Resources To Fuel Its Military Modernization Efforts</a></p></li><li><p><a href="https://media.defense.gov/2026/Jan/23/2003864773/-1/-1/0/2026-NATIONAL-DEFENSE-STRATEGY.PDF">United States National Defense Strategy 2026</a></p><ul><li><p>There is very little on cyber, largely boilerplate stuff. The only thing that really stood out was what I included before. Department of Defense &#8220;will also develop other options to deter or degrade cyber threats to the U.S. Homeland.&#8221; Is very interesting and vague wording.</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zbbc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zbbc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png 424w, https://substackcdn.com/image/fetch/$s_!zbbc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png 848w, https://substackcdn.com/image/fetch/$s_!zbbc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png 1272w, https://substackcdn.com/image/fetch/$s_!zbbc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zbbc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png" width="648" height="80" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:80,&quot;width&quot;:648,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:25775,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/184968996?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zbbc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png 424w, https://substackcdn.com/image/fetch/$s_!zbbc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png 848w, https://substackcdn.com/image/fetch/$s_!zbbc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png 1272w, https://substackcdn.com/image/fetch/$s_!zbbc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fe49876-f3a6-4067-9cce-3b21d7a366fc_648x80.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The United States is expected to release a National Cybersecurity Strategy in 2026, so we&#8217;ll hold out for that.</p><div><hr></div><h3>International News</h3><ul><li><p>New Zealand: <a href="https://managemyhealth.co.nz/mmh-cyber-breach-update-january-2026/">ManageMyHealth Breach Exposes 126K Users</a></p></li><li><p>Germany: <a href="https://www.tagesschau.de/investigativ/ndr-wdr/bnd-gesetz-befugnisse-102.html">More storage, more monitoring, more hacking</a></p><ul><li><p>Germany&#8217;s Federal Intelligence Service is seeking to develop more cyber capabilities to become more independent from the United States and allies.</p></li></ul></li><li><p><a href="https://www.occrp.org/en/news/georgia-probes-how-russian-gas-purchase-details-appeared-on-government-website">Georgia Probes How Russian Gas Purchase Details Appeared on Government Website</a></p></li><li><p><a href="https://www.theguardian.com/technology/2026/jan/16/x-still-allowing-sexualised-images-grok-ai-nudification">X still allowing users to post sexualised images generated by Grok AI tool</a></p></li><li><p><a href="https://www.ft.com/content/eb677cb3-f86c-42de-b819-277bcb042295">Brussels in move to bar Chinese suppliers from EU&#8217;s critical infrastructure</a></p></li><li><p><a href="https://archive.ph/fup5n#selection-549.0-549.70">Chinese AI Developers Say They Can&#8217;t Beat America Without Better Chips</a></p><ul><li><p>The race for computing power will increasingly run into hardware bottlenecks. This is already affecting memory costs and the increasing politicization of chips and hardware amid the chip wars and will continue to increase tensions between China and the United States. </p></li></ul></li><li><p><a href="https://www.theregister.com/2026/01/14/endesa_breach/">Spanish power giant sparks breach probe amid claims of massive data grab</a></p></li><li><p><a href="https://www.ctvnews.ca/world/article/hackers-target-iran-state-tvs-satellite-transmission-to-broadcast-exiled-crown-prince/">Cyberattack on Iran state TV&#8217;s satellite transmission to broadcast exiled crown prince</a></p></li><li><p><a href="https://www.ynetnews.com/article/sjubhxjrwg">Television broadcasts hacked in Iran: &#8216;Continue your struggle. Freedom is closer than ever&#8217;</a></p><ul><li><p>This is not to say it isn&#8217;t Iranian hackers, but Israel and the United States like to pretend to be hacktivists in Iran to target the government.</p></li></ul></li><li><p><a href="https://www.nbcnews.com/tech/tech-news/iran-internet-blackout-spacex-starlink-lifeline-rcna254030">Under Iran&#8217;s internet blackout, SpaceX&#8217;s Starlink is a lifeline &#8212; if it can stay online</a></p></li><li><p><a href="https://www.theregister.com/2026/01/21/under_armour_everest/">Everest ransomware gang said to be sitting on mountain of Under Armour data</a></p></li><li><p><a href="https://nltimes.nl/2026/01/21/parliament-tells-dutch-govt-keep-digid-data-american-hands">Parliament tells Dutch gov&#8217;t to keep DigiD data out of American hands</a></p></li><li><p><a href="https://hackread.com/everest-ransomware-mcdonalds-india-breach-customer-data/">Everest Ransomware Claims McDonalds India Breach Involving Customer Data</a></p></li><li><p><a href="https://arstechnica.com/security/2026/01/overrun-with-ai-slop-curl-scraps-bug-bounties-to-ensure-intact-mental-health/">Overrun with AI slop, cURL scraps bug bounties to ensure &#8220;intact mental health&#8221;</a></p></li><li><p><a href="https://arstechnica.com/tech-policy/2026/01/asking-grok-to-delete-fake-nudes-may-force-victims-to-sue-in-musks-chosen-court/">Asking Grok to delete fake nudes may force victims to sue in Musk&#8217;s chosen court</a></p></li><li><p><a href="https://www.zetter-zeroday.com/cyberattack-targeting-polands-energy-grid-used-a-wiper">Cyberattack Targeting Poland&#8217;s Energy Grid Used a Wiper</a></p></li><li><p><a href="https://archive.ph/Xj9wn#selection-1175.0-1175.59">UK and China Set Up Forum on Cyberattacks to Lower Tensions</a></p><ul><li><p>China is increasingly exhibiting an openness to communicate about cyber operations as part of its broader strategy.</p></li></ul></li></ul><div><hr></div><h3>Q&amp;A</h3><p>Every week, I will answer any questions that I receive through the <strong><a href="https://app.sli.do/event/cS22dCickNYfwnz2zKN34v">Weekly News Rewire Slido here</a></strong>. Slido allows readers to anonymously submit questions and vote on those they would like answered. </p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>