Normal view

Received yesterday — 13 February 2026

The Guardian view on the BBC World Service: this is London calling | Editorial

13 February 2026 at 13:25

With just seven weeks before its funding runs out, the UK’s greatest cultural asset and most trusted international news organisation must be supported

“The programmes will neither be very interesting nor very good,” said the then BBC director general John Reith, when he launched its Empire Service in December 1932. Nearly a century later, the BBC World Service, as it is now known, broadcasts in 43 languages, reaches 313 million people a week and is one of the UK’s most influential cultural assets. It is also a lifeline for millions. “Perhaps Britain’s greatest gift to the world” in the 20th century, as Kofi Annan, the former UN secretary general, once put it.

But this week Tim Davie, the corporation’s director general, announced that the World Service will run out of funding in just seven weeks. Most of its £400m budget comes from the licence fee, although the Foreign Office – which funded it entirely until 2014 – contributed £137m in the last year. The funding arrangement with the Foreign Office finishes at the end of March. There is no plan for what happens next.

Do you have an opinion on the issues raised in this article? If you would like to submit a response of up to 300 words by email to be considered for publication in our letters section, please click here.

Continue reading...

© Photograph: Lewis Whyld/PA Wire/Press Association Images

© Photograph: Lewis Whyld/PA Wire/Press Association Images

© Photograph: Lewis Whyld/PA Wire/Press Association Images

Arundhati Roy is right, not Wim Wenders – here are eight films that have changed politics

13 February 2026 at 12:43

From ‘honour’ killings to nuclear war, some screen works have led directly legislative action – despite what jury head Wenders suggested at the Berlin film festival

Should film festivals be more than just screenings and red carpets? Should they prompt us to think about the role cinema plays in the world? Novelist Arundhati Roy certainly thinks so. She pulled out of the jury at the Berlin festival in protest at jury president Wim Wenders’ claim that films should “stay out of politics”; she said Wenders’ stance was “unconscionable”, and that to “hear [him] say that art should not be political is jaw-dropping.”

Wenders had suggested that cinema is a way to build empathy, but not directly change politicians’ minds. However this is simply not true. Some films – both documentary and narrative – have not only changed public opinion about social issues but led directly to legislation. Despite evidence to the contrary, politicians are people too. They can be moved. And sometimes they are even moved to action.

Continue reading...

© Photograph: Everett Collection Inc/Alamy

© Photograph: Everett Collection Inc/Alamy

© Photograph: Everett Collection Inc/Alamy

Platforms bend over backward to help DHS censor ICE critics, advocates say

13 February 2026 at 07:00

Pressure is mounting on tech companies to shield users from unlawful government requests that advocates say are making it harder to reliably share information about Immigration and Customs Enforcement (ICE) online.

Alleging that ICE officers are being doxed or otherwise endangered, Trump officials have spent the last year targeting an unknown number of users and platforms with demands to censor content. Early lawsuits show that platforms have caved, even though experts say they could refuse these demands without a court order.

In a lawsuit filed on Wednesday, the Foundation for Individual Rights and Expression (FIRE) accused Attorney General Pam Bondi and Department of Homeland Security Secretary Kristi Noem of coercing tech companies into removing a wide range of content "to control what the public can see, hear, or say about ICE operations."

Read full article

Comments

© Aurich Lawson | Getty Images

Starmer condemns Reform UK’s ‘racist rhetoric’ – UK politics live

13 February 2026 at 08:33

PM says country’s discourse is being poisoned and polluted by rhetoric ‘pitting communities against one another’

The Equality and Human Rights Commission has welcomed a high court ruling defending the interim guidance it issued to organisations about the implications of the supreme court judgement saying that, when the Equality Act refers to sex, it means biological sex.

The guidance – described as an “interim update” – was controversial because it was seen as over-prescriptive, and the Good Law Project launched a legal challenge.

We welcome the court’s conclusion that the interim update was lawful and the EHRC did not act in breach of its statutory duties.

We issued the interim update in response to a high level of demand immediately after the supreme court’s ruling. We were concerned that organisations and individuals could be subject to misinformation and misrepresentation of the judgment and its consequences. That might have led to them failing to comply with the law: adopting or maintaining discriminatory policies or practices, to the detriment of those the law is supposed to protect.

It is wrong because it reduces trans people to a third sex. It is wrong because it gives little or no weight to the harm done to trans people by excluding them. And it is wrong because it is not interested enough in the rights of people who are trans to keep their status private.

The tragic irony for [Morgan] McSweeney [Starmer’s chief of staff until Sunday] was that Starmer’s 18 months as prime minister have only vindicated Blair’s central analysis of their project. McSweeney and Starmer might have identified what they disliked most about the excesses of New Labour, but they never developed an alternative political economy of their own that might replace it. In place of Blairism there was no theory of political reform or coherent critique of British state failure, no analysis of Britain’s future place in the world or any kind of distinct moral mission. All there was was a promise to “clean things up” as Starmer put it to me. The mission became, in essence, conservative: to protect the settlement erected by Blair and eroded over the 20 years since his departure. Britain could thrive if it could only begin to live within its means, attract more foreign investment, reassure the bond markets and return a sense of “service” to government. After years of chaos, mere stability would be change. And this would be enough.

Where there was distinct radicalism – from McSweeney’s Blue Labour instincts – there was no mandate. McSweeney and Starmer had not fought an ideological battle to bring Blue Labour to government, as Wilson had done for socialist modernisation in the 1960s and Blair for liberal progressivism 30 years later. This was largely because Starmer never really believed in it in the first place and McSweeney, though a reflective thinker, was always more of an operator than political theorist. And so, the pair offered a programme without a programme, a government without ideas or the mandate to enact them.

Another of those who worked for [Stamer] adds: ‘He’s completely incurious. He’s not interested in policy or politics. He thinks his job is to sit in a room and be serious, be presented with something and say “Yes” or “No” – invariably “Yes” – rather than be persuader–in-chief.’ Even before he fell out with Starmer, Mandelson told friends and colleagues that the Prime Minister had never once asked him ‘What really makes Trump tick?’ or ‘How will he react to this?’.

Others dispute the claim of incuriosity. ‘There are subjects when he drills down and he’s really, really good,’ says another aide. ‘The idea he can’t think politically is also wrong. He will often think ahead.’ But even these loyalists admit Starmer lacks a ‘philosophical worldview’.

Continue reading...

© Photograph: Suzanne Plunkett/Reuters

© Photograph: Suzanne Plunkett/Reuters

© Photograph: Suzanne Plunkett/Reuters

Dual nationals to be denied entry to UK from 25 February unless they have British passport

13 February 2026 at 09:07

New border controls require ‘certificate of entitlement’ to attach to second nationality passport that costs £589

Dual British nationals have been warned they may be denied boarding a flight, ferry or train to the UK after 25 February unless they carry a valid British passport.

The warning by the Home Office comes amid scores of complaints from British people living or travelling abroad who have suddenly found themselves at risk of not being allowed into the UK.

If you are affected by the change and want to share your story, email lisa.ocarroll@theguardian.com

Continue reading...

© Photograph: Alex Hare/Alamy

© Photograph: Alex Hare/Alamy

© Photograph: Alex Hare/Alamy

Roses are a proper Valentine’s treat – especially if you can eat them

13 February 2026 at 06:00

The classic flower of romance can be used in jams, tea, even turkish delight – and now is the time to start growing your own

I am extremely cynical when it comes to overly commercialised celebrations designed to pressure us into spending money. But when I realised that this column would appear on Valentine’s Day, I couldn’t resist the temptation to write about the plant that is perpetually intertwined with romance. Fortunately for me, roses happen to be edible.

While technically the entire plant can be eaten, it’s best to stick to the petals, buds and hips (as if I had to tell you not to chomp on their thorns and woody stems). Fresh or dried, rose petals can be used to make rosewater or rose syrup, as pretty garnishes for cakes, and to infuse into sweet treats such as ice-cream and panna cotta. Rosebuds can be used this way too, but beware that by harvesting an entire bud you’re not going to get the rosehip developing later. Rosehips appear once a rose has bloomed and faded, and while they can be eaten raw, the seeds inside are surrounded by irritating hairs that should be discarded. To coax the flavour and abundant vitamin C from rosehips, make them into jellies, jams or syrups, steep them in hot water as a tea, infuse them into vinegar or spirits, or cook them into soups or sauces. As with all foraging-adjacent activities, remember there are many creatures that rely on these flowers and fruit, so leave plenty behind for the pollinators and birds.

Continue reading...

© Photograph: Botany vision/Alamy

© Photograph: Botany vision/Alamy

© Photograph: Botany vision/Alamy

How to plan Ramadan meals: minimal work, maximum readiness

13 February 2026 at 03:00

Preparing simple, repetitive meals is the key to 30 days of fasting

Ramadan arrives this year in February, in the heart of winter. Short days, cold evenings and the pressure of everyday work mean that preparation is no longer about producing abundance, but about reducing effort while maintaining care. For many households balancing jobs, children and long commutes, the question is not what to cook, but how to make the month manageable.

The most effective approach to Ramadan cooking is not variety but repetition. A small set of meals that are easy to digest, quick to prepare and gentle on the body can carry a household through 30 days of fasting with far less stress than daily reinvention. The aim is to do the thinking once, not every day.

Continue reading...

© Photograph: Astrid Templier/Food styling: Lina Saad.

© Photograph: Astrid Templier/Food styling: Lina Saad.

© Photograph: Astrid Templier/Food styling: Lina Saad.

Understanding WS-Trust: A Guide to Secure Token Exchange

Deep dive into WS-Trust for enterprise identity. Learn about STS, token exchange, and secure SSO integration for modern B2B platforms.

The post Understanding WS-Trust: A Guide to Secure Token Exchange appeared first on Security Boulevard.

Received before yesterday

Starmer ousts cabinet secretary in clear-out of top team after Mandelson scandal

12 February 2026 at 14:44

Chris Wormald steps down ‘by mutual consent’ after a year in post with Antonia Romeo expected to succeed him

Keir Starmer’s attempt to shake up his top team after the disastrous Peter Mandelson scandal began on Thursday, when he forced out his most senior civil servant with a view to replacing him with Antonia Romeo.

The prime minister announced that Chris Wormald was stepping down “by mutual consent” after just over a year as cabinet secretary, with Romeo almost certain to succeed him as the first woman in the job.

Continue reading...

© Photograph: ZUMA Press, Inc./Alamy Stock Photo/Alamy Live News.

© Photograph: ZUMA Press, Inc./Alamy Stock Photo/Alamy Live News.

© Photograph: ZUMA Press, Inc./Alamy Stock Photo/Alamy Live News.

What Is a Security Token Service?

Learn how a Security Token Service (STS) brokers trust in Enterprise SSO and CIAM. Explore token issuance, validation, and federated identity for CTOs.

The post What Is a Security Token Service? appeared first on Security Boulevard.

Kingston Police arrest female unable to care for herself or child

6 February 2026 at 12:51
A 26-year-old woman from Windsor has been arrested and her child has been taken to Family and Children’s Services of Frontenac, Lennox and Addington following an interaction with Kingston Police. Read More

"ICE Out of Our Faces Act" would ban ICE and CBP use of facial recognition

5 February 2026 at 15:54

A few Senate Democrats introduced a bill called the ‘‘ICE Out of Our Faces Act," which would ban Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) from using facial recognition technology.

The bill would make it "unlawful for any covered immigration officer to acquire, possess, access, or use in the United States—(1) any biometric surveillance system; or (2) information derived from a biometric surveillance system operated by another entity." All data collected from such systems in the past would have to be deleted. The proposed ban extends beyond facial recognition to cover other biometric surveillance technologies, such as voice recognition.

The proposed ban would prohibit the federal government from using data from biometric surveillance systems in court cases or investigations. Individuals would have a right to sue the federal government for financial damages after violations, and state attorneys general would be able to bring suits on behalf of residents.

Read full article

Comments

© Getty Images | Patrick Fallon

Microsoft releases urgent Office patch. Russian-state hackers pounce.

4 February 2026 at 18:08

Russian-state hackers wasted no time exploiting a critical Microsoft Office vulnerability that allowed them to compromise the devices inside diplomatic, maritime, and transport organizations in more than half a dozen countries, researchers said Wednesday.

The threat group, tracked under names including APT28, Fancy Bear, Sednit, Forest Blizzard, and Sofacy, pounced on the vulnerability, tracked as CVE-2026-21509, less than 48 hours after Microsoft released an urgent, unscheduled security update late last month, the researchers said. After reverse-engineering the patch, group members wrote an advanced exploit that installed one of two never-before-seen backdoor implants.

Stealth, speed, and precision

The entire campaign was designed to make the compromise undetectable to endpoint protection. Besides being novel, the exploits and payloads were encrypted and ran in memory, making their malice hard to spot. The initial infection vector came from previously compromised government accounts from multiple countries and were likely familiar to the targeted email holders. Command and control channels were hosted in legitimate cloud services that are typically allow-listed inside sensitive networks.

Read full article

Comments

© Getty Images

"Capture it all": ICE urged to explain memo about collecting info on protesters

4 February 2026 at 13:32

Senator Edward J. Markey (D-Mass.) demanded that Immigration and Customs Enforcement (ICE) confirm or deny the existence of a "domestic terrorists” database that lists US citizens who protest ICE's immigration crackdown.

ICE "officers and senior Trump administration officials have repeatedly suggested that the Department of Homeland Security (DHS) is building a 'domestic terrorists' database comprising information on US citizens protesting ICE’s actions in recent weeks," Markey wrote in a letter yesterday to Acting ICE Director Todd Lyons. "If such a database exists, it would constitute a grave and unacceptable constitutional violation. I urge you to immediately confirm or deny the existence of such a database, and if it exists, immediately shut it down and delete it."

Creating a database of peaceful protesters "would constitute a shocking violation of the First Amendment and abuse of power," and amount to "the kinds of tactics the United States rightly condemns in authoritarian governments such as China and Russia," Markey said.

Read full article

Comments

© Getty Images | Boston Globe

Congress Reins In Drug Middlemen in Effort to Lower Prescription Prices

4 February 2026 at 05:00
The legislation will impose new restrictions on pharmacy benefit managers, giant companies like CVS Caremark, Optum Rx and Express Scripts that oversee prescription drug benefits.

© Carolyn Kaster/Associated Press

Executives at the largest pharmacy benefit managers testified before a congressional committee in 2023.

Mountain View Shuts Down Flock Safety ALPR Cameras After Year-Long Unrestricted Data Access

4 February 2026 at 03:40

Flock Safety ALPR cameras

Mountain View’s decision to shut down its automated license plate reader program is a reminder of an uncomfortable truth that surveillance technology is only as trustworthy as the systems—and vendors—behind it. This week, Police Chief Mike Canfield announced that all Flock Safety ALPR cameras in Mountain View have been turned off, effective immediately. The move pauses the city’s pilot program until the City Council reviews its future at a February 24 meeting. The decision comes after the police department discovered that hundreds of unauthorized law enforcement agencies had been able to search Mountain View’s license plate camera data for more than a year—without the city’s awareness. For a tool that was sold to the public as tightly controlled and privacy-focused, this is a serious breach of trust.

Flock Safety ALPR Cameras Shut Down Over Data Access Failures

In his message to the community, Chief Canfield made it clear that while the Flock Safety ALPR pilot program had shown value in solving crimes, he no longer has confidence in the vendor. “I personally no longer have confidence in this particular vendor,” Canfield wrote, citing failures in transparency and access control. The most troubling issue, according to the police chief, was the discovery that out-of-state agencies had been able to search Mountain View’s license plate data—something that should never have been possible under state law or city policy. This wasn’t a minor technical glitch. It was a breakdown in oversight, accountability, and vendor responsibility.

Automated License Plate Readers Under Growing National Scrutiny

Automatic license plate readers, or ALPR surveillance cameras, have become one of the most controversial policing technologies in the United States. These cameras capture images of passing vehicles, including license plate numbers, make, and model. The information is stored and cross-checked with databases to flag stolen cars or vehicles tied to investigations. Supporters argue that ALPRs help law enforcement respond faster and solve crimes more efficiently. But critics have long warned that ALPR systems can easily become tools of mass surveillance—especially when data-sharing controls are weak. That concern has intensified under the Trump administration, as reports have emerged of license plate cameras being used for immigration enforcement and even reproductive healthcare-related investigations. Mountain View’s case shows exactly why the debate isn’t going away.

Mountain View Police Violated Its Own ALPR Policies

According to disclosures made this week, the Mountain View Police Department unintentionally violated its own policies by allowing statewide and national access to its ALPR data. Chief Canfield admitted that “statewide lookup” had been enabled since the program began 17 months ago, meaning agencies across California could search Mountain View’s license plate records without prior authorization. Even more alarming, “national lookup” was reportedly turned on for three months in 2024, allowing agencies across the country to access the city’s data. State law prohibits sharing ALPR information with out-of-state agencies, especially for immigration enforcement purposes. So how did it happen? Canfield was blunt: “Why wasn’t it caught sooner? I couldn’t tell you.” That answer won’t reassure residents who were promised strict safeguards.

Community Trust Matters More Than Surveillance Tools

Chief Canfield’s message repeatedly emphasized one point: technology cannot replace trust. “Community trust is more important than any individual tool,” he wrote. That statement deserves attention. Police departments across the country have adopted surveillance systems with the promise of safety, only to discover later that the systems operate with far less control than advertised. When a vendor fails to disclose access loopholes—or when law enforcement fails to detect them—the public pays the price. Canfield acknowledged residents’ anger and frustration, offering an apology and stating that transparency is essential for community policing. It’s a rare moment of accountability in a space where surveillance expansion often happens quietly.

Flock Safety Faces Questions About Transparency and Oversight

Mountain View’s ALPR program began in May 2024, when the City Council approved a contract with Flock Safety, a surveillance technology company. Since August 2024, the city installed cameras at major entry and exit points. By January 2026, Mountain View had 30 Flock cameras operating. Now, the entire program is paused. Flock spokesperson Paris Lewbel said the company would address the concerns directly with the police chief, but the damage may already be done. This incident raises a bigger question: should private companies be trusted to manage sensitive surveillance infrastructure in the first place?

What Happens Next for the Flock Safety ALPR Program?

The City Council will now decide whether Mountain View continues with the Flock contract, modifies the program, or shuts it down permanently. But the broader lesson is already clear. ALPR surveillance cameras may offer law enforcement real investigative value, but without airtight safeguards, they risk becoming tools of unchecked monitoring. Mountain View’s shutdown is not just a local story—it’s part of a national reckoning over how much surveillance is too much, and whether public safety can ever justify the loss of privacy without full accountability.

Plastic Surgeons’ Group Advises Delaying Gender-Affirming Procedures Until Age 19

3 February 2026 at 18:56
The organization’s latest guidance is a departure from the prevailing views of several other major medical organizations.

© Morsa Images/Getty Images

Between 2016 and 2020, about 3,700 patients 18 years old and younger have undergone gender transition surgery, mostly for breast removal, according to a JAMA study.

Woman Wins Malpractice Suit Over Gender Surgery as a Minor

3 February 2026 at 17:24
In a legal first, a jury in New York awarded $2 million to a patient who said that doctors had deviated from accepted medical standards.

© Evelyn Hockstein/Reuters

Recent studies have suggested that between 5 and 10 percent of young people who had undergone gender-affirming care later decided to detransition.

Managing a Security Token Service

Learn how to manage a Security Token Service (STS) for enterprise SSO and CIAM. Best practices for token issuance, rotation, and scaling for CTOs.

The post Managing a Security Token Service appeared first on Security Boulevard.

Single Sign-On with External Security Token Services

Learn how to implement Single Sign-On with External Security Token Services (STS). A deep dive into SAML, OIDC, and token exchange for CTOs and VP Engineering.

The post Single Sign-On with External Security Token Services appeared first on Security Boulevard.

DOJ released Epstein files with dozens of nudes and victims' names, reports say

2 February 2026 at 13:58

The Epstein files released by the Department of Justice on Friday included at least a few dozen unredacted nude photos and names of at least 43 victims, according to news reports.

The DOJ missed a December 19 deadline set by the Epstein Files Transparency Act by more than a month, but still released the files without fully redacting nude photos and names of Jeffrey Epstein's victims. The New York Times reported yesterday that it found "nearly 40 unredacted images that appeared to be part of a personal photo collection, showing both nude bodies and the faces of the people portrayed."

While the people in the photos were young, "it was unclear whether they were minors," the article said. "Some of the images seemed to show Mr. Epstein’s private island, including a beach. Others were taken in bedrooms and other private spaces." The photos "appeared to show at least seven different people," the article said.

Read full article

Comments

© Getty Images | Daniel Heuer/AFP

Attempt to Drill Through Thwaites Glacier Is Foiled

2 February 2026 at 13:49
Scientists lost their instruments within Antarctica’s most dangerously unstable glacier, though not before getting a glimpse at the warming waters underneath.

© Chang W. Lee/The New York Times

Threading a cable through the Thwaites glacier in an attempt to place monitoring equipment.

ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data

2 February 2026 at 11:39
credentials EUAC CUI classified secrets SMB

Several threat clusters are using vishing in extortion campaigns that include tactics that are consistent with those used by high-profile threat group ShinyHunters. They are stealing SSO and MFA credentials to access companies' environments and steal data from cloud applications, according to Mandiant researchers.

The post ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data appeared first on Security Boulevard.

Russian APT28 Exploit Zero-Day Hours After Microsoft Discloses Office Vulnerability

2 February 2026 at 06:49

APT28, Russia, Microsoft Office, Word, CERT-UA, Backdoor, SVR Exploiting Unpatched Vulnerabilities, Russia SVR, SVR, Vulnerabilities, Vulnerability Management, Patch Management

Ukraine's cyber defenders warn Russian hackers weaponized a Microsoft zero-day within 24 hours of public disclosure, targeting government agencies with malicious documents delivering Covenant framework backdoors.

Russian state-sponsored hacking group APT28 used a critical Microsoft Office zero-day vulnerability, tracked as CVE-2026-21509, in less than a day after the vendor publicly disclosed the flaw, launching targeted attacks against Ukrainian government agencies and European Union institutions.

Ukraine's Computer Emergency Response Team detected exploitation attempts that began on January 27—just one day after Microsoft published details about CVE-2026-21509.

Microsoft had acknowledged active exploitation when it disclosed the flaw on January 26, but details pertaining to the threat actors were withheld and it is still unclear if it is the same or some other exploitation campaign that the vendor meant. However, the speed at which APT28 deployed customized attacks shows the narrow window defenders have to patch critical vulnerabilities.

Also read: APT28’s Recent Campaign Combined Steganography, Cloud C2 into a Modular Infection Chain
Cyble Annual Threat Landscape Report, Annual Threat Landscape Report, Cyble Annual Threat Landscape Report 2025, Threat Landscape Report 2025, Cyble, Ransomware, Hacktivism, AI attacks, Vulnerabilities, APT, ICS Vulnerabilities

CERT-UA discovered a malicious DOC file titled "Consultation_Topics_Ukraine(Final).doc" containing the CVE-2026-21509 exploit on January 29. Metadata revealed attackers created the document on January 27 at 07:43 UTC. The file masqueraded as materials related to Committee of Permanent Representatives to the European Union consultations on Ukraine's situation.

[caption id="attachment_109153" align="aligncenter" width="700"]APT28, Russia, Microsoft Office, Word, CERT-UA, Backdoor Word file laced with malware (Source: CERT-UA)[/caption]

On the same day, attackers impersonated Ukraine's Ukrhydrometeorological Center, distributing emails with an attached DOC file named "BULLETEN_H.doc" to more than 60 email addresses. Recipients primarily included Ukrainian central executive government agencies, representing a coordinated campaign against critical government infrastructure.

The attack chain begins when victims open malicious documents using Microsoft Office. The exploit establishes network connections to external resources using the WebDAV protocol—a file sharing protocol that extends HTTP to enable collaborative editing. The connection downloads a shortcut file containing program code designed to retrieve and execute additional malicious payloads.

[caption id="attachment_109150" align="aligncenter" width="600"] Exploit chain. (Source CERT-UA)[/caption]

Successful execution creates a DLL file "EhStoreShell.dll" disguised as a legitimate "Enhanced Storage Shell Extension" library, along with an image file "SplashScreen.png" containing shellcode. Attackers implement COM hijacking by modifying Windows registry values for a specific CLSID identifier, a technique that allows malicious code to execute when legitimate Windows components load.

The malware creates a scheduled task named "OneDriveHealth" that executes periodically. When triggered, the task terminates and relaunches the Windows Explorer process. Because of the COM hijacking modification, Explorer automatically loads the malicious EhStoreShell.dll file, which then executes shellcode from the image file to deploy the Covenant framework on compromised systems.

Covenant is a post-exploitation framework similar to Cobalt Strike that provides attackers persistent command-and-control access. In this campaign, APT28 configured Covenant to use Filen.io, a legitimate cloud storage service, as command-and-control infrastructure. This technique, called living-off-the-land, makes malicious traffic appear legitimate and harder to detect.

CERT-UA discovered three additional malicious documents using similar exploits in late January 2026. Analysis of embedded URL structures and other technical indicators revealed these documents targeted organizations in EU countries. In one case, attackers registered a domain name on January 30, 2026—the same day they deployed it in attacks—demonstrating the operation's speed and agility.

"It is obvious that in the near future, including due to the inertia of the process or impossibility of users updating the Microsoft Office suite and/or using recommended protection mechanisms, the number of cyberattacks using the described vulnerability will begin to increase," CERT-UA warned in its advisory.

Microsoft released an emergency fix for CVE-2026-21509, but many organizations struggle to rapidly deploy patches across enterprise environments. The vulnerability affects multiple Microsoft Office products, creating a broad attack surface that threat actors will continue exploiting as long as unpatched systems remain accessible.

Read: Microsoft Releases Emergency Fix for Exploited Office Zero-Day

CERT-UA attributes the campaign to UAC-0001, the agency's designation for APT28, also known as Fancy Bear or Forest Blizzard. The group operates on behalf of Russia's GRU military intelligence agency and has conducted extensive operations targeting Ukraine since Russia's 2022 invasion. APT28 previously exploited Microsoft vulnerabilities within hours of disclosure, demonstrating consistent capability to rapidly weaponize newly discovered flaws.

CERT-UA recommends organizations immediately implement mitigation measures outlined in Microsoft's advisory, particularly Windows registry modifications that prevent exploitation. The agency specifically urges blocking or monitoring network connections to Filen cloud storage infrastructure, providing lists of domain names and IP addresses in its indicators of compromise section.

ICE observer says her Global Entry was revoked after agent scanned her face

30 January 2026 at 17:36

Minnesota resident Nicole Cleland had her Global Entry and TSA PreCheck privileges revoked three days after an incident in which she observed activity by immigration agents, the woman said in a court declaration. An agent told Cleland that he used facial recognition technology to identify her, she wrote in a declaration filed in US District Court for the District of Minnesota.

Cleland, a 56-year-old resident of Richfield and a director at Target Corporation, volunteers with a group that tracks potential Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) vehicles in her neighborhood, according to her declaration. On the morning of January 10, she "observed a white Dodge Ram being driven by what I believed to be federal enforcement agents" and "maneuvered behind the vehicle with the intent of observing the agents’ actions."

Cleland said that she and another observer in a different car followed the Dodge Ram because of "concern about a local apartment building being raided." She followed the car for a short time and from a safe distance until "the Dodge Ram stopped in front of the other commuter’s vehicle," she wrote. Cleland said two other vehicles apparently driven by federal agents stopped in front of the Dodge Ram, and her path forward was blocked.

Read full article

Comments

© Getty Images | Roberto Schmidt

Drilling Through the Thwaites Glacier for Clues to Its Melting

30 January 2026 at 12:59
A team hopes to place instruments in the waters beneath the colossal Thwaites Glacier, with the help of a drill that uses hot water to punch through ice.

© Chang W. Lee/The New York Times

US spy satellite agency declassifies high-flying Cold War listening post

29 January 2026 at 18:07

The National Reconnaissance Office, the agency overseeing the US government's fleet of spy satellites, has declassified a decades-old program used to eavesdrop on the Soviet Union's military communication signals.

The program was codenamed Jumpseat, and its existence was already public knowledge through leaks and contemporary media reports. What's new is the NRO's description of the program's purpose and development and pictures of the satellites themselves.

In a statement, the NRO called Jumpseat "the United States’ first-generation, highly elliptical orbit (HEO) signals-collection satellite."

Read full article

Comments

© National Reconnaissance Office

Microsoft Office zero-day lets malicious documents slip past security checks

29 January 2026 at 09:53

Microsoft issued an emergency patch for a high-severity zero-day vulnerability in Office that allows attackers to bypass document security checks and is being exploited in the wild via malicious files.

Microsoft pushed the emergency patch for the zero‑day, tracked as CVE-2026-21509, and classified it as a “Microsoft Office Security Feature Bypass Vulnerability” with a CVSS score of 7.8 out of 10.

The flaw allows attackers to bypass Object Linking and Embedding (OLE) mitigations that are designed to block unsafe COM/OLE controls inside Office documents. This means a malicious attachment could infect a PC despite built-in protections.

In a real-life scenario, an attacker creates a fake Word, Excel, or PowerPoint file containing hidden “mini‑programs” or special objects. They can run code and do other things on the affected computer. Normally, Office has safety checks that would block those mini-programs because they’re risky.

However, the vulnerability allows the attacker to tweak the file’s structure and hidden information in a way that tricks Office into thinking the dangerous mini‑program inside the document is harmless. As a result, Office skips the usual security checks and allows the hidden code to run.

As code to test the bypass is publicly available, increasing the risk of exploitation, users are under urgent advice to apply the patch.

Updating Microsoft 365 and Office
Updating Microsoft 365 and Office

How to protect your system

What you need to do depends on which version of Office you’re using.

The affected products include Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps (both 32‑bit and 64‑bit).

Office 2021 and later are protected via a server‑side change once Office is restarted. To apply it, close all Office apps and restart them.

Office 2016 and 2019 require a manual update. Run Windows Update with the option to update other Microsoft products turned on.

If you’re running build 16.0.10417.20095 or higher, no action is required. You can check your build number by opening any Office app, going to your account page, and selecting About for whichever application you have open. Make sure the build number at the top reads 16.0.10417.20095 or higher.

What always helps:

  • Don’t open unsolicited attachments without verifying them with a trusted sender.
  • Treat all unexpected documents, especially those asking to “enable content” or “enable editing,” as suspicious.
  • Keep macros disabled by default and only allow signed macros from trusted publishers.
  • Use an up-to-date real-time anti-malware solution.
  • Keep your operating system and software fully up to date.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

US cyber defense chief accidentally uploaded secret government info to ChatGPT

28 January 2026 at 14:56

Alarming critics, the acting director of the Cybersecurity and Infrastructure Security Agency (CISA), Madhu Gottumukkala, accidentally uploaded sensitive information to a public version of ChatGPT last summer, Politico reported.

According to "four Department of Homeland Security officials with knowledge of the incident," Gottumukkala's uploads of sensitive CISA contracting documents triggered multiple internal cybersecurity warnings designed to "stop the theft or unintentional disclosure of government material from federal networks."

Gottumukkala's uploads happened soon after he joined the agency and sought special permission to use OpenAI's popular chatbot, which most DHS staffers are blocked from accessing, DHS confirmed to Ars. Instead, DHS staffers use approved AI-powered tools, like the agency's DHSChat, which "are configured to prevent queries or documents input into them from leaving federal networks," Politico reported.

Read full article

Comments

© Pakin Songmor | Moment

Meta blocks links to ICE List across Facebook, Instagram, and Threads

28 January 2026 at 12:22

Meta has started blocking its users from sharing links to ICE List, a website that has compiled the names of what it claims are Department of Homeland Security employees, a project the creators say is designed to hold those employees accountable.

Dominick Skinner, the creator of ICE List, tells WIRED that links to the website have been shared without issue on Meta’s platforms for more than six months.

“I think it's no surprise that a company run by a man who sat behind Trump at his inauguration, and donated to the destruction of the White House, has taken a stance that helps ICE agents retain anonymity,” says Skinner.

Read full article

Comments

© Will Oliver/Getty Images

Major Cyberattack Cripples Russia’s Alarm and Vehicle Security Provider Delta

28 January 2026 at 00:58

cyberattack on Delta

A cyberattack on Delta, a Russian provider of alarm and security systems for homes, businesses, and vehicles, has disrupted operations and triggered widespread service outages, leaving many customers unable to access critical security functions. Delta, which serves tens of thousands of users across Russia, confirmed the Delta cyberattack on Monday, stating that it faced a major external assault on its IT infrastructure. The disruption due to cyberattack on Delta has affected both online services and customer communication channels, raising concerns about the resilience of connected security platforms.

Cyberattack on Delta Security Systems Causes Major Outage

In an official statement, the company emphasized its position in the market and its ongoing investments in cybersecurity. Delta said: “On January 26, DELTA experienced a large-scale external attack on its IT infrastructure aimed at disrupting the company's services.” The company added that some services were temporarily unavailable, but insisted there were no immediate signs of customer data exposure. “At this time, no signs of a compromise of customer personal data have been detected.” Delta also apologized to customers and said restoration efforts were underway with the help of specialized experts.

Delta Struggles to Restore Services After Cyberattack

Delta marketing director Valery Ushkov provided additional details in a video address, acknowledging the large scale of the incident. He said: “Our architecture was unable to withstand a well-coordinated attack coming from outside the country.” Ushkov noted that recovery was taking longer than expected because the company was still facing the risk of follow-up attacks while attempting to restore backups. As of Tuesday, Delta’s website and phone lines remained offline. With traditional communication channels down, the company has been forced to issue updates through its official page on VKontakte, Russia’s largest social media platform.

Customers Report Alarm Failures and Vehicle Access Issues

The Delta cyberattack disruption has had direct consequences for customers relying on the company’s systems for everyday safety and mobility. Russian-language Telegram outlet Baza reported that users began complaining shortly after the incidentof cyberattack on Delta that car alarm systems could not be turned off, and in some cases, vehicles could not be unlocked. Newspaper Kommersant also reported ongoing failures despite Delta’s assurances that most services were operating normally. Users described serious malfunctions, including remote vehicle start features failing, doors locking unexpectedly, and engines shutting down while in motion. In addition to vehicle-related issues, customers reported that alarm systems in homes and commercial buildings switched into emergency mode and could not be deactivated. Recorded Future News said it could not independently verify these claims.

Data Leak Claims Surface After Delta Cyberattack

Although Delta maintains that no customer data was compromised, uncertainty remains. An unidentified Telegram channel claiming to be operated by the attackers published an archive it alleges contains stolen information from Delta systems. However, the authenticity of the material and the identity of the hackers have not been independently verified. The cyberattack on Delta has increased anxiety among customers, particularly because Delta’s mobile app, launched in 2020, is widely used for tracking vehicles and managing alarm functions. According to Auto.ru, the app is compatible with most cars and can store payment data, making some users wary of potential financial exposure if internal systems were breached.

Broader Pattern of IT Disruptions in Russia

The Delta security systems cyberattack occurred on the same day as a separate large-scale outage affected booking and check-in systems used by Russian airlines and airports. Airlines reported temporary disruptions to ticket sales, refunds, and rebooking after problems were detected in aviation IT platforms. While the two incidents have not been officially linked, the timing highlights growing instability in critical digital infrastructure. No known hacking group has claimed responsibility for the cyberattack on Delta so far. It also remains unclear whether the incident was a relatively limited distributed denial-of-service (DDoS) attack or something more severe, such as ransomware or destructive malware. For now, Delta says the situation is manageable and expects services to return soon, but customer concerns continue as outages persist and unverified leak claims circulate.

Pillbugs Are Getting Top Dollar Online. Poachers Have Noticed.

28 January 2026 at 05:00
A robust, largely unregulated online trade in isopods could pose a serious threat to some vulnerable species, scientists warn.

© Nicky Bay

The Cuban Spiky, Pseudarmadillo spinosus, is one of the isopods most prized by hobbyists. A few live specimens can sell for hundreds of dollars.
❌