<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Canadian Cyber in Context]]></title><description><![CDATA[News, research and analysis focusing on Canadian federal cyber defence policy and procurement.]]></description><link>https://www.cyberincontext.ca</link><image><url>https://substackcdn.com/image/fetch/$s_!xNeN!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png</url><title>Canadian Cyber in Context</title><link>https://www.cyberincontext.ca</link></image><generator>Substack</generator><lastBuildDate>Sat, 23 May 2026 16:22:05 GMT</lastBuildDate><atom:link href="https://www.cyberincontext.ca/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Canadian Cyber in Context]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[canadiancyber@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[canadiancyber@substack.com]]></itunes:email><itunes:name><![CDATA[Alexander Rudolph]]></itunes:name></itunes:owner><itunes:author><![CDATA[Alexander Rudolph]]></itunes:author><googleplay:owner><![CDATA[canadiancyber@substack.com]]></googleplay:owner><googleplay:email><![CDATA[canadiancyber@substack.com]]></googleplay:email><googleplay:author><![CDATA[Alexander Rudolph]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Canadian Cyber News Rewire - 16/05/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending May 16]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526</guid><pubDate>Tue, 19 May 2026 13:12:37 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3885ed2b-9384-4c0a-9265-e14e1d4890f3_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of Canadian cyber or adjacent news stories from this past week (or recently). Please leave a comment if you think I missed anything. </p><p> </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526/comments"><span>Leave a comment</span></a></p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p>I have received a hefty round of feedback on my PhD thesis, so I may be a tad quiet outside the weekly Rewires. If you wish to contact me, feel free to email info@cyberincontext.ca.</p></li></ul><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;cf38d894-f1a2-4a67-8007-65e7ae85d8e9&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Microsoft and American Hyperscalers Refuse to Accept Reality About Canadian Digital Sovereignty&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine and institutions in state behavior in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-05-18T14:37:08.835Z&quot;,&quot;cover_image&quot;:null,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/american-hyperscalers-refuse-to-accept&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:195522936,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h6 style="text-align: center;"><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/05/government-of-canada-and-telus-advance-work-to-build-sovereign-ai-infrastructure.html">Government of Canada and TELUS advance work to build sovereign AI infrastructure</a></strong></p></li><li><p><strong><a href="https://archive.ph/ZbvKm#selection-2571.0-2571.84">Telus plans AI data centre expansion in B.C., including two new centres in Vancouver</a></strong></p><ul><li><p>Telus is building two data centres in Vancouver and expanding an existing facility in Kamloops, which together will require 150 megawatts of electricity by 2032.</p></li></ul></li><li><p><strong><a href="https://globalnews.ca/news/11845010/canvas-hack-deal/">Deal reached with hackers after Canadian universities hit by security breach</a></strong></p><ul><li><p>I&#8217;m not a fan of calling the payment of ransoms under duress a &#8220;deal.&#8221; Makes it sound amicable.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/pacific-economic-development/news/2026/05/accelerating-commercialization-and-adoption-of-ai-and-quantum-technologies-in-british-columbia.html">Accelerating commercialization and adoption of AI and quantum technologies in British Columbia</a></strong></p><ul><li><p>$17.3 million investment in eight businesses in BC.</p></li></ul></li><li><p><strong><a href="https://international.canada.ca/en/global-affairs/corporate/transparency/transforming-gac/implementation-plan-2023-2026">Global Affairs Canada Transformation Implementation Plan (2023 to 2026)</a></strong></p><ul><li><p>GAC is underway with plans to strengthen cybersecurity by enhancing its security operations centre to include cloud threat detection and response.</p></li></ul></li><li><p><strong>A lot of coverage of Bill C-22 this week, compiled below:</strong></p><ul><li><p><strong><a href="https://archive.ph/HtZTZ#selection-2571.0-2571.85">U.S. Congress warns Ottawa&#8217;s lawful-access bill could weaken defences against hackers</a></strong></p><ul><li><p>The letter from <a href="https://justthenews.com/sites/default/files/2026-05/Jordan%20letter.pdf">US Congressional Leaders states that Bill C-22 would &#8220;Canada&#8217;s surveillance and data access powers in ways that create significant cross-border risks to the security and data privacy of Americans.&#8221;</a></p><ul><li><p>Ironic that Americans sure love to create these risks for everyone else, but suddenly have a problem when another country ignorantly tries the same.</p></li></ul></li><li><p><strong><a href="https://archive.ph/laiKz#selection-2571.0-2571.82">Signal warns it would pull out of Canada if made to comply with lawful access bill</a></strong></p></li><li><p><strong><a href="https://archive.ph/cf4WC#selection-2565.0-2565.89">Major Canadian online privacy company Windscribe plans to leave country if lawful access bill passes</a></strong></p></li><li><p><strong><a href="https://archive.ph/GcYVO#selection-2569.0-2569.105">Spy watchdog asks for greater oversight of proposed lawful access regime, including to boost public trust</a></strong></p><ul><li><p>This could maybe quell concerns, but not sure if it would fully make up for a lot of the problems in Bill C-22.</p></li></ul></li><li><p><strong><a href="https://archive.ph/tTact#selection-3733.26-3733.95">Major VPN provider says it could leave Canada over lawful access bill</a></strong></p><ul><li><p>NordVPN joining others to say C-22 sucks and they would leave Canada.</p></li></ul></li></ul></li></ul></li><li><p><strong><a href="https://www.newswire.ca/news-releases/pwc-canada-launches-cpcsc-readiness-service-to-help-defence-suppliers-with-new-mandatory-cyber-certification-801689389.html">PwC Canada launches CPCSC Readiness Service to help defence suppliers with new mandatory cyber certification</a></strong></p><ul><li><p>All the big consulting firms will be getting in on the CPCSC action.</p></li></ul></li><li><p><strong><a href="https://globalnews.ca/news/11839189/alberta-centurion-project-voter-database-access/">3rd investigation launched into Alberta voter database accessed by nearly 600 people</a></strong></p><ul><li><p>The RCMP, Elections Alberta, and now Alberta&#8217;s Information and Privacy Commissioner have all begun investigations into the leak of Alberta&#8217;s electoral roll.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/british-columbia/premier-david-eby-web-summit-9.7197380">B.C. gov&#8217;t &#8216;embracing the opportunity of AI,&#8217; premier tells Web Summit</a></strong></p></li><li><p><strong><a href="https://www.forbes.com/sites/johnkoetsier/2026/05/12/canada-declares-digital-independence-but-sovereignty-is-not-solitude/">Canada Declares Digital Independence, But &#8216;Sovereignty Is Not Solitude&#8217;</a></strong></p><ul><li><p>Coverage of Minister Solomon and many of the platitudes he brings to the situation.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/05/canada-stands-shoulder-to-shoulder-philippines-exercise-balikatan-41-26.html">Canada Stands Shoulder to Shoulder with the Philippines at Exercise BALIKATAN 41-26</a></strong></p><ul><li><p>CAFCYBERCOM participated in this exercise.</p></li></ul></li><li><p><strong><a href="https://securitybrief.ca/story/canada-second-globally-for-ransomware-fortinet-says">Canada second globally for ransomware, Fortinet says</a></strong></p><ul><li><p>Additional coverage of Canada as a top target for ransomware operators</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-finance/news/2026/05/government-welcomes-canada-growth-fund-investment-to-support-the-expansion-of-canadas-largest-operating-lithium-mine.html">Government welcomes Canada Growth Fund investment to support the expansion of Canada&#8217;s largest operating lithium mine</a></strong></p><ul><li><p>Lithium is in almost everything electronic, so this is big news that&#8217;ll be welcomed by critical minerals folk.</p></li></ul></li><li><p><strong><a href="https://archive.ph/AYTW1#selection-2571.0-2571.81">Canada&#8217;s cybersecurity agency to get access to OpenAI&#8217;s latest model, sources say</a></strong></p><ul><li><p>Only OpenAI&#8217;s so far, haven&#8217;t heard anything about Claude Mythos yet. </p></li></ul></li><li><p><a href="https://www.auditor.on.ca/en/content/specialreports/specialaudits/en2026/AR_2026_AI_EN.html">Ontario Auditor General Report: </a><strong><a href="https://www.auditor.on.ca/en/content/specialreports/specialaudits/en2026/AR_2026_AI_EN.html">Use of Artificial Intelligence in the Ontario Government</a></strong></p><ul><li><p>Interesting information in this report, particularly related to use in healthcare&#8230;</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/toronto/ai-scribe-system-hallucinations-9.7197049">Medical AI transcriber for Ontario doctors &#8216;hallucinated,&#8217; generated errors: auditor general</a></strong></p><ul><li><p>Hallucinations remain very common with AI, especially LLMs. This is why the rush to adopt them is dangerous.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/newfoundland-labrador/nl-powerschool-privacy-breach-report-9.7196298">PowerSchool hack was a &#8216;significant breach,&#8217; says N.L. privacy commissioner</a></strong></p><ul><li><p>Unrelated to the recent Canvas incident, but is from January 2025.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/newfoundland-labrador/wakeham-government-ai-use-9.7188437">Photo of 6-fingered woman shows N.L. government needs to &#8216;tighten up&#8217; AI policy, Wakeham says</a></strong></p><ul><li><p>Official Newfoundland and Labrador government pictures are popping up with AI mistakes that could have been easily fixed.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/05/canadian-digital-regulators-forum-hosting-interactive-workshop.html">Canadian Digital Regulators Forum hosting interactive workshop</a></strong></p><ul><li><p>Very interesting workshop taking place May 21.</p></li></ul></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, this section is for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section, which is 100% focused on Canada. </h6><ul><li><p><strong><a href="https://www.politico.com/news/2026/05/11/google-hackers-ai-security-00913247">Google says hackers used AI to create zero day security flaw for the first time</a></strong></p></li><li><p><strong><a href="https://www.infosecurity-magazine.com/news/openai-daybreak-secure-by-design/">OpenAI Launches &#8216;Daybreak&#8217; to Help Build Secure By Design Software</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/signal-adds-security-warnings-for-social-engineering-phishing-attacks/">Signal adds security warnings for social engineering, phishing attacks</a></strong></p><ul><li><p>This is after a prominent European politician fell victim to phishing attack.</p></li></ul></li><li><p><strong><a href="https://www.haaretz.com/israel-news/security-aviation/2026-05-12/ty-article-magazine/.premium/starlink-users-beware-israeli-tech-can-reveal-your-identity/0000019e-17f1-d618-adde-17f3e27d0000">Revealed: Israeli Tech Exposes Users of Musk&#8217;s Starlink Satellite-based Internet</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/05/14/openai-says-hackers-stole-some-data-after-latest-code-security-issue/">OpenAI says hackers stole some data after latest code security issue</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/05/15/a-hotel-check-in-system-left-a-million-passports-and-drivers-licenses-open-for-anyone-to-see/">A hotel check-in system left a million passports and driver&#8217;s licenses open for anyone to see</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/05/16/research-repository-arxiv-will-ban-authors-for-a-year-if-they-let-ai-do-all-the-work/">Research repository ArXiv will ban authors for a year if they let AI do all the work</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-012-critical-vulnerability-affecting-cisco-catalyst-sd-wan-cve-2026-20182">Alert - AL26-012 - Critical vulnerability affecting Cisco Catalyst SD-WAN - CVE-2026-20182</a></strong></p></li><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al25-012-vulnerabilities-impacting-cisco-asa-ftd-devices-cve-2025-20333-cve-2025-20362-cve-2025-20363">Alert - AL25-012 - Vulnerabilities impacting Cisco ASA and FTD devices &#8211; CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363 &#8211; Update 2</a></strong></p></li><li><p><strong><a href="https://www.cryptika.com/84-tanstack-npm-packages-hacked-in-ongoing-supply-chain-attack-targeting-ci-credentials/">84 TanStack npm Packages Hacked in Ongoing Supply-Chain Attack Targeting CI Credentials</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/sap-fixes-critical-vulnerabilities-in-commerce-cloud-and-s-4hana/">SAP fixes critical vulnerabilities in Commerce Cloud and S/4HANA</a></strong></p></li><li><p><strong><a href="https://blogs.oracle.com/security/update-monthly-critical-security-patch-updates-cspus-begin-may-28-2026">Oracle Announces Move from Quarterly to Monthly Critical Security Patches</a></strong></p><ul><li><p>A sign of the times as Oracle moves to release updates on a more frequent basis.</p></li></ul></li><li><p><strong><a href="https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access?e=48754805">GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access</a></strong></p><ul><li><p>Google Threat Intelligence Group report on the increasing role of AI in cyber threat activity.</p></li></ul></li><li><p><strong><a href="https://linuxsecurity.com/features/linux-runtime-killswitch">Linux Could Soon Disable Vulnerabilities Without a Reboot: Kernel Killswitch</a></strong></p><ul><li><p>In response to recent vulnerabilities, a runtime &#8220;killswitch&#8221; has been proposed.</p></li></ul></li></ul><ul><li><p><strong><a href="https://hacks.mozilla.org/2026/05/behind-the-scenes-hardening-firefox/">Behind the Scenes Hardening Firefox with Claude Mythos Preview</a></strong></p><ul><li><p>Article from Mozilla on the use of Claude Mythos for Firefox.</p></li></ul></li></ul><p></p><div><hr></div><h6 style="text-align: center;"><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><ul><li><p><strong><a href="https://betakit.com/qa-vass-bednar-on-why-canada-is-at-risk-of-remaining-a-digital-51st-state/">Q&amp;A: Vass Bednar on why Canada is at risk of remaining a digital 51st state</a></strong></p><ul><li><p>Vass Bednar is the Director of the Canadian Shield Institute.</p></li></ul></li><li><p><strong><a href="https://canadianshieldinstitute.ca/latest-updates/f/the-weaponization-of-governance">The Canadian Shield Institute release Chapter 2 on Weaponization of Governance for their Foundations of Digital Sovereignty </a>series.</strong></p><ul><li><p>The Canadian Shield Institute continues to do tremendous work.</p></li></ul></li><li><p><strong><a href="https://www.faz.net/premium/digitalwirtschaft/thomas-dullien-zu-anthropics-mythos-software-war-nie-auf-perfekte-sicherheit-ausgelegt-das-raecht-sich-accg-200822228.html">Software was never designed for perfect security &#8211; and now we&#8217;re paying the price.</a></strong></p><ul><li><p>A good article by the great security researcher Halvar Flake</p></li></ul></li><li><p><strong><a href="https://www.zetter-zeroday.com/timeline-of-irans-nuclear-program-and-the-stuxnet-and-fast16-attacks-2/?ref=zero-day-newsletter">Timeline of Iran&#8217;s Nuclear Program and the Stuxnet and Fast16 Attacks</a></strong></p><ul><li><p>Kim Zetter puts together a new timeline that includes the Fast16 attacks.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://therecord.media/foxconn-confirms-cyberattack-north-american-factories">Foxconn confirms cyberattack impacting North American factories</a></strong></p><ul><li><p>An update on last week&#8217;s story, which turns out to be ransomware.</p></li></ul></li><li><p><strong><a href="https://therecord.media/congressman-launches-inquiry-into-food-retail-surveillance">Congressman launches inquiry into how food retailers use surveillance pricing</a></strong></p><ul><li><p>This one will be watched by Canadians. There&#8217;s currently an active debate at the federal and many provincial levels regarding how to address surveillance pricing.</p></li></ul></li><li><p><strong><a href="https://www.texasattorneygeneral.gov/news/releases/attorney-general-ken-paxton-sues-netflix-spying-texas-kids-and-consumers-illegally-collecting-users">Texas Attony General Sues Net&#173;flix for Spy&#173;ing on Texas Kids and Con&#173;sumers by Ille&#173;gal&#173;ly Col&#173;lect&#173;ing Users&#8217; Data With&#173;out Their Knowl&#173;edge or Consent</a></strong></p></li><li><p><strong><a href="https://www.reuters.com/technology/pentagon-deploys-anthropics-mythos-patch-cyber-gaps-while-planning-ditch-firm-2026-05-12/">Pentagon deploys Anthropic&#8217;s Mythos to patch cyber gaps while planning to ditch firm</a></strong></p><ul><li><p>This is probably not going to look good for the US Government in court.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/05/14/cisco-cuts-nearly-4000-jobs-to-spend-more-on-ai-reports-record-quarterly-revenue/">Cisco cuts nearly 4,000 jobs to spend more on AI, reports &#8216;record quarterly revenue&#8217;</a></strong></p><ul><li><p>Cisco has always been scummy, so this is not a big surprise.</p></li></ul></li><li><p><strong><a href="https://www.cnn.com/2026/05/15/politics/iran-hackers-tank-readers-gas-stations">Exclusive: Hackers have breached tank readers at US gas stations; officials suspect Iran is responsible</a></strong></p><ul><li><p>This is concerning, but it is unclear the degree to which this could impact things. Could theoretically cause a major economic disruption by automatically affecting the readers all at once. Iran is suspected, but I can&#8217;t help but recall many of Israel&#8217;s attacks on Iranian gas infrastructure over the last few years.</p></li></ul></li><li><p><strong><a href="https://www.nextgov.com/cybersecurity/2026/05/trump-says-he-and-xi-discussed-cyberattacks-and-spying-between-us-china/413582/">Trump says he and Xi discussed cyberattacks and spying between US, China</a></strong></p><ul><li><p>&#8220;They&#8217;re talking about the spying. Well, we do it too,&#8221; the president said. &#8220;We spy like hell on them too.&#8221; - Trump</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://meduza.io/en/feature/2026/05/11/kaspersky-lab-co-founder-says-fsb-unit-overseeing-internet-blocking-has-no-idea-how-networks-work">Kaspersky Lab co-founder says FSB unit overseeing internet blocking has &#8216;no idea&#8217; how networks work</a></strong></p></li><li><p><strong><a href="https://therecord.media/uk-water-company-had-hackers-lurking-for-years">UK water company allowed hackers to lurk undetected for nearly two years, regulator finds</a></strong></p></li><li><p><strong><a href="https://therecord.media/uk-moves-to-shield-security-researchers-cybercrime">UK moves to shield security researchers in cybercrime law overhaul</a></strong></p><ul><li><p>A great move by the UK. Security researchers are integral to how NATO and allies maintain cybersecurity.</p></li></ul></li><li><p><strong><a href="https://cybernews.com/tech/erman-politicians-x/">German political parties leave X: should other European politicians follow?</a></strong></p><ul><li><p>Good on German political parties. Canada must do the same. The Government of Canada remains on X. There is no longer a large Canadian audience on X, so maintaining a presence there simply shows the government&#8217;s lack of concern for digital policy and that it does not actually care about reaching Canadians through social media.</p></li></ul></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/uk-fines-water-supplier-13m-for-exposing-data-of-664k-customers/">UK fines water supplier $1.3M for exposing data of 664k customers</a></strong></p><ul><li><p>It&#8217;d be so cool if we actually had fines and penalties in Canada that were more than the cost of doing business.</p></li></ul></li><li><p><strong><a href="https://therecord.media/european-commission-head-pushes-restriction-teen-social-media">European Commission head pushes creation of new law delaying teens&#8217; social media access</a></strong></p><ul><li><p>Laws seeking to universally destroy privacy for people in order to do the job of parents and prevent children from accessing social media are very in vogue right now.</p></li></ul></li><li><p><strong><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L_202601078">Council Implementing Regulation (EU) 2026/1078 of 11 May 2026 implementing Regulation (EU) 2019/796 concerning restrictive measures against cyber-attacks threatening the Union or its Member States</a></strong></p><ul><li><p>EU applies sanctions against Chinese and Russian cyber threat actors.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://www.tomshardware.com/tech-industry/microsofts-1-billion-kenya-data-center-stalls-over-disagreements-on-power-capacity">Microsoft&#8217;s massive Kenya AI data center would require switching off &#8216;half the country&#8217; to meet power requirements, government says &#8212; $1 billion project stalls over capacity disagreements and lack of infrastructure</a> (h/t Catalin Cimpanu)</strong></p></li><li><p><strong><a href="https://www.interpol.int/en/News-and-Events/News/2026/201-arrests-in-first-of-its-kind-cybercrime-operation-in-MENA-region">201 arrests in first-of-its-kind cybercrime operation in MENA region</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">Canada Buys Watch</h3><p>I am still building. I plan to soon post more Canada Buysonce I have the time to build out the monitoring system.</p><ul><li><p>Canada Buys: <strong><a href="https://canadabuys.canada.ca/en/tender-opportunities/tender-notice/cb-502-36125052">Security Control Centre IT Modernization Project</a></strong></p><ul><li><p>Royal Military College is looking for a replacement OT software-as-a-service solution.</p></li></ul></li></ul><div><hr></div><h6 style="text-align: center;"><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-160526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Microsoft and American Hyperscalers Refuse to Accept Reality About Canadian Digital Sovereignty]]></title><description><![CDATA[Microsoft and American information technology corporations have completely lost the plot on Canadian digital sovereignty]]></description><link>https://www.cyberincontext.ca/p/american-hyperscalers-refuse-to-accept</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/american-hyperscalers-refuse-to-accept</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Mon, 18 May 2026 14:37:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xNeN!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h6 style="text-align: center;"><strong>Support Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship/advertisement</a>&nbsp;or upgrade to paid membership.</strong></h6><div><hr></div><p>In late April 2026, Microsoft invited a group of 50+ Canadians to hear a briefing on Microsoft&#8217;s approach to protecting Canada&#8217;s digital/data sovereignty. This group included other researchers and academics, lawyers, industry leaders, thought leaders, and me. As a result of participating in this brief, this article will often speak directly to Microsoft, but much of it applies to other American hyperscalers, including Google and Amazon Web Services. <a href="https://www.linkedin.com/pulse/microsoft-tries-reframe-canadian-digital-sovereignty-brent-arnold-qjuze/">For a more point-by-point breakdown, I recommend reading Brent Arnold&#8217;s, aka the Cyber Lawyer</a> and the slides to Microsoft&#8217;s briefing are included at the end.</p><p>The goal of the session was to discuss and &#8220;clarify&#8221; the US CLOUD Act and how Microsoft handles Canadian data, particularly in the event of legal requests from law enforcement, the role of cybersecurity, and Microsoft&#8217;s efforts to advance Canadian digital sovereignty. </p><p>Microsoft stresses that these briefings are meant to clear up misunderstandings of how Microsoft protects Canadian data and clarify its response to the US CLOUD Act. However, these presentations are deliberately crafted and intended to increase trust in Microsoft. They are very careful with the data presented, focusing on how Microsoft wants you to understand the issue rather than addressing concerns about Canada&#8217;s digital sovereignty. However, a central misunderstanding in the briefing was the assumption that Canada&#8217;s relationship with the United States has remained unchanged since January 2025. </p><p>On the contrary, Canadians&#8217; trust in the United States has steadily declined under the current US administration. Approximately <a href="https://www.ipsos.com/en-ca/60-percent-canadians-believe-we-can-never-trust-americans-same-way-again">60% of Canadians believe Canada can never trust the United States again</a>. The reality is that Canadians no longer trust the United States, and US corporations are caught in the middle. Canada&#8217;s ability to trust Microsoft and other hyperscalers is fundamentally linked to a decline in trust in the United States. A failure to recognize this new reality will mean American hyperscalers pose a risk to Canadian digital sovereignty.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/american-hyperscalers-refuse-to-accept?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/american-hyperscalers-refuse-to-accept?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>What&#8217;s the Context?</h3><p>Last year, Canada&#8217;s close relationship with the United States was forever broken by an unhinged United States administration. This new and unfriendly United States means that Canada must dramatically change its approach and come to terms with the new reality of an undemocratic, authoritarian United States. In June 2025, Microsoft France&#8217;s Director of Public and Legal Affairs, Mr. Anton Carniaux, was invited to provide testimony and answer questions from Senators. During the hearing, Mr. Carniaux was asked whether he could guarantee that data from French citizens would not be transmitted to United States authorities without the explicit authorization of the French authorities.</p><p><a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">Mr. Carniaux said that he could not guarantee this.</a> This also applies to Canada.</p><p>Although Canada and many other countries were already concerned about the United States&#8217; extraterritoriality, which could supersede local laws, this hearing was a massive wake-up call for Canada and other countries that rely on US hyperscalers for their software, cloud, and broader information technology needs. Since then, Canada has increasingly pursued and investigated ways to increase its digital sovereignty and reduce reliance on United States corporations.</p><p>In September 2025, Prime Minister Carney even suggested that the <a href="https://betakit.com/carney-says-new-major-projects-office-will-help-build-a-canadian-sovereign-cloud/">Major Projects Office (MPO) may consider a sovereign cloud as a future project</a>. Two months later, in November, <a href="https://www.pm.gc.ca/en/news/news-releases/2025/11/13/prime-minister-carney-announces-second-tranche-nation-building-projects">the Prime Minister&#8217;s Office confirmed that sovereign cloud</a> was indeed one of the projects it was to examine. However, no additional details have been released since this time. While Cabinet and Minister Evan Solomon continue to broker investments that do little to advance Canadian digital sovereignty and amount to platitudes, the bureaucracy is actually doing the hard work to figure out how the Government of Canada could advance digital sovereignty and sovereign cloud.</p><p>Shared Services Canada (SSC) and Public Services and Procurement Canada (PSPC) have been <a href="https://www.cyberincontext.ca/p/canadian-government-provides-next">releasing a series of requests for information (RFIs) concerning sovereign public cloud capabilities</a>. Increasingly, it is clear that the purpose of these RFIs is to determine and understand the current state of Canada&#8217;s cloud and data centre industry to support Canadian sovereign cloud. Thus far, much of the data and information is turning out exactly as many of us already anticipated. There is a lot of potential in Canadian cloud and data infrastructure for small- and medium-sized businesses, particularly in niche and specialized services, but none can provide such services at scale to the level of American hyperscalers like Microsoft, Google, and Amazon Web Services in Canada. </p><p>This means that Canada is unable to quickly adopt alternative products or services without considerable difficulty or reliance on other non-Canadian corporations. As a result, in the short term things will not change all too much, but long term strategic planning and investment is needed to reduce the risks of reliance on American corporations and increase domestic capacity and capabilities for information technology, particularly in cloud and data centre infrastructure.</p><p>Despite this, the growing frustration and declining trust have worried the hyperscalers, and for good reason. enough that Microsoft announced $19 billion work of investments </p><h3>What is Digital Sovereignty?</h3><p>A comprehensive definition and breakdown of digital sovereignty is outside the scope of this. For this, I recommend reading <a href="https://canadianshieldinstitute.ca/latest-updates/f/governance-is-the-foundation-of-digital-sovereignty">Chapter 1 of the Canadian Shield Institute&#8217;s Foundations of Digital Sovereignty</a>.  </p><p> But it is helpful to have an accepted understanding of what we are talking about. A state&#8217;s sovereignty is not a black-and-white concept but a complex instrument that is constantly negotiated and tested. A good analytical framework for understanding sovereignty is TRAC: Territory, Recognition, Authority, and Control. </p><p>For a country to have sovereignty, it needs:</p><ul><li><p><strong>Territory</strong> that is controlled by the country.</p></li><li><p><strong>Recognition</strong> by its people, other countries, and international actors.</p></li><li><p><strong>Authority</strong> to govern the territory.</p></li><li><p><strong>Control</strong> over the country/territory</p></li></ul><p>If you do not have these, then your country&#8217;s sovereignty is in question. However, sovereignty is not a checklist. Sovereignty, digital or otherwise, is constantly being redefined and given up in exchange for some benefit to the state. However, Canadians are no longer comfortable with the extent to which our digital sovereignty has been surrendered.</p><h3>Digital Sovereignty is About Trust</h3><p>Up until January 2025, Canadians were relatively comfortable with giving up some level of digital sovereignty for convenience and access to United States technologies and markets. In September 2025, <a href="https://www.ipsos.com/en-ca/60-percent-canadians-believe-we-can-never-trust-americans-same-way-again">60% of Canadians reported believing that Canada can never trust the United States again</a>. The trust continues to decline, and Canadians are no longer satisfied with the existing relationship. As Canadians&#8217; trust in the United States continues to decline, many US corporations will be caught in the middle. This is a direct result of the actions of the current United States administration, which has been, in part, fueled by many corporations&#8217; tacit support and endorsement.</p><p>I am in no way sympathetic to these multi-billion dollar corporations, but they need to recognize that they cannot have their cake and eat it too. If they want to truly support Canadian digital sovereignty, American hyperscalers must make the tough decisions to show concretely and without how they will support Canada in the face of US sanctions and or potential military aggression. Thus far, most have talked around the issue and stated they hope things do not come to that and they will work to ensure needs are met. This doesn&#8217;t address Canadian digital sovereignty or build trust. This specifically avoids the issue and shows that American hyperscalers refuse to accept the reality of the situation. </p><p>Since January 2025, the United States have taken many actions that we would never had expected prior and such events continue to happen. As a result, Canada must adjust its approach to these new risks and reality. Any American corporation which fails to understand this and tries to convince Canada otherwise is refusing to accept reality and cannot be trusted any more than the current United States administration. </p><p>Fortunately, sovereignty is not a static construct, and improving digital sovereignty is possible. However, it depends on which area you want to strengthen. For example, significant attention is currently being paid to improving Canada&#8217;s data sovereignty by increasing its domestic capacity for cloud software and data centre infrastructure. Although this would give Canada an increased amount of control over its data, there remain many layers of software and hardware, from operating systems to network switches, that mean a complete, clean Canadian digital stack is not possible. That doesn&#8217;t mean we can&#8217;t direct policy and investments to strengthen key areas of information technology and Canadian digital sovereignty.</p><p>At the end of the day, digital sovereignty concerns a country&#8217;s ability to use digital tools and technologies in accordance with the laws and customs of its country and place of residence. Canadians want to be able to trust the technology and services that they use</p><div><hr></div><h3>Will the US Target Canadians using Hyperscalers?</h3><p>Since the first half of 2025, the Canadian policy and media landscape has been filled with article after article about the threat posed by United States corporations to Canadian digital sovereignty, <a href="https://www.digitaljournal.com/tech-science/microsoft-says-u-s-law-takes-precedence-over-canadian-data-sovereignty/article">including my very own</a>, often focusing on the US CLOUD Act. Due to this focus on the US CLOUD Act, many American hyperscalers have focused on responding specifically to concerns about the US CLOUD Act. However, the root of the problem is not the US CLOUD Act, which is only a streamlining mechanism. The problem is the lack of trust in the United States using the law as it is meant, and concerns that Canada&#8217;s reliance on American information technology will be used against us.</p><p>This is not a future concern; this is already happening. <a href="https://www.wired.com/story/dhs-demanded-google-surrender-data-on-canadians-activity-location-over-anti-ice-posts/">On May 4, Wired broke news that the United States Department of Homeland Security is demanding that Google surrender data on a Canadian&#8217;s activity and location due to anti-ICE posts</a>. The individual has not been to the United States in over 10 years and has not exported or imported anything from the United States during the periods being examined, but Homeland Security is attempting to compel Google to provide this data by citing the Tariff Act of 1930.</p><p>As a result, any claim by Microsoft or others which presumes that the socio-political and legal relationship between Canada and the United States is the same are completely out of their depth. Some, like Microsoft, will claim that Canada is &#8220;over-indexing&#8221; on concerns related to the United States, but this incident with Google instead shows that Microsoft is not addressing this enough. If anything, Microsoft is being willfully ignorant and shows it cannot be trusted by refusing to recognize the breakdown of democratic and legal norms in the United States.</p><div><hr></div><h3>What Hyperscalers Don&#8217;t Understand</h3><p>There are many reasons not to trust Microsoft, but what Microsoft and many others fail to recognize is that the new issues of trust in American hyperscalers do not entirely lie with the corporations themselves. Canada&#8217;s trust in the United States changed in January 2025, and Microsoft happens to be caught in the middle. How many of these corporations have supported the current United States administration and continue to tacitly support American adversarial and aggressive behaviour, ultimately will determine if that corporation can be trusted. Thus far, American hyperscalers have not behaved in a way that would instill such trust.</p><p>Microsoft&#8217;s response so far suggests that everything is business as usual and that there has been little to no change in the United States. By failing to acknowledge that Canada cannot currently trust the United States as it did before January 2025, it digs itself into a hole and instills distrust among Canadians. Refusing to understand and adjusting accordingly suggests one of two things:</p><ul><li><p>Microsoft believes that the United States is just as trustworthy and predictable, and can be trusted to act rationally.</p></li><li><p>Microsoft understands these changes but refuses to fully address them, attempting to gaslight Canadians into believing their data is safe to preserve its market share.</p></li></ul><p>Neither of these is a good thing and suggests that Microsoft cannot be trusted with Canadian digital sovereignty.</p><p>In many ways, Microsoft and the other American hyperscalers are in a lose-lose situation, and trying to preserve the status quo will only hurt them. Further, Microsoft&#8217;s efforts to convince Canadian experts and leaders that nothing has changed and to trust in the status quo is potentially dangerous for Canada. </p><div><hr></div><h3>Technical Safeguards are a Last Resort</h3><p>Amid discussion of digital sovereignty, too little attention is paid to technical controls and protections, for both good and bad reasons. Yes, we can have encryption, air-gaps, compartmentalization, and additional security controls that limit how much cloud corporations can access our data or disrupt them. This can help ensure that, if the United States were to undertake malicious legal action against Canada or a Canadian citizen, there would be some layers of protection in place. However, these are all one part of the equation with their own limits and downsides.</p><p>If technical safeguards were the only thing between us and malicious use or disruption, then Canada would have zero concerns about using Chinese-made equipment. The problems arise in the full use of the ecosystem, where concerns about governance and control can impact the overall system. While technical safeguards are certainly in place and are one part of the protections for Canadians, that does not negate the legal and political dimensions. Which, in some cases, could compromise the technical safeguards if a corporation is pressured to do so and complies. At worst, it would still mean disruption of technology in large parts of Canadian society. </p><p>We need the technical controls and safeguards. But what good are those safeguards if we cannot trust the corporation setting them up in the first place? Technical controls should be the last resort and do not resolve digital sovereignty concerns. Instead, they simply allow us to maintain a basic level of trust in the existing system&#8217;s integrity while giving Canada time to plan and invest in efforts to increase Canada&#8217;s digital sovereignty and reduce our risk exposure by transitioning to more trustworthy products and services, particularly Canadian.</p><div><hr></div><h3>TL;DR - Takeways</h3><p>Canadian&#8217;s acceptance of reduced Canadian digital sovereignty has dramatically changed since January 2025. Canada is increasingly concerned with increasing its domestic control and autonomy over its digital products, particularly related to data. The source of this change is growing distrust of the United States administration due to its ongoing hostile behaviour.</p><p>By association, Microsoft and American hyperscalers are increasingly distrusted as well. Their insistence on treating current Canadian-United States relations as business as usual does not help prevent this either. Rather, by operating as if the social and political relationship has not changed, it only instills greater levels of distrust and gives the impression that the corporation is either lying to you or trying to trick you.</p><p>If American corporations want to rebuild trust with Canada despite the current United States administration, it will require <a href="https://blogs.microsoft.com/on-the-issues/2025/12/09/microsoft-deepens-its-commitment-to-canada-with-landmark-19b-ai-investment/">more than promises of $19 billion dollars</a>. Such massive investments do not mean the corporation is committed to Canadian digital sovereignty. All it suggests is that a corporation wants to preserve its market access and share, which are increasingly at risk. If anything, this potentially sends the message that they recognize they are a threat, but want to become so ingrained in Canadian digital society that Canada cannot do anything about it. </p><p>This is very much a pessimistic take, but it reflects the reality that Canada&#8217;s risk calculus has dramatically changed since January 2025. Canada has to adjust to those new risks from the United States, no matter how small they may be. Adjustments to these new risks seem so major only because Canadians have not had to consider them for over 100 years.</p><p>Investments do little to address the threats of the United States administration. To build trust with Canadians despite the current United States administration, it is necessary to take a social and political position siding with Canada over the United States. At the end of the day, will an American corporation support the United States or Canada?</p><p>Canadians know the answer when things get tough, and that is why American corporations are a risk, not the answer, to Canadian digital sovereignty.</p><div><hr></div><h6 style="text-align: center;"><strong>Support Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship/advertisement</a> or upgrade to paid membership.</strong></h6><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Deck Microsoft's Commitment To Canadian Data And Digital Sovereignty</div><div class="file-embed-details-h2">1.64MB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/9d7a0aea-39c6-4478-8b45-33009edfbbd3.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/9d7a0aea-39c6-4478-8b45-33009edfbbd3.pdf"><span class="file-embed-button-text">Download</span></a></div></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/american-hyperscalers-refuse-to-accept?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Canadian Cyber in Context! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/american-hyperscalers-refuse-to-accept?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/american-hyperscalers-refuse-to-accept?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 09/05/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending May 09]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526</guid><pubDate>Mon, 11 May 2026 12:56:13 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dfbf0e2b-9407-436a-82ea-1ed5507eb335_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526/comments"><span>Leave a comment</span></a></p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (It closes May 26)</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>. </p></li></ul></li><li><p>I am unfortunately experiencing a rough chronic illnesses flare up, so my next research article will likely be delayed.</p></li></ul><div><hr></div><h6 style="text-align: center;"><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://archive.ph/fuNzt#selection-2571.0-2571.86">Nearly 600 people had unauthorized access to Alberta&#8217;s electors list, watchdog alleges</a></strong></p><ul><li><p>More developments in the Alberta Electoral List Scandal</p></li></ul></li></ul><ul><li><p><strong><a href="https://archive.ph/5Fq2D">DHS Demanded Google Surrender Data on Canadian&#8217;s Activity, Location Over Anti-ICE Posts</a></strong></p><ul><li><p>This is exactly what others and I have been warning about regarding exposure to United States tech companies, particularly the hyperscalers. Homeland Security is demanding information about the person based on a 1930s trade law, which highlights that the government doesn&#8217;t need to use the United States CLOUD Act to go after Canadians and Canada. We also much contend with that this is likely not the only one, but the person one we&#8217;re hearing about.</p></li><li><p>CTV Coverage: <strong><a href="https://www.ctvnews.ca/canada/article/us-government-wants-google-to-share-data-on-unidentified-canadian-trump-critic/">U.S. government wants Google to share data on unidentified Canadian Trump critic</a></strong></p></li><li><p><strong><a href="https://www.ctvnews.ca/sci-tech/article/these-are-real-life-consequences-what-to-know-about-data-sovereignty-as-the-trump-administration-tries-to-unmask-an-anonymous-canadian/">&#8216;These are real-life consequences&#8217;: What to know about data sovereignty as the Trump administration tries to unmask an anonymous Canadian</a></strong></p></li></ul></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/30/investigations/pr-firm-canada-online-communities-political-influence">Car crashes, crime memes and hidden clients: How a PR firm farms Canadian users for political influence</a></strong></p><ul><li><p>Paywalled, but a tremendous investigation and work here</p></li></ul></li><li><p><strong><a href="https://betakit.com/ottawa-plans-to-spin-off-federal-semiconductor-facility-into-commercial-entity/">Ottawa plans to spin off federal semiconductor facility into &#8220;commercial entity&#8221;</a></strong></p><ul><li><p>I am a bit worried about this plan, but has a lot of potential.</p></li></ul></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/google-now-offers-up-to-15-million-for-some-android-exploits/">Google now offers up to $1.5 million for some Android exploits</a></strong></p><ul><li><p>Google offers big money to hackers and security experts to report bugs to Google rather than exploit them.</p></li><li><p>Google&#8217;s announcement about changes to bug bounting: <strong><a href="https://bughunters.google.com/blog/evolving-the-android-chrome-vrps-for-the-ai-era">Evolving the Android &amp; Chrome VRPs for the AI Era</a></strong></p></li></ul></li><li><p><strong><a href="https://therecord.media/infrastructure-education-company-canvas-incident">Educational company Instructure reports cyber incident</a></strong></p><ul><li><p>Instructure is the company behind Canvas, which is widely used in Canada.</p></li><li><p>The breach of Instructure has led to the massive breach and ransom of Canvas.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/canvas-cyber-attack-canadian-universities-9.7193648">A cyberattack hit universities worldwide, including top Canadian schools. Here&#8217;s what we know</a></strong></p></li><li><p><strong><a href="https://www.cbc.ca/news/canada/toronto/ontario-universities-canvas-breach-9.7192287">U of T, OCAD amongst Ontario universities impacted by Canvas cyber breach</a></strong></p></li><li><p><strong><a href="https://www.cbc.ca/news/canada/british-columbia/ubc-sfu-canvas-cyber-breach-9.7191972">UBC, SFU among thousands of universities affected by Canvas software cyber breach</a></strong></p><ul><li><p>This is hitting right when many schools are holding finals. Ransomware criminals are smart and know this is the time for maximum pressure.</p></li></ul></li><li><p><strong><a href="https://globalnews.ca/news/11831073/u-s-russia-interfering-alberta-separatist-debate-study/">U.S., Russia interfering in Alberta separatist debate, study says</a></strong></p><ul><li><p>Of no surprise. We already know the Trump admin is provided tacit support, and Russia always loves an instance to support division.</p></li><li><p>Report from <strong><a href="https://disinfowatch.org/foreign-interference-targeting-canada-and-alberta/">DisinfoWatch and Global Centre for Democratic Resilience here</a></strong>.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/settlement-cra-account-hack-2020-federal-court-2026-9.7189102">Canadian government to pay $8.7M to settle data breach class-action involving CRA accounts</a></strong></p><ul><li><p>Covers the breaches during the high of COVID. Being administered by KPMG <a href="https://www.breachsettlementcanada.kpmg.ca/">through this portal</a>.</p></li></ul></li><li><p><strong><a href="https://canadianshieldinstitute.ca/latest-updates/f/governance-is-the-foundation-of-digital-sovereignty">Canadian Shield Institute releases Chapter 1 of Foundations of Digital Sovereignty</a></strong></p><ul><li><p>Canadian Shield Institute is quickly becoming the go-to think tank on digital and emerging technology issues affecting Canada.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/politics/privacy-investigation-chatgpt-open-ai-9.7188538">OpenAI didn&#8217;t respect Canadian privacy law when it trained ChatGPT: investigation</a></strong></p><ul><li><p>Yes, good this was confirmed, but there will likely be very little teeth or response to ensure compliance or punishment for this. As a result, corporations will be encouraged to do this in the future because OpenAI got away with it.</p></li></ul></li><li><p><strong><a href="https://archive.ph/VhYX4#selection-2571.0-2571.106">White hat hackers warn lawful access bill could make it easier for criminals to penetrate Canadian systems</a></strong></p><ul><li><p>The problem isn&#8217;t the lawful access, it is the mechanisms to enable it which can make it easier for everyone except law enforcement.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/politics/apple-argues-liberals-lawful-access-bill-could-put-users-personal-data-at-risk-9.7190092">Apple argues Liberals&#8217; lawful access bill could put users&#8217; personal data at risk</a></strong></p><ul><li><p>Apple rarely engages in the Canadian policy/legal space, so it is always noteworthy when they comment.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/politics/cyber-attack-germany-canada-industry-9.7192058">&#8216;We are not at war, but we&#8217;re not at peace either,&#8217; warns German cyber chief</a></strong></p><ul><li><p>Meetings between Germany's Cyber Head and CAFCYBERCOM. But of course, this article doesn't expand on that at all and gives us a "supply chain that is worried about cyber" as if it's from 2022.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/canada-revenue-agency-hack-stolen-identity-9.7190183">This woman&#8217;s identity was stolen in a CRA hack. Why hasn&#8217;t the impostor been charged in her case?</a></strong></p><ul><li><p>A great article on gaps in CRA&#8217;s ability to address fraud and cybercrime. </p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/intelligence-commissioner/appearancebeforesecdmay42026.html">Remarks to the Standing Senate Committee on National Security, Defence and Veterans Affairs - May 4, 2026</a></strong></p><ul><li><p>Intelligence Commissioner suggesting they would like more visibility into CSE&#8217;s support of cybersecurity incidents.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/public-safety-canada/news/2026/05/secretary-of-state-sahota-highlights-investments-in-combatting-crime-from-spring-economic-update-2026.html">Secretary of State Sahota highlights investments in combatting crime from Spring Economic Update 2026</a></strong></p><ul><li><p>&#8220;Spring Economic Update 2026 proposes to provide $75 million over five years, starting in 2026-27, to Public Safety Canada for the Canada Community Security Program (CCSP)&#8221;</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/intelligence-commissioner/annualreport.html">Office of the Intelligence Commissioner released its Annual Report 2025</a></strong></p></li><li><p><strong><a href="https://betakit.com/the-math-is-not-mathing-how-ai-bubble-fears-are-changing-canadian-vcs-investment-approach/">&#8220;The math is not mathing&#8221;: How AI bubble fears are changing Canadian VCs&#8217; investment approach</a></strong></p><ul><li><p>Honestly a bit surprised to see some coverage of this, but I hope it&#8217;s a growing trend.</p></li></ul></li><li><p><strong><a href="https://betakit.com/canada-to-create-ai-and-labour-advisory-council-solomon-says/">Canada to create AI and Labour Advisory Council, Solomon says</a></strong></p><ul><li><p>Yet the government has almost nothing to launch the Canadian Cyber Defence Collective.</p></li></ul></li><li><p>[French, Google Translated] <strong><a href="https://www.quebec.ca/nouvelles/actualites/details/le-quebec-a-la-rencontre-de-lecosysteme-belge-des-centres-de-donnees-70171">Quebec meets with the Belgian data center ecosystem</a></strong></p><ul><li><p>Digital sovereignty and defence innovation were both discussed.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/05/vicky-eatrides-to-the-departure-festival.html">Head of CRTC Speech on Modernizizing Canada&#8217;s Broadcasting Framework</a></strong></p><ul><li><p>Includes some discussion of Internet policies and competition.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/05/minister-solomon-to-make-announcement-supporting-sovereign-large-scale-data-centre.html">Minister Solomon to make announcement supporting sovereign large-scale data centre</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/pacific-economic-development/news/2026/05/government-of-canada-to-announce-investments-to-strengthen-bc-tech-sector-and-help-businesses-grow.html">Government of Canada to announce investments to strengthen B.C. tech sector and help businesses grow</a></strong></p><ul><li><p>Announcement later today (May 11) at 11:00AM, but investments for commercializationn of AI and quantum technologies.</p></li></ul></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, this section is for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section, which is 100% focused on Canada</h6><ul><li><p><strong><a href="https://www.thatprivacyguy.com/blog/chrome-silent-nano-install/">Google Chrome silently installs a 4 GB AI model on your device without consent. At a billion-device scale the climate costs are insane.</a></strong></p><ul><li><p>Absolutely unhinged, unethical behaviour by Google.</p></li></ul></li><li><p><strong><a href="https://gizmodo.com/more-than-a-third-of-all-new-podcasts-are-ai-generated-2000753786">More Than a Third of All New Podcasts Are AI-Generated</a></strong></p><ul><li><p>I have known people to get scammed by these podcasts, or podslop. </p></li></ul></li><li><p><strong><a href="https://archive.ph/gAkQs">Cybercriminals Are Complaining About AI Slop Flooding Their Forums</a></strong></p><ul><li><p>This potentially opens up an amazing way for law enforcement and enterprising businesses to target cyber criminals: flood their forums with AI slop.</p></li></ul></li><li><p><strong><a href="https://www.theverge.com/tech/925696/yarbo-robot-lawn-mower-hack-remote-control-camera-access-mqtt">A hacker ran me over with a robot lawn mower</a></strong></p><ul><li><p>The makers of this lawnmower should be sued for what is so easily accessible from these mowers: Exact GPS coordinates. Email addresses. Wi-Fi passwords.</p></li></ul></li><li><p><strong><a href="https://www.theregister.com/off-prem/2026/05/11/sovereign-cloud-is-only-possible-if-youre-chinese-or-american-gartner/5237660?utm_source=dlvr.it&amp;utm_medium=bluesky">Sovereign cloud is only possible if you&#8217;re Chinese or American: Gartner</a></strong></p><ul><li><p>&#8220;Toombs said that while US-based cloud vendors have created products they say can meet the needs of organizations that need a cloud that doesn&#8217;t have legal entanglements outside their chosen jurisdiction, the fact they&#8217;re ultimately owned by American corporations means it&#8217;s not possible to be certain a cloud provider can promise complete sovereignty.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.bbc.com/news/articles/c242pzr1zp2o">Musk&#8217;s AI told me people were coming to kill me. I grabbed a hammer and prepared for war</a></strong></p><ul><li><p>Grok/X has shown to systematically produce so much harm.</p></li></ul></li><li><p>Google: <strong><a href="https://blog.google/security/influence-operations-bulletin-q1-2026/">Influence Operations Bulletin Q1 2026</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://techcrunch.com/2026/05/04/hackers-are-still-exploiting-the-cpanel-bug-to-gain-control-of-thousands-of-websites/">Hackers are mass-exploiting the cPanel bug to gain control of thousands of websites</a></strong></p><ul><li><p>This will likely be a problem for a while as there will certainly people who will not update/do not realize they need to update or mitigate against this.</p></li></ul></li><li><p><strong><a href="https://securelist.com/tr/daemon-tools-backdoor/119654/">DAEMON Tools software infected &#8211; supply chain attack ongoing since April 8, 2026</a> (h/t Catalin Cimpanu)</strong></p><ul><li><p>What you may not hear in a lot of the reporting of this is that daemon tools is a very popular software for piracy. </p></li></ul></li><li><p><strong><a href="https://www.darkreading.com/cyber-risk/microsoft-edge-passwords-enterprise-risk">Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk</a></strong></p><ul><li><p>Microsoft loves to make things easy for attackers.</p></li></ul></li><li><p><strong><a href="https://www.securityweek.com/ai-fuels-industrial-cybercrime-as-time-to-exploit-shrinks-to-hours/">AI Fuels &#8216;Industrial&#8217; Cybercrime as Time-to-Exploit Shrinks to Hours</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-linux-dirty-frag-zero-day-with-poc-exploit-gives-root-privileges/">New Linux &#8216;Dirty Frag&#8217; zero-day gives root on all major distros</a></strong></p><ul><li><p>Big yikes on this one. </p></li></ul></li><li><p><strong><a href="https://hackread.com/low-and-slow-ddos-attack-hits-2-45-billion-5-hours/">Massive &#8220;Low and Slow&#8221; DDoS Attack Hits Platform With 2.45 Billion in 5 Hours</a></strong></p><ul><li><p>Report by Galileo suggests bots are getting stealthier.</p></li></ul></li><li><p><strong><a href="https://www.darkreading.com/application-security/attackers-use-screensavers-drop-malware-rmm-tools">Attackers Use Windows Screensavers to Drop Malware, RMM Tools</a></strong></p></li><li><p><strong><a href="https://thehackernews.com/2026/05/tclbanker-banking-trojan-targets.html">TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms</a></strong></p><p></p></li></ul><div><hr></div><h6 style="text-align: center;"><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><ul><li><p><strong><a href="https://openmedia.org/press/item/civil-society-to-parliament-kill-bill-c-22">Civil Society to Parliament: Kill Bill C-22</a></strong></p><ul><li><p>Ron Deibert, Director of Citizen Lab, publishes open letter about Bill C-22</p></li></ul></li><li><p><strong><a href="https://canadiancybersecuritynetwork.com/cybervoices/canada-is-falling-behind">Canada Is Falling Behind</a></strong></p><ul><li><p>Op-ed by Francois Guay of Canadian Cybersecurity Network in conversation with Steve Waterhouse</p></li></ul></li><li><p><strong><a href="https://natoassociation.ca/the-governance-gap-why-canada-must-strengthen-its-critical-infrastructure-standards/">The Governance Gap: Why Canada Must Strengthen Its Critical Infrastructure Standards</a></strong></p></li><li><p>European Parliament Think Tank: <strong><a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_ATA(2026)782618">Virtual private networks and the protection of children online</a></strong></p><ul><li><p>Refers to VPNs as a &#8220;loophole.&#8221; Although just a research report, the growing trend against VPNs as privacy is being attacked online is a cause for concern.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://dysruptionhub.com/foxconn-wisconsin-cyber-outage/">Foxconn Wisconsin production halt raises cyber questions</a> (h/t Catalin Cimpanu)</strong></p><ul><li><p>Is it DNS or ransomware?</p></li></ul></li><li><p><strong><a href="https://www.nextgov.com/people/2026/05/ibm-security-executive-emerges-possible-contender-lead-cisa/413291/">IBM security executive emerges as possible contender to lead CISA</a></strong></p><ul><li><p>CISA is being allowed to wither and die, so it&#8217;s hard to say if the new pick will even be confirmed or if he will help to increase confidence.</p></li></ul></li><li><p><strong><a href="https://cyberscoop.com/schemata-dod-contractor-api-flaw-military-data-exposure/">A DOD contractor&#8217;s API flaw exposed military course data and service member records</a></strong></p></li><li><p><strong><a href="https://apnews.com/article/cyberattack-schools-canvas-instructure-shinyhunters-a0d7719689263e6b5f90d0e633391b5b">Cyberattack hits Canvas system used by thousands of schools as finals loom</a></strong></p><ul><li><p>US-focused coverage here. Including additional coverage of Canvas hack because this is a MASSIVE breach. </p></li></ul></li><li><p><strong><a href="https://www.politico.com/news/2026/05/07/white-house-ai-oversight-00910837">White House distances itself from tighter AI regulation</a></strong></p><ul><li><p>There has been some discussion of the White House conducting security reviews of certain frontier/advanced AI models, but this suggests that there won&#8217;t be a straight regulation, but voluntrary partnership. As far as I know, White House wouldn&#8217;t necessarily be able to unilaterally establish regulations in this manner in the first place without the support/approval of Congress, but as we&#8217;ve seen, the United States no longer cares about the rule of law.</p></li></ul></li><li><p><strong><a href="https://www.reuters.com/business/media-telecom/us-telecom-agency-votes-expand-tech-crackdown-china-2026-04-30/">US telecom agency votes to expand tech crackdown on China</a></strong></p><ul><li><p>FCC unanimously voted to propose banning &#8220;all Chinese labs from testing electronic &#8204;devices such as smartphones, cameras and computers for use in the United States.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.justice.gov/opa/pr/two-us-nationals-sentenced-facilitating-fraudulent-remote-information-technology-worker-0">Two U.S. Nationals Sentenced for Facilitating Fraudulent Remote Information Technology Worker Schemes to Generate Revenue for the Democratic People&#8217;s Republic of Korea</a></strong></p></li><li><p><strong><a href="https://www.justice.gov/opa/pr/two-americans-who-attacked-multiple-us-victims-using-alphv-blackcat-ransomware-sentenced">Two Americans Who Attacked Multiple U.S. Victims Using ALPHV BlackCat Ransomware Sentenced to Prison</a></strong></p></li><li><p><strong><a href="https://defensescoop.com/2026/05/07/dod-planning-to-address-compute-bottleneck-ai-proliferation/">DOD planning to address compute &#8216;bottleneck&#8217; that could hinder AI proliferation</a></strong></p></li><li><p><strong><a href="https://therecord.media/forbes-agrees-10-million-settlement-privacy-class-action">Forbes preliminarily agrees to pay $10 million to settle California wiretapping lawsuit</a></strong></p><ul><li><p>California is one of the few US states that has historically been a trend setter in pro-consumer behavior and have had the weight to influence the broader economic trends. With that said, $10 million is a drop in the bucket of what they likely earn on selling people&#8217;s data.</p></li></ul></li><li><p><strong><a href="https://therecord.media/gm-to-pay-12-million-california-privacy-settlement">GM to pay over $12 million in California privacy settlement involving driver data</a></strong></p><ul><li><p>Same in this case. The amount that companies are fined are rarely punitive. When you make businesses pay fines that are little more than the cost of doing business, it only encourages them to do it more.</p></li></ul></li><li><p><strong><a href="https://www.fcc.gov/document/oet-announces-extension-and-expansion-waivers">OET Announces Extension and Expansion of Waivers</a></strong></p><ul><li><p>The FCC is providing some leeway to provide security update devices such as <a href="https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers">banned foreign routers</a> and drones.</p></li></ul></li><li><p><strong><a href="https://hondurasgate.ch/investigaciones/hondurasgate-under-attack-us-israel-digital-siege">Hondurasgate website under sustained Attack</a></strong> (H/t <a href="https://news.risky.biz/risky-bulletin-fcc-relaxes-foreign-router-ban-to-allow-for-security-updates/">Risky Bulletin</a>)</p><ul><li><p>The website of the report which suggests that the United States and Israel plot to destabilize countries in South America has come under sustained attack through cyberspace via instrusion attempts on the website and DDoS.</p></li><li><p>Wouldn&#8217;t normally cover this, but the attacks reaise suspicions.</p></li></ul></li><li><p><strong><a href="https://therecord.media/virginia-man-found-guilty-deleting-96-gov-databases">Virginia man found guilty of deleting 96 government databases</a></strong></p><ul><li><p>Major failure of the company in its initial background checks that allowed a felon previously convicted of computer-related criminal charges to commit additional crimes and ruin a company&#8217;s reptutation and business.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://cybernews.com/security/odido-class-action-shinyhunters-6-2m-records-dark-web/">Dutch consumers launch mass lawsuit against Odido over data breach affecting 6.2 million customers</a></strong></p><ul><li><p>Being sued by Consumers United in Court who allege Obido failed to protect personal information properly and were &#8220;insufficiently transparent and failed to comply with its reporting obligations.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.bbc.com/news/articles/c1j2gd8yr6go">Poverty and technology leading to record levels of slavery in UK</a></strong></p></li><li><p><strong><a href="https://therecord.media/german-officials-advance-laws-surveillance">German officials advance legislation that would expand law enforcement use of surveillance technology</a></strong></p><ul><li><p>Many countries are currently looking to modernize their surveillance and lawful access laws. (Sounds redundant to differentiate)</p></li></ul></li><li><p><strong><a href="https://vsquare.org/welcome-to-the-gru-university-where-moscow-turns-students-into-spies-and-hackers-bauman-stupakov/">Welcome to the GRU University, Where Moscow Turns Students into Spies and Hackers</a></strong></p></li><li><p><strong><a href="https://www.theguardian.com/world/2026/may/07/revealed-russia-top-secret-spy-school-hacking-western-electoral-interference">Revealed: Russia&#8217;s top secret spy school teaching hacking and election meddling</a></strong></p><ul><li><p>This is a massively important leak. Not much was publicy known about the GRU&#8217;s recruitment and training process prior to this, and now this opens a lot to understand their doctrine and institutional approaches to cyber.</p></li></ul></li><li><p><strong><a href="https://therecord.media/polish-intelligence-warns-hackers-attacked-water-treatment">Polish intelligence warns hackers attacked water treatment control systems</a></strong></p><ul><li><p>Russian hackers have been battering critical infrastructure the past few years.</p></li></ul></li><li><p><strong><a href="https://therecord.media/european-leaders-unveil-deal-ai-act-nudification">European leaders unveil tentative deal for AI Act simplification, including a ban on nudification tools</a></strong></p><ul><li><p>Will ban nudification tools and delay the implementation of key provisions of the EU AI Act.</p></li></ul></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/">NVIDIA confirms GeForce NOW data breach affecting Armenian users</a></strong></p><ul><li><p>Compartmentalization ensured this wasn&#8217;t a global breach, but still bad for Armenian users.</p></li></ul></li><li><p><strong><a href="https://www.euronews.com/next/2026/05/08/elon-musk-faces-criminal-probe-in-france-as-prosecutors-escalate-xs-ai-investigation">Elon Musk faces criminal probe in France as prosecutors escalate X&#8217;s AI Investigation</a></strong></p><ul><li><p>One can hope that the French will do what is right and lay criminal charges on this serial criminal and fraud.</p></li></ul></li><li><p><strong><a href="https://iclg.com/news/23845-taxi-app-fined-100-million-over-russian-data-transfers">Taxi app fined &#8364;100 million over Russian data transfers</a></strong></p><ul><li><p>Yango fined 100 million euros for breaching GDPR by transfering personal data to Russia without adequate safeguards. Shows you just how much Netherlands and EU take privacy more seriously than the US and Canada.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/student-hacked-taiwan-high-speed-rail-to-trigger-emergency-brakes/">Student hacked Taiwan high-speed rail to trigger emergency brakes</a></strong></p><ul><li><p>Not quite clear why the 23 year old hacker did this, but highlights a major vulnerability in the system that could have been much worse.</p></li></ul></li><li><p>Australia: <strong>T<a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/cyber-incident-review-board">he</a></strong><a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/cyber-incident-review-board"> </a><strong><a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/cyber-incident-review-board">Cyber Incident Review Board</a></strong></p><ul><li><p>Australia does a lot of dumb in broader cyber governance, but they&#8217;ve generally had a good and engaged approach to cyber security and defence. I&#8217;m quite jealous. Canada needs this, as the government hides so much when major cybersecurity incidents occur.</p></li></ul></li><li><p><strong><a href="https://hunt.io/blog/iranian-nexus-oman-government-intrusion">Iranian-Nexus Operation Against Oman&#8217;s Government: 12 Ministries Hit and 26,000 Citizen Records Exposed</a></strong></p></li><li><p><strong><a href="https://therecord.media/iran-government-hackers-use-chaos-ransomware-as-cover">Iranian government hackers using Chaos ransomware as cover, researchers say</a></strong></p></li><li><p><strong>China: <a href="https://chinadigitaltimes.net/chinese/726411.html">[Ministry of Truth Directive] Urgent Notice Regarding the Complete Ban on Overseas Internet Traffic and the Strict Prohibition of Circumvention Services</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">Media of the Week</h3><div><hr></div><h6 style="text-align: center;"><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-090526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 02/05/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending May 02]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526</guid><pubDate>Mon, 04 May 2026 13:06:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2243fbeb-2213-432a-9593-cf9b5c3b2e72_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526/comments"><span>Leave a comment</span></a></p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>. </p></li></ul></li><li><p>If you are in Ottawa-Gatineau region, come see me speak later today: <a href="https://www.eventbrite.ca/e/vers-un-bouleversement-des-equilibres-militaires-au-sein-de-lalliance-tickets-1987271944883">https://www.eventbrite.ca/e/vers-un-bouleversement-des-equilibres-militaires-au-sein-de-lalliance-tickets-1987271944883</a></p></li></ul><div><hr></div><h6 style="text-align: center;"><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://www.cbc.ca/news/business/rogers-communications-staff-buyouts-9.7178929">Rogers offering buyouts to about 10,000 employees as it aims to cut spending</a></strong></p><ul><li><p>Rogers is making a big cost cutting push, which is part of plans to reduce capital spending by 30%. Rogers might be the least diversified</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/politics/ai-strategy-pillars-evan-solomon-9.7180418">Feds reveal 6 pillars for long-touted, repeatedly delayed national AI strategy</a></strong></p><ul><li><p>There are a lot of interesting details from the Spring Economic Update, which I plan to do a longer article about.</p></li></ul></li><li><p><strong><a href="https://www.propublica.org/article/impersonating-propublica-reporter">Who&#8217;s Been Impersonating This ProPublica Reporter?</a></strong></p><ul><li><p>Someone has been impersonating a reporter to target people, which has included targeting a Canadian military official.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/toronto/canada-crypto-atm-ban-scammers-9.7180642">Federal government plans to ban crypto ATMs to stop scammers from defrauding Canadians</a></strong></p><ul><li><p>Honestly, a bit surprising this has taken so long, but I wouldn&#8217;t exactly call this Parliament or Cabinet very tech-informed.</p></li></ul></li><li><p><strong><a href="https://techcouver.com/2026/04/23/geocomply-cuts-staff-amid-market-shift/">GeoComply Cuts Staff Amid Market Shift</a></strong></p><ul><li><p>A top Canadian geolocation and security company cut approximately 80 people.</p></li></ul></li><li><p><strong><a href="https://betakit.com/canada-ai-consultation-analysis/">AI ethical concerns roughly as important to Canadians as economic growth, analysis shows</a></strong></p><ul><li><p>And yet Minister Solomon and the Canadian government is actively diminishing ethical concerns, which is why they don&#8217;t know how to handle OpenAI&#8217;s abject failure in BC.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-finance/news/2026/04/canada-welcomes-progress-towards-the-establishment-of-the-defence-security-and-resilience-bank-and-hosting-its-headquarters.html">Canada welcomes progress towards the establishment of the Defence, Security and Resilience Bank and hosting its headquarters</a></strong></p><ul><li><p>The DSRB is being developed for long-term, low-cost financing for defence, security and resilience initiatives, which means it will include cyber.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/sudbury/police-cyber-fraud-northern-ontario-9.7181268">Police investigate sophisticated cyber-fraud targeting Indigenous businesses</a></strong></p><ul><li><p>Refers to spearphishing as a &#8220;growing form of targeted online fraud&#8221; which I suppose is true, but laughable</p></li></ul></li><li><p><strong>Major scandal in Alberta. Sepratists were illegally provided an Albertan electoral list of millions of Albertans contact details, who proceeded to leak it:</strong> </p></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:195950473,&quot;url&quot;:&quot;https://www.readtheorchard.org/p/scoop-elections-alberta-investigating&quot;,&quot;publication_id&quot;:474662,&quot;publication_name&quot;:&quot;The Orchard&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!SHuh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F51a453b5-b37c-469e-af39-c21bc18cabe7_256x256.png&quot;,&quot;title&quot;:&quot;SCOOP: Elections Alberta investigating separatists for accessing electors list&quot;,&quot;truncated_body_text&quot;:&quot;An Elections Alberta official showed up to the launch of David Parker&#8217;s new separatist scheme with four Edmonton cops to inform the group that they&#8217;re under investiga&#8230;&quot;,&quot;date&quot;:&quot;2026-04-30T13:03:09.216Z&quot;,&quot;like_count&quot;:89,&quot;comment_count&quot;:6,&quot;bylines&quot;:[{&quot;id&quot;:3457161,&quot;name&quot;:&quot;Jeremy Appel&quot;,&quot;handle&quot;:&quot;jeremyappel&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!CUcv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56c5d82d-d577-437e-9ca7-e161282b435c_748x562.jpeg&quot;,&quot;bio&quot;:&quot;Edmonton-based journalist interested in politics, the media and corporate power. Author of Kenneyism: Jason Kenney&#8217;s Pursuit of Power (Dundurn, 2024).&quot;,&quot;profile_set_up_at&quot;:&quot;2021-09-03T21:56:35.914Z&quot;,&quot;reader_installed_at&quot;:&quot;2022-03-09T20:15:53.056Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:401723,&quot;user_id&quot;:3457161,&quot;publication_id&quot;:474662,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:474662,&quot;name&quot;:&quot;The Orchard&quot;,&quot;subdomain&quot;:&quot;theorchard&quot;,&quot;custom_domain&quot;:&quot;www.readtheorchard.org&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;News and analysis from an unabashedly progressive perspective, focusing on the intersection of politics, media and corporate power&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/51a453b5-b37c-469e-af39-c21bc18cabe7_256x256.png&quot;,&quot;author_id&quot;:3457161,&quot;primary_user_id&quot;:3457161,&quot;theme_var_background_pop&quot;:&quot;#6C0095&quot;,&quot;created_at&quot;:&quot;2021-09-03T18:27:13.516Z&quot;,&quot;email_from_name&quot;:&quot;The Orchard&quot;,&quot;copyright&quot;:&quot;Jeremy Appel&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:null}}],&quot;twitter_screen_name&quot;:&quot;JeremyAppel1025&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:100,&quot;status&quot;:{&quot;bestsellerTier&quot;:100,&quot;subscriberTier&quot;:5,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:{&quot;type&quot;:&quot;bestseller&quot;,&quot;tier&quot;:100},&quot;paidPublicationIds&quot;:[3224756,1377040,260654,2510348,2325511,3930],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.readtheorchard.org/p/scoop-elections-alberta-investigating?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!SHuh!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F51a453b5-b37c-469e-af39-c21bc18cabe7_256x256.png" loading="lazy"><span class="embedded-post-publication-name">The Orchard</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">SCOOP: Elections Alberta investigating separatists for accessing electors list</div></div><div class="embedded-post-body">An Elections Alberta official showed up to the launch of David Parker&#8217;s new separatist scheme with four Edmonton cops to inform the group that they&#8217;re under investiga&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">23 days ago &#183; 89 likes &#183; 6 comments &#183; Jeremy Appel</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:196062144,&quot;url&quot;:&quot;https://www.readtheline.ca/p/scoop-jen-gerson-elections-albertas&quot;,&quot;publication_id&quot;:70032,&quot;publication_name&quot;:&quot;The Line&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!IMwH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2898e9c-3710-43fa-8234-065905497524_1280x1280.png&quot;,&quot;title&quot;:&quot;SCOOP: Jen Gerson: Elections Alberta's massive failure could have put people in danger. I tried to warn them.&quot;,&quot;truncated_body_text&quot;:&quot;By: Jen Gerson&quot;,&quot;date&quot;:&quot;2026-05-01T02:03:18.860Z&quot;,&quot;like_count&quot;:195,&quot;comment_count&quot;:48,&quot;bylines&quot;:[{&quot;id&quot;:1651589,&quot;name&quot;:&quot;Jen Gerson&quot;,&quot;handle&quot;:&quot;jengerson&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e58e0c5-fb58-4f48-bc7f-c24818674f72_1080x1350.jpeg&quot;,&quot;bio&quot;:&quot;Jen Gerson is co-founder of The Line, www.readtheline.ca. She is a Canadian journalist who has contributed to the CBC, the National Post, Maclean's, Walrus, the Washington Post, and the New York Times. Her first book is almost done, she swears.&quot;,&quot;profile_set_up_at&quot;:&quot;2026-01-12T03:04:03.759Z&quot;,&quot;reader_installed_at&quot;:&quot;2026-01-12T02:58:47.747Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:5467,&quot;user_id&quot;:1651589,&quot;publication_id&quot;:70032,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:70032,&quot;name&quot;:&quot;The Line&quot;,&quot;subdomain&quot;:&quot;theline&quot;,&quot;custom_domain&quot;:&quot;www.readtheline.ca&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Commentary for Canadians. &quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/c2898e9c-3710-43fa-8234-065905497524_1280x1280.png&quot;,&quot;author_id&quot;:13380174,&quot;primary_user_id&quot;:13380174,&quot;theme_var_background_pop&quot;:&quot;#121bfa&quot;,&quot;created_at&quot;:&quot;2020-07-20T03:16:27.044Z&quot;,&quot;email_from_name&quot;:&quot;The Line Editor &quot;,&quot;copyright&quot;:&quot;Line Editor&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:1000,&quot;status&quot;:{&quot;bestsellerTier&quot;:1000,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:{&quot;type&quot;:&quot;bestseller&quot;,&quot;tier&quot;:1000},&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.readtheline.ca/p/scoop-jen-gerson-elections-albertas?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!IMwH!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2898e9c-3710-43fa-8234-065905497524_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">The Line</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">SCOOP: Jen Gerson: Elections Alberta's massive failure could have put people in danger. I tried to warn them.</div></div><div class="embedded-post-body">By: Jen Gerson&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">22 days ago &#183; 195 likes &#183; 48 comments &#183; Jen Gerson</div></a></div><ul><li><p><strong><a href="https://oipc.ab.ca/information-and-privacy-commissioner-of-alberta-issues-statement-regarding-unauthorized-distribution-of-list-of-electors/">Information and Privacy Commissioner of Alberta issues statement regarding unauthorized distribution of List of Electors</a></strong></p><ul><li><p>&#8220;What happened here is very serious,&#8221; - Commissioner Diane McLeod</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/edmonton/elections-alberta-electors-database-9.7182667">Elections Alberta granted injunction to pull down electoral list posted publicly by separatist group</a></strong></p><ul><li><p>It cannot be understated how massive a privacy breach this is. This is nothing compared to the breaches of many major corporations, but instead separatists are openly being given access to the full electoral list of Alberta to post without concern by the parties involved.</p></li><li><p>A separatist group was illegally provided with Alberta&#8217;s electoral list. I really hope Elections Alberta and the courts make an example out of this. However, I worry we&#8217;re likely to see interference from the current Alberta government.</p><p></p></li></ul></li></ul><ul><li><p><strong><a href="https://www.pm.gc.ca/en/news/news-releases/2026/04/30/prime-minister-carney-announces-upcoming-diplomatic-appointment">Prime Minister Carney announces upcoming diplomatic appointment</a></strong></p><ul><li><p>Jonathan Wilkinson appointed as Ambassador to EU</p></li><li><p>I normally wouldn&#8217;t include this, but this appointments have major implications for the growing shift of Canada&#8217;s market towards Europe/EU. </p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/politics/liberals-new-police-agency-financial-crime-9.7181929">Liberals are pitching a brand new police agency for financial crimes. How would that work?</a></strong></p><ul><li><p>As massive amounts of financial crime these days involve cyber crime, this is something to watch. </p></li></ul></li><li><p><strong><a href="https://archive.ph/LAqu7#selection-2569.0-2569.72">CRA refunding $647-million collected from cancelled digital services tax</a></strong></p><ul><li><p>Carney claims to be taking a hard stance against the US, while completely not taking a hard stance on the US. </p></li></ul></li><li><p><strong><a href="https://cantruck.ca/cbsa-it-system-outages-continue-to-disrupt-supply-chains-add-costs-as-agency-issues-update/">CBSA IT System Outages Continue to Disrupt Supply Chains, Add Costs as Agency Issues Update</a></strong></p><ul><li><p>IT outages at the Canadian Border Services Agency is leading to supply chain disruptions.</p></li></ul></li><li><p><strong><a href="https://www.cybersecuritydive.com/news/ai-agents-security-guidance-australia-us/819076/">US and allies urge &#8216;careful adoption&#8217; of AI agents</a></strong></p><ul><li><p>Canada is amongst the the partners that published this. Full report/guidance can be <a href="https://www.cyber.gov.au/sites/default/files/2026-05/careful_adoption_of_agentic_ai_services.pdf">read here</a>.</p></li></ul></li><li><p><strong><a href="https://manilastandard.net/news/314731168/ph-canada-to-deepen-cyber-defense-partnership.html">PH, Canada to deepen cyber defense partnership</a></strong></p><ul><li><p>Philippines military and CAF have slowly been developing close partnerships over the last couple of years, particularly in cyber. Cyber is becoming one of Canada/CAF&#8217;s top means to advance defence cooperation in the Indo-Pacific. We are seeing the same in Japan right now as well. There are a few others, but Philippines and Japan are the furthest along.</p></li></ul></li><li><p><strong><a href="https://betakit.com/cohere-buys-naming-rights-to-ottawa-convention-centre/">Cohere buys naming rights to Ottawa&#8217;s former EY Centre</a></strong></p><ul><li><p>This may not sound like much, but as someone based in Ottawa let me explain to you how major this is. When you leave the Ottawa Airport, the EY Centre (or soon to be Cohere Centre) is the first major thing that you see other than hotels. More importantly, Canada&#8217;s largest defence and security expo <a href="https://www.defenceandsecurity.ca/CANSEC/">CANSEC</a>, which happens at the end of this month, is held at the EY Centre. Any major government expo, conference, or event that is large enough is held at the EY Centre. So this is part good marketing and a major flex for Cohere and says a lot about Cohere&#8217;s positioning.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/manitoba/gimli-cyberattack-9.7181371">Small municipalities &#8216;fairly easy target&#8217; for criminals, expert says after RM of Gimli targeted in cyberattack</a></strong></p><ul><li><p>Small-town Gimli hit by cyberattack, currently unable to process bill payments.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/prairies-economic-development/news/2026/04/government-of-canada-investing-in-innovation-ecosystems-and-ai-to-strengthen-saskatchewans-tech-sector.html">Government of Canada investing in innovation ecosystems and AI to strengthen Saskatchewan&#8217;s tech sector</a></strong></p><ul><li><p>Includes $3.8 million for Regional Innovation Ecosystems which will help support Co.Labs and $4.2 million for Reigonal Artificial Intelligence Initiative that will help support Coconut Software Corporation, Vendasta Technologies, TomeTeam live Technologies and the University of Regina.</p></li><li><p><strong><a href="https://www.canada.ca/en/prairies-economic-development/news/2026/04/backgrounder-government-of-canada-investing-in-innovation-ecosystems-and-ai-to-strengthen-saskatchewans-tech-sector.html">Backgrounder</a></strong></p></li></ul></li><li><p><strong><a href="https://globalnews.ca/news/11820352/estee-lauder-settles-class-action-lawsuit-over-2023-data-breaches/">Est&#233;e Lauder settles class-action lawsuit over 2023 data breaches</a></strong></p></li><li><p><strong><a href="https://betakit.com/canadian-spring-economic-update-2026/">AI strategy pillars, new SMB procurement program revealed in Canada&#8217;s Spring Economic Update</a></strong></p><ul><li><p>I was going to write a full breakdown of the economic update, but this quote from the article sums things up: &#8220;&#8216;Today&#8217;s economic update does little to show that the government is taking the digital economy seriously or using it to strengthen Canada&#8217;s major traditional economic strategies,&#8217; Council of Canadian Innovators CEO Patrick Searle said in a release.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/national-research-council/news/2026/05/government-of-canada-to-announce-important-initiative-to-advance-canadas-photonic-semiconductor-industry.html">Government of Canada to announce important initiative to advance Canada&#8217;s photonic semiconductor industry</a></strong></p><ul><li><p>Announcement will be tonight, May 4, at 7:00 PM.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/security-intelligence-service/corporate/publications/csis-public-report-2025.html">Canadian Security Intelligence Service Public Report 2025</a></strong></p><ul><li><p>CSIS latest public report includes a section on cyber security. Despite how the report makes it sound, CSIS&#8217; role in Canada&#8217;s cyber security and defence governance is pretty limited/small.</p></li></ul></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, this section is for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section, which is 100% focused on Canada</h6><ul><li><p><strong><a href="https://www.nytimes.com/2026/04/28/opinion/cybersecurity-mythos.html?unlocked_article_code=1.eVA.xnWj.HZUXBaT11xyO&amp;smid=bs-share">Your Passwords Are Probably Screwed</a></strong></p><ul><li><p>Password managers should now be mandatory for all employees.</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/openai-really-wants-codex-to-shut-up-about-goblins/">OpenAI Really Wants Codex to Shut Up About Goblins</a></strong></p><ul><li><p>The great and powerful LLM needs to be told repeatedly to stop talking about goblins. Real transformative technology, huh?</p></li></ul></li><li><p><strong><a href="https://www.pcmag.com/news/video-platform-vimeo-hacked-by-shinyhunters-gang">Video Platform Vimeo Hacked by &#8216;ShinyHunters&#8217; Gang</a></strong></p><ul><li><p>Breached via Anodot, a business monitoring tool.</p></li></ul></li><li><p><strong><a href="https://www.utilitydive.com/news/data-center-load-disruptions-nerc-alert-recommendations/818036/">Sudden data center load losses prompt NERC alert, recommendations</a></strong></p><ul><li><p>Data centres not only require massive amounts of power but can also cause massive, unexpected reductions, which can be just as taxing on a power system.</p></li></ul></li><li><p><strong><a href="https://arstechnica.com/gadgets/2026/04/meta-cuts-contractors-who-reported-seeing-ray-ban-meta-users-have-sex/">Meta cuts contractors who reported seeing Ray-Ban Meta users have sex</a></strong></p><ul><li><p>If there&#8217;s one thing Meta can&#8217;t tolerate, it&#8217;s being exposed for its wrongdoing and for how Meta&#8217;s core business model is rationalizing unethical and legally dubious activities as perfectly legal.</p></li></ul></li><li><p><strong><a href="https://www.darkreading.com/cybersecurity-analytics/crypto-stolen-2026-north-korea">76% of All Crypto Stolen in 2026 Is Now in North Korea</a></strong></p><ul><li><p>Not a big surprise to anyone who keeps an eye on this, but the scale and success of North Korea are still startling.</p></li></ul></li><li><p><strong><a href="https://www.securityweek.com/google-adjusts-bug-bounties-chrome-payouts-drop-as-android-rewards-rise-amid-ai-surge/">Google Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI Surge</a></strong></p><ul><li><p>The surge in AI use for vulnerability discovery is beginning to have a major impact on the industry for bug bounties.</p></li></ul></li><li><p><strong><a href="https://therecord.media/linux-vulnerability-copy-fail-patch">Nearly every Linux system built since 2017 vulnerable to &#8216;Copy Fail&#8217; flaw</a></strong></p><ul><li><p>More on this in the next section, but an article for more general reading on this vulnerability.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p>CCCS released three alerts this past week:</p><ul><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-008-vulnerability-affecting-cpanel-webhost-manager-whm-cve-2026-41940">Alert - AL26-008 - Vulnerability affecting cPanel and WebHost Manager (WHM) - CVE-2026-41940</a></strong></p><ul><li><p><strong><a href="https://techcrunch.com/2026/04/30/hackers-are-actively-exploiting-a-bug-in-cpanel-used-by-millions-of-websites/">Hackers are actively exploiting a bug in cPanel, used by millions of websites</a></strong></p></li></ul></li><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-010-cyber-criminals-social-engineering-enabled-compromise-enterprise-saas-environments">Alert - AL26-010 &#8211; Cyber Criminals Social&#8209;Engineering&#8209;Enabled Compromise of Enterprise SaaS Environments</a></strong></p></li><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-009-vulnerability-affecting-linux-cve-2026-31431">Alert - AL26-009 - Vulnerability Affecting Linux - CVE-2026-31431 &#8211; Update 1</a></strong></p><ul><li><p><strong><a href="https://arstechnica.com/security/2026/04/as-the-most-severe-linux-threat-in-years-surfaces-the-world-scrambles/">The most severe Linux threat to surface in years catches the world flat-footed</a></strong></p></li></ul></li></ul></li><li><p><strong><a href="https://www.404media.co/apple-fixes-bug-that-let-fbi-extract-deleted-signal-messages-after-404-media-coverage/">Apple Fixes Bug That Let FBI Extract Deleted Signal Messages After 404 Media Coverage</a></strong></p></li><li><p><strong><a href="https://www.ic3.gov/CSA/2026/260429.pdf">Adapting Zero Trust Principles to Operational Technology</a></strong></p></li><li><p><strong><a href="https://www.cyber.gov.au/sites/default/files/2026-05/careful_adoption_of_agentic_ai_services.pdf">Careful adoption of agentic AI services</a></strong></p><ul><li><p>Released by Australian Signals Directorate, with support from Five Eyes partners including Canadian Centre for Cyber Security.</p></li></ul></li><li><p><strong><a href="https://www.ransomware.live/id/TWFudWxpZmUgV2VhbHRoQHFpbGlu">Qilin Ransomware Claims Attack on Manulife Wealth</a></strong></p><ul><li><p>No confirmation/denial from Manulife Wealth yet, but this is one to watch.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><ul><li><p><strong>Citizen Lab: <a href="https://citizenlab.ca/research/how-chinese-actors-use-impersonation-and-stolen-narratives-to-perpetuate-digital-transnational-repression/">Tall Tales - How Chinese Actors Use Impersonation and Stolen Narratives to Perpetuate Digital Transnational Repression</a></strong></p><ul><li><p>Great research from Citizen Lab as always.</p></li></ul></li><li><p><strong>Canadian Cybersecurity Network: <a href="https://canadiancybersecuritynetwork.com/cybervoices/offensive-cybersecuritys-role-in-managing-canadas-cybersecurity-risks-lessons-from-the-netherlands">Offensive Cybersecurity&#8217;s Role in Managing Canada&#8217;s Cybersecurity Risks: Lessons from the Netherlands</a></strong></p></li><li><p>Recorded Future: <strong><a href="https://www.recordedfuture.com/research/critical-minerals-and-cyber-operations">Critical Minerals and Cyber Operations</a></strong></p></li><li><p>Upcoming Meetings in Parliament:</p><ul><li><p><strong>May 4: <a href="https://sencanada.ca/en/committees/secd/noticeofmeeting/695003/45-1">Senate begins review of Bill C-8, An Act respecting cyber security</a></strong></p></li><li><p><strong>May 5: <a href="https://www.ourcommons.ca/DocumentViewer/en/45-1/SECU/meeting-36/notice">Minister of Public Safety and Justice appear before the House Public Safety and National Security committee to discuss Bill C-22, An Act respecting lawful access.</a></strong></p></li><li><p><strong>May 7: <a href="https://www.ourcommons.ca/DocumentViewer/en/45-1/SRSR/meeting-36/notice">House Science and Research Committee holds meeting on Canada&#8217;s Dual Use and Defence Research Needs</a></strong></p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://homeland.house.gov/hearing/data-centers-telecommunications-networks-and-space-based-systems-modernizing-dhss-srma-role-for-the-communications-and-it-sectors/">Data Centers, Telecommunications Networks, and Space-Based Systems: Modernizing DHS&#8217;s SRMA Role for the Communications and IT Sectors</a></strong></p><ul><li><p>The House Homeland Security Committee is holding hearings on digital infrastructure, including space-based systems.</p></li></ul></li><li><p><strong><a href="https://www.koreatimes.co.kr/southkorea/politics/20260428/korean-lawmakers-blast-us-pressure-over-coupang-probe">96 Korean lawmakers blast US for &#8216;infringing on judicial sovereignty&#8217; over Coupang probe</a></strong></p><ul><li><p>&#8220;The move follows a recent letter sent by 54 House Republican lawmakers, who claimed Korean government and law enforcement authorities&#8217; investigation into Coupang&#8217;s massive data breach case is discriminatory against the U.S.-headquartered company.&#8221;</p></li><li><p>South Korea has been showing itself to be a model democracy of late and we should all learn from them.</p></li></ul></li><li><p><strong><a href="https://therecord.media/cyber-command-nsa-chief-midterm-election-threat">Cyber Command, NSA chief warns foreign adversaries likely to target midterms</a></strong></p><ul><li><p>Because they&#8217;ll likely not receive any realistic response from the United States, or at least Russian interference will be welcomed from the current US administration.</p></li></ul></li><li><p><strong><a href="https://archive.ph/jnxQ8#selection-1249.0-1249.63">US Ends Investigation Into Claims WhatsApp Chats Aren&#8217;t Private</a></strong></p></li><li><p><strong><a href="https://therecord.media/us-china-partner-on-dubai-scam-compound-takedown">US, China partner on scam center takedown in Dubai</a></strong></p><ul><li><p>Rare partnership, but scam centers and scamming/fraud in general is beginning to hit everyone equally.</p></li></ul></li><li><p><strong><a href="https://www.justice.gov/opa/pr/two-americans-who-attacked-multiple-us-victims-using-alphv-blackcat-ransomware-sentenced">Two Americans Who Attacked Multiple U.S. Victims Using ALPHV BlackCat Ransomware Sentenced to Prison</a></strong></p></li><li><p><strong><a href="https://www.justice.gov/opa/pr/prolific-chinese-state-sponsored-contract-hacker-extradited-italy">Prolific Chinese State-Sponsored Contract Hacker Extradited from Italy</a></strong></p><ul><li><p>Hacker allegedly part of China&#8217;s Hafnium/APT40</p></li></ul></li><li><p><strong><a href="https://therecord.media/congress-punts-fisa-renewal-to-june?mkt_tok=Njc4LUZITC03MTAAAAGhgmKcs_D0XShk_CL_ho91aedmbDPIegcgRrlg7lU6y31k6TwDN-i-HV8Wos6bS_WTS353N2qqBfAkubgjCLOlqxSkMrzYViphP6gy6O9V">Congress punts FISA renewal to June</a></strong></p><ul><li><p>Back and forth between the House and Senate to get a bill to renew the Foreign intelligence Surveillance Act (a bill to surveil us Canadians and other non-Americans), </p></li></ul></li><li><p><strong><a href="https://therecord.media/senate-judiciary-advances-bill-barring-children-ai-chatbots">Senate Judiciary advances bill that would bar minors from interacting with AI companions</a></strong></p></li><li><p><strong><a href="https://cyberscoop.com/congress-industry-ponder-government-posture-for-protecting-data-centers/">Congress, industry ponder government posture for protecting data centers</a></strong></p><ul><li><p>This is something to watch. The Internet is quite resilient, but succesful strike on a data centre could have major domino effects, let alone targeting military-specific data centres. Of note, the article highlights that &#8220;Three providers account for <a href="https://www.cloudzero.com/blog/cloud-service-providers/">63 percent</a> of the [global] market share of data centers: Amazon Web Services, Microsoft Azure and Google Cloud Platform",</p></li></ul></li><li><p><strong><a href="https://www.nextgov.com/cybersecurity/2026/04/pentagon-launches-cyber-apprenticeship-program/413187/">Pentagon launches cyber apprenticeship program</a></strong></p><ul><li><p>I&#8217;m a big proponent of cybersecurity apprenticeships, but not sure how well the Pentagon will get people right now.</p></li></ul></li><li><p><strong><a href="https://www.defenseone.com/technology/2026/05/former-head-pentagons-think-tank-joins-anthropic/413256/">Former head of &#8216;Pentagon&#8217;s think tank&#8217; joins Anthropic</a></strong></p></li><li><p><strong><a href="https://www.bbc.com/news/articles/cy02gjq2987o">Pentagon says US military to be an &#8216;AI-first&#8217; fighting force</a></strong></p><ul><li><p>The lack of caution will lead to mistakes and a lack of accountability. AI will be used to avoid blame, which means errors won&#8217;t be fixed and entropy will plague the US military.</p></li></ul></li><li><p><strong><a href="https://www.databreachtoday.com/medical-device-maker-medtronic-says-its-been-hacked-a-31518">Medical Device Maker Medtronic Says It&#8217;s Been Hacked</a> (h/t <a href="https://this.weekinsecurity.com/">Zack Whittacker</a>)</strong></p><ul><li><p>&#8220;The hack on Medtronic is at least the fourth cyber incident disclosed in recent weeks involving a large U.S. based medtech manufacturer.&#8221;</p></li></ul></li><li><p><strong><a href="https://therecord.media/hackers-earning-millions-from-hijacked-cargo-fbi?mkt_tok=Njc4LUZITC03MTAAAAGhjOW5N1WhBhi3b5h1WFC9FSnMil2bPrhTho-smYYwQl9olp64hrMqoGSKHqQ_Plcp0OFTvfrJYEjKNhXMV6OX-tRfwzdMTJwZtDHqEmka">Hackers earning millions from hijacked cargo, FBI says</a></strong></p><ul><li><p>Seems like an awful coincidence that CBSA systems are down as we begin to identify hackers' role in cargo hijacking.</p></li></ul></li><li><p><strong><a href="https://www.politico.com/news/2026/04/30/white-house-ai-cyber-threats-mythos-00902045">White House presses tech companies for support on AI-driven cyberattacks</a></strong></p></li><li><p><strong><a href="https://www.tomshardware.com/software/vpn/utah-becomes-first-us-state-to-target-vpn-use-with-age-verification-law">Utah first state to hold websites liable for users who mask their location with VPNs &#8212; law goes into effect, designed to prevent bypassing age checks</a></strong></p><ul><li><p>Age verification law specifically targets the use of VPNs.</p></li></ul></li><li><p><strong><a href="https://defensescoop.com/2026/04/27/dod-technical-exchange-meeting-tem-mission-capabilities-may-2026/">DOD hosting next Technical Exchange Meeting to update industry on current threat landscape</a></strong></p><ul><li><p>Briefing for private industry of Five Eyes-Only countries.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://www.bbc.com/news/articles/c4g7v2ddvyko">MP&#8217;s website suffers &#8216;deliberate&#8217; cyber attack</a></strong></p><ul><li><p>Appears to be run-of-the-mill criminals/scammers despite some of the language used, but this easily be obfuscation.</p></li></ul></li><li><p><strong><a href="https://therecord.media/france-investigates-teen-over-national-id-agency-hack">France investigates 15-year-old over alleged hack of national ID agency</a></strong></p><ul><li><p>No matter how far we advance, we&#8217;ll always have teens at the center of major hacking incidents.</p></li></ul></li><li><p><strong><a href="https://www.trellix.com/statement/">Trellix Discloses Unauthorized Access to its Source Code</a></strong> (h/t Catalin Cimpanu)</p><ul><li><p>Major European security firm Trellix discloses that someone accessed a &#8220;portion&#8221; of its source code repository. While there is much we don&#8217;t know, getting access to source code could help threat actors find ways to compromise it. </p></li></ul></li><li><p><strong><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_920">European Commission preliminarily finds Meta in breach of Digital Services Act for failing to prevent minors under 13 from using Instagram and Facebook</a></strong></p><ul><li><p>Meta certainly loves to break the law and privacy, don&#8217;t they? It&#8217;s increasingly a struggle to understand or rationalize if we can trust them.</p></li></ul></li><li><p><strong><a href="https://therecord.media/russia-cyber-espionage-aviation">Cyber spies target Russian aviation firms to steal satellite and GPS data</a></strong></p></li><li><p><strong><a href="https://www.reuters.com/sustainability/boards-policy-regulation/eu-recommends-member-states-not-use-huwaei-zte-connectivity-infrastructure-2026-05-04/">EU recommends member states to not use Huwaei, ZTE in connectivity infrastructure</a></strong></p><ul><li><p>I honestly thought this was already recommended, but it&#8217;s easy to lose track of developments in the EU bureaucracy.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://techcrunch.com/2026/04/29/sri-lanka-discloses-another-missing-payment-days-after-hackers-stole-2-5m-from-its-finance-ministry/">Sri Lanka discloses another missing payment, days after hackers stole $2.5M from its finance ministry</a></strong></p></li><li><p><strong><a href="https://japantoday.com/category/tech/update1-japan-to-set-up-task-force-on-cyberattack-risks-from-anthropic's-mythos-ai">Japan to set up task force on cyberattack risks from Anthropic&#8217;s Mythos AI</a></strong></p></li><li><p><strong><a href="https://therecord.media/zabia-cancels-global-digital-freedoms-conference-shortly-before-start">Zambia cancels global digital freedoms conference days before start</a></strong></p><ul><li><p>Appears that China had pressured Zambia to end the conference.</p></li></ul></li><li><p><strong><a href="https://www.bloomberg.com/news/articles/2026-04-29/chinese-hackers-spied-on-cuban-embassy-as-us-prepared-blockade">Chinese Hackers Spied On Cuban Embassy As US Prepared Blockade</a></strong></p><ul><li><p>Not too surprising. Embassies have always been a top target for espionage.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Media of the Week</h3><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-020526?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 25/04/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending April 25]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426</guid><pubDate>Mon, 27 Apr 2026 14:04:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fb2a1855-f30b-4f41-aadf-7ca91686dc18_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426/comments"><span>Leave a comment</span></a></p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>. </p></li></ul></li><li><p>Microsoft invited me and other academics, privacy experts, and various business/tech/thought leaders to try to convince us they&#8217;re good at protecting Canadian digital sovereignty. I trust them less now. New paper on this soon.</p></li></ul><div><hr></div><h6 style="text-align: center;"><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://archive.ph/hAKDC#selection-3827.26-3827.132">A network of YouTube accounts is promoting U.S. annexation to Albertans, researchers say. It has 40M views</a></strong></p><ul><li><p><strong><a href="https://www.cbc.ca/news/canada/alberta-separatist-youtube-channels-netherlands-9.7174719">Dutch YouTube creators behind Alberta separatist videos getting millions of views</a></strong></p><ul><li><p>Some additional research and coverage by CBC</p></li></ul></li></ul></li><li><p><strong><a href="https://betakit.com/canadas-new-us-economic-advisory-committee-draws-backlash-from-tech-leaders/">Canada&#8217;s new US economic advisory committee draws backlash from tech leaders</a></strong></p><ul><li><p>This is not surprising. When you have Evan Solomon as your Minister for AI and Emerging Tech, it means you have a cabinet who is illinformed on emerging technology. You need those with knowledge about IP, emerging technology, data, and more. This cabinet has shown that it is illequipped to understand emerging technology and are relying heavily on the bureaucracy, which can only do so much without political leadership.</p></li></ul></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/20/news/kevin-oleary-pins-water-licence-70-billion-data-centre-project-small-alberta">Kevin O&#8217;Leary pins water licence for $70-billion data centre project on a small Alberta municipality</a></strong></p><ul><li><p>Canadian con-man continues to grift Alberta and Canada. Also, water is wet. The municipality declared an agricultural emergency in 2025, so there is a risk they will be unable to secure water rights.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/">Surveillance vendors caught abusing access to telcos to track people&#8217;s phone locations, researchers say</a></strong></p><ul><li><p>This is coverage of <a href="https://citizenlab.ca/research/uncovering-global-telecom-exploitation-by-covert-surveillance-actors/">University of Toronto&#8217;s Citizen Lab report</a>. Telcos have been abused for a long time and Canadian telcos are not immune to this.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/programs/defence-ideas/element/competitive-projects/challenges/multi-modal-ai-for-advanced-situational-decisions.html">New IDEaS Challenges: </a></strong></p><ul><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/programs/defence-ideas/element/competitive-projects/challenges/multi-modal-ai-for-advanced-situational-decisions.html">Multi-modal AI for advanced situational decisions</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/programs/defence-ideas/element/innovation-networks/challenge/cognition-and-trust-real-time-dynamic-calibration-for-human-autonomy-teams.html">Cognition and trust: Real-time dynamic calibration for human-autonomy teams</a></strong></p></li><li><p>For those unfamiliar, Innovation for Defence Excellence and Security (IDEaS)</p></li><li><p>Rather than force you into initial lower level funding as a gate to higher level funding, IDEaS is now allowing you to apply to greater levels of funding based on the TRL of the solution..</p></li></ul></li><li><p><strong><a href="https://betakit.com/cohere-to-acquire-germanys-aleph-alpha-in-sovereign-ai-play/">Cohere to acquire Germany&#8217;s Aleph Alpha in sovereign AI play</a></strong></p><ul><li><p>Major news in Canada, and likely Germany. Cohere has been a Canadian AI darling, building organization-specific tools and LLMs, of which I have generally heard positive things. And at the very least I haven&#8217;t heard anything negative. </p></li><li><p>This is being described as a merger, but Cohere is coming out with a bigger edge here and sources tell Betakit that Cohere is buying Alph Alpha, so it is not a merger at all. They are likely playing up the merger angle to keep EU and German regulators and shareholders happy. While there are obvious mercantalist concerns about the Canadian-ness or German-ness of the company as nationalism and sovereignty in commerce continue to rise, this could be a significant boon for Canada and the EU to counter the dominance of US-based AI companies. </p></li></ul></li><li><p><strong><a href="https://betakit.com/bdcs-new-500-million-loan-program-will-help-smaller-businesses-adopt-ai/">BDC&#8217;s new $500-million loan program will help smaller businesses adopt AI</a></strong></p><ul><li><p>&#8220;$500-million LIFT initiative (which stands for &#8220;Lead with Innovation and Focus on Technology&#8221;) connects SMEs with consultants who will help them figure out where AI can best be integrated into their businesses, then provides a loan to get it done.&#8221;</p></li><li><p>Sounds like a big cash grab for consultants.</p></li></ul></li><li><p><strong><a href="https://www.ctvnews.ca/canada/article/cybersecurity-incident-at-canada-life-reportedly-impacts-thousands/">Cybersecurity incident at Canada Life reportedly impacts thousands</a></strong></p><ul><li><p>As I highlighted last week, a cybersecurity incident at Canada Life is now making Canadian news.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/competition-bureau/news/2026/04/data-portability-and-interoperability-are-key-to-competition-in-the-digital-health-care-sector.html">Data portability and interoperability are key to competition in the digital health care sector</a></strong></p><ul><li><p>These are remarks by Brad Callaghan, Associate Deputy Commissioner of the Policy, Planning and Advocacy Directorate before the Senate Standing Committee on Social Affairs, Science and Technology</p></li></ul></li><li><p><strong><a href="https://www.newswire.ca/news-releases/the-canadian-centre-for-cyber-defence-launched-to-strengthen-canada-s-digital-security-posture-882122318.html">369 Global Launches The Canadian Centre for Cyber Defence to Strengthen Canada&#8217;s Digital Security Posture</a></strong></p><ul><li><p>A non-profit launched by a consulting group to function as a &#8220;cybersecurity innovation hub.&#8221; The website is full of buzzword bingo, but I remain optimistic about what they intend to accomplish if they are genuine. I&#8217;m also not a fan of them specifically taking a name so similar to the government&#8217;s Canadian Centre for Cyber Security.</p></li></ul></li><li><p><strong><a href="https://globalnews.ca/news/11813885/toronto-police-arrest-cyber-attack/">Toronto police make arrests in text-message cyberattack, 13M disruptions reported</a></strong></p><ul><li><p>I&#8217;m actually a bit surprised this is the first time. SMS blasting is a pretty low-level, easy thing to do, but it&#8217;s also pretty easy to get caught in most cases.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/news/2026/04/canadian-armed-forces-to-conduct-inaugural-active-participation-in-exercise-balikatan.html">Canadian Armed Forces to conduct inaugural active participation in Exercise BALIKATAN</a></strong></p><ul><li><p>United States- and Philippines-led exercise in which CAF Cyber Command will participate.</p></li></ul></li><li><p><strong><a href="https://halifax.citynews.ca/2026/04/24/bring-military-spy-agencies-under-federal-whistleblower-law-federal-review-report/">Bring military, spy agencies under federal whistleblower law, review report urges</a></strong></p><ul><li><p>There are certain reporting gaps, especially related to CAFCYBERCOM.</p></li></ul></li><li><p><strong><a href="https://www.justice.gc.ca/eng/csj-sjc/pl/charter-charte/c22_2.html">Bill C-22: An Act respecting lawful access - Charter Statement</a></strong></p><ul><li><p>Government releases charter statement regarding Bill C-22. They&#8217;re glossing over a lot of issues with this and many privacy experts are not happy.</p></li></ul></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/24/news/avi-lewis-ndp-surveillance-pricing">Avi Lewis is smart to shed light on surveillance pricing</a></strong></p><ul><li><p>This is an opinion article, but as I have not included anything on the surveillance pricing discussions so far, I felt this was a good introduction. </p></li></ul></li><li><p><strong><a href="https://archive.ph/1lYUC#selection-2565.0-2565.93">OpenAI&#8217;s Altman &#8216;deeply sorry&#8217; company didn&#8217;t flag Tumbler Ridge shooter&#8217;s messages to police</a></strong></p><ul><li><p>Wrote in a letter, which feels very disingenuine. </p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/saskatchewan/bell-ai-data-centre-sask-analysis-9.7173697">Checking out the political optics of Bell&#8217;s AI data centre near Regina</a></strong></p><ul><li><p>The project has a lot of political support, but the community support appears unclear.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/manitoba/manitoba-social-media-age-restrictions-9.7177470">Manitoba to ban social media, AI chatbots for youth, premier says</a></strong></p><ul><li><p>All actors involved are trying to pass the buck on actually managing such bans that inadequate systems are put in place and the average person will lose their privacy.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/04/government-of-canada-invests-238-million-to-help-youth-build-the-skills-necessary-for-the-evolving-digital-economy.html">Government of Canada invests $23.8 million to help youth build the skills necessary for the evolving digital economy</a></strong></p><ul><li><p>A few similar programs have ended in the last few years, so it is good there is new funding.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/prairies-economic-development/news/2026/04/government-of-canada-investing-in-winnipeg-industry-to-strengthen-canadas-defence-capacity.html">Government of Canada investing in Winnipeg industry to strengthen Canada&#8217;s defence capacity</a></strong></p><ul><li><p>Part of this funding goes to StandardAero, which is &#8220;[integrating] advanced digital technologies.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/prairies-economic-development/news/2026/04/government-of-canada-strengthening-our-economy-and-military-readiness-through-new-defence-investments-in-saskatchewan.html">Government of Canada strengthening our economy and military readiness through new defence investments in Saskatchewan</a></strong></p><ul><li><p>Includes funding for Saskatchewan Polytechnic&#8217;s Digital Integration Centre of Excellence.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/fednor/news/2026/04/government-of-canada-invests-976650-to-help-more-northern-ontario-business-diversify-and-expand-into-the-defence-sector.html">Government of Canada invests $976,650 to help more Northern Ontario business diversify and expand into the defence sector</a></strong></p><ul><li><p>Looks like at least some of this is going towards cybersecurity.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/northern-economic-development/news/2026/04/backgrounder-cannor-invests-in-projects-to-strengthen-nunavuts-economy-infrastructure-and-arctic-security.html">Backgrounder: CanNor invests in projects to strengthen Nunavut&#8217;s economy, infrastructure and Arctic security</a></strong></p><ul><li><p>Some of the funding is going to support the <a href="https://www.cbc.ca/news/canada/manitoba/kivalliq-hydro-fibre-link-nunavut-9.6931778">Kivalliq Hydro-Fibre Link</a>.</p></li></ul></li><li><p><strong><a href="https://www.securityweek.com/locked-shields-2026-41-nations-strengthen-cyber-resilience-in-worlds-biggest-exercise/">Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World&#8217;s Biggest Exercise</a></strong></p><ul><li><p>Canada participated in NATO cyber exercise Locked Shields.</p></li></ul></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, this section is for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section, which is 100% focused on Canada</h6><ul><li><p><strong><a href="https://therecord.media/cloud-platform-vercel-says-company-breached-through-ai-tool">Cloud platform Vercel says company breached through third-party AI tool</a></strong></p><ul><li><p>An employee&#8217;s use of compromised context.ai that allowed the threat actor to access Vercel via the employee&#8217;s google workspace account. This appears to be significant enough to warrant inclusion in this section.</p></li></ul></li><li><p><strong><a href="https://www.theverge.com/policy/915237/palantir-manifesto">We translated the Palantir manifesto for actual human beings</a></strong></p><ul><li><p>A good breakdown of Palantir&#8217;s fascist manifesto. Palantir operates in Canada, and Canadians should be careful.</p></li></ul></li><li><p><strong><a href="https://www.thatprivacyguy.com/blog/anthropic-spyware/">Anthropic secretly installs spyware when you install Claude Desktop</a></strong></p></li><li><p><strong><a href="https://washingtonmonthly.com/2026/04/20/how-amazons-ai-algorithms-raise-the-prices-you-pay/">How Amazon&#8217;s AI Algorithms Raise the Prices You Pay</a></strong> </p></li><li><p><strong><a href="https://femtechdesigndesk.substack.com/p/your-period-tracking-app-has-been">Your period tracking app has been yapping about your flow to Meta</a></strong></p><ul><li><p>The sharing of women&#8217;s health data via apps like this has been going on for years now, so this is an evolution of it to show how major corporations are involved in accessing and hoarding your data.</p></li></ul></li><li><p><strong><a href="https://archive.ph/CzQMS#selection-1035.0-1035.98">Exclusive: SpaceX says unproven AI space data centers may not be commercially viable, filing shows</a></strong></p><ul><li><p>Anyone with a cursory understanding could tell you this. Stop listening to these people who are just perpetually scamming everyone.</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/new-gas-powered-data-centers-could-emit-more-greenhouse-gases-than-entire-nations/">New Gas-Powered Data Centers Could Emit More Greenhouse Gases Than Entire Nations</a></strong></p><ul><li><p>All the work that went into power efficiencies in data centres is going out the window.</p></li></ul></li><li><p><strong><a href="https://archive.ph/sa3CG#selection-703.0-703.52">Meta Is Sued Over Scam Ads on Facebook and Instagram</a></strong></p><ul><li><p>Canadians should pay attention to this. It is unclear if Canadians have also been targeted for this from the article itself, but Canadians are often also exposed to the same scams as Americans and could potentially make Meta liable in Canada.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al25-012-vulnerabilities-impacting-cisco-asa-ftd-devices-cve-2025-20333-cve-2025-20362-cve-2025-20363">Alert - AL25-012 - Vulnerabilities impacting Cisco ASA and FTD devices &#8211; CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363 &#8211; Update 1</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://www.greynoise.io/blog/the-internet-changes-before-the-advisory-drops">The Internet Changes Before the Advisory Drops</a> (h/t Catalin Cimpanu)</strong></p><ul><li><p>Mass-interenet scanning activity now often precedes vulnerability disclosures. This is not a big surprise, but some great data to confirm these indicators.</p></li></ul></li><li><p><strong><a href="https://www.microsoft.com/en-us/security/blog/2026/04/21/detection-strategies-cloud-identities-against-infiltrating-it-workers/">Detection strategies across cloud and identities against infiltrating IT workers</a></strong></p><ul><li><p>These days we instantly think North Korea, but </p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><ul><li><p><strong><a href="https://www.wired.com/story/fast16-malware-stuxnet-precursor-iran-nuclear-attack/">Newly Deciphered Sabotage Malware May Have Targeted Iran&#8217;s Nuclear Program&#8212;and Predates Stuxnet</a></strong></p><ul><li><p>For cyber conflict historians and analysts this is major news. Gives some additional insight into early/mid-2000s doctrinal and behavioural dynamics of US cyber operations.</p></li><li><p><strong><a href="https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/">Full write up here by SentinelLabs</a></strong></p></li></ul></li><li><p><strong>Op-ed: <a href="https://www.newstatesman.com/comment/2026/04/we-cant-trust-palantir-with-our-nhs-data">We can&#8217;t trust Palantir with our NHS data</a></strong></p><ul><li><p>Palantir just said it doesn&#8217;t want democracy, so can they be trusted in a democracy?</p></li></ul></li><li><p><strong><a href="https://citizenlab.ca/research/uncovering-global-telecom-exploitation-by-covert-surveillance-actors/">Citizen Lab Research: Bad Connection: Uncovering Global Telecom Exploitation by Covert Surveillance Actors</a></strong></p></li><li><p><strong><a href="https://www.chipsnorth.com/">Event, May 4-5 Ottawa: Chips North Executive Summit</a></strong></p><ul><li><p>&#8220;Designed as a working summit, CHIPS NORTH is built for alignment on priorities, candid examination of trade-offs, and informed decision-making on the issues shaping the semiconductor sector. The 2026 program brings together strategic plenary sessions and focused, action-oriented discussions to move conversations toward real-world outcomes beyond the event itself.&#8221;</p></li></ul></li><li><p>Video: <strong><a href="https://cybersecurecatalyst.ca/defence-procurement-101-webinar/?submissionGuid=41124f2a-a911-45c7-a41c-48cbeb405911">Canadian Defence Procurement 101</a></strong></p><ul><li><p>Roger Cybersecure Catalyst held a Defence Procurement 101 session with Caleb Walker from 123 Cyber and Randy Purse, one of the Catalyst&#8217;s senior traners. This has a focus on helping SMEs, particularly cyber or cyber-adjacent, to participate in defence procurement.</p></li></ul></li><li><p><strong><a href="https://warontherocks.com/seeing-the-cyber-in-economic-statecraft/">Seeing the Cyber in Economic Statecraft</a></strong></p><ul><li><p>By Jason Blessing, who does great research and whose PhD research influenced mine. A state&#8217;s ability to engage in cyber statecraft and cyber defence requires an industry which can support it.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://www.nextgov.com/cybersecurity/2026/04/former-fbi-official-proposes-terror-designations-ransomware-hackers-targeting-hospitals/413002/">Former FBI official proposes terror designations for ransomware hackers targeting hospitals</a></strong></p></li><li><p><strong><a href="https://www.axios.com/2026/04/21/cisa-anthropic-mythos-ai-security">Scoop: CISA lacks access to Anthropic&#8217;s Mythos</a></strong></p></li><li><p><strong><a href="https://www.nextgov.com/cybersecurity/2026/04/cyber-command-carried-out-over-8000-missions-2025-director-says/413035/?">Cyber Command carried out over 8,000 missions in 2025, director says</a></strong></p><ul><li><p>This is a 25% increase. </p></li></ul></li><li><p><strong><a href="https://cyberscoop.com/cisa-director-pick-sean-plankey-withdraws-his-nomination/">CISA director pick Sean Plankey withdraws his nomination</a></strong></p><ul><li><p>Of all the nominations to oppose and stall, this is the one? CISA is an absolute and complete mess and has lost most of its talent and is barely functional from what I hear.</p></li></ul></li><li><p><strong><a href="https://arstechnica.com/space/2026/04/us-space-command-russia-is-now-operationalizing-co-orbital-asat-weapons/">US Space Command: Russia is now operationalizing co-orbital ASAT weapons</a></strong></p></li><li><p><strong><a href="https://knightcolumbia.org/content/knight-institute-says-state-department-memo-confirms-unbounded-scope-of-trump-immigration-policy">US State Department Cancels Visas and Green Cards of Researchers who study Social Media Platforms and Tech Regulators</a></strong></p></li><li><p><strong><a href="https://www.justice.gov/opa/pr/florida-man-working-ransomware-negotiator-pleads-guilty-conspiracy-deploy-ransomware-and">Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victims</a></strong></p><ul><li><p>There are increasing amount of negotiators being linked to criminals. Or at least more are being identified.</p></li></ul></li><li><p><strong><a href="https://futurism.com/artificial-intelligence/national-today-ai-plagiarizing">A Prominent PR Firm Is Running a Fake News Site That&#8217;s Plagiarizing Original Journalism at Incredible Scale</a></strong></p><ul><li><p>This has been occurring for a couple years now, but the fact that major corporations and PR firms are actively trying to degrade our information environment should be a major cause for concern and lawsuits.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/20/anthropic-takes-5b-from-amazon-and-pledges-100b-in-cloud-spending-in-return/">Anthropic takes $5B from Amazon and pledges $100B in cloud spending in return</a></strong></p><ul><li><p>Tech ouroboros.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/24/google-to-invest-up-to-40b-in-anthropic-in-cash-and-compute/">Google to invest up to $40B in Anthropic in cash and compute</a></strong></p><ul><li><p>Tech ouroboros.</p></li></ul></li><li><p><strong><a href="https://www.reuters.com/sustainability/boards-policy-regulation/meta-start-capturing-employee-mouse-movements-keystrokes-ai-training-data-2026-04-21/">Exclusive: Meta to start capturing employee mouse movements, keystrokes for AI training data</a></strong></p><ul><li><p>Meta continues to show how depraved it is.</p></li></ul></li><li><p><strong><a href="https://therecord.media/pentagon-grapples-with-securing-ai-as-it-moves-towards-autonomous-warfare">Pentagon grapples with securing AI as it moves toward autonomous warfare</a></strong></p><ul><li><p>Drones and AI are one massive attack vector if not handled correctly.</p></li></ul></li><li><p><strong><a href="https://mashable.com/article/fcc-wifi-router-ban-hotspot-expanded">FCC expands WiFi router ban. What it means for you.</a></strong></p><ul><li><p>US shakedown of router makers continues.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://www.politico.eu/article/u-k-intelligence-100-nations-have-spyware-that-can-hack-britain/">UK intelligence: 100 nations have spyware that can hack Britain</a></strong></p><ul><li><p>This is the first source to comment on the scale of the issue that could likely be accurate. Researchers have known for a while this is a growing problem, but the scale has not been fully known.</p></li></ul></li><li><p><strong><a href="https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/investigation-into-the-provider-of-telegram-and-its-compliance-with-duties-to-protect-users-from-illegal-content-under-the-online-safety-act-2023">Investigation into the provider of Telegram and its compliance with duties to protect users from illegal content under the Online Safety Act 2023</a></strong></p><ul><li><p>Investigation into Telegram for allegedly hosting CSAM materials.</p></li></ul></li><li><p><strong><a href="https://www.scmp.com/news/china/diplomacy/article/3350763/china-threatens-eu-firms-over-cybersecurity-plans-targeting-chinese-companies">China threatens EU firms over cybersecurity plans targeting Chinese companies</a></strong></p><ul><li><p>Country who legally requires all zero-days to be reported to the government have issues with countries not trusting their cybersecurity firms. China would be taken more seriously if it just acknowledged why people don&#8217;t trust them or its companies.</p></li></ul></li><li><p><strong><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_833">Commission awards &#8364;180 million tender for sovereign cloud to four European providers</a></strong></p><ul><li><p>Canada is watching what Europe does very closely. I would say the EU&#8217;s cloud capacity is better than Canada&#8217;s, but there is significant potential in Canada. </p></li></ul></li><li><p><strong><a href="https://therecord.media/UK-cyberattacks-ncsc-china">UK cyber agency handling four major incidents a week as nation-state attacks surge</a></strong></p><ul><li><p>This is pretty signficant.</p></li></ul></li><li><p><strong><a href="https://www.ncsc.gov.uk/news/world-first-ncsc-engineered-device-secures-vulnerable-display-links">World-first NCSC-engineered device secures vulnerable display links</a></strong></p><ul><li><p>Cool new plug-and-play device that sits between a monitor and computer and protects from malicious connections. </p></li></ul></li><li><p><strong><a href="https://therecord.media/china-cyber-capabilities-match-us-dutch-intel-says">China&#8217;s cyber capabilities now equal to the US, warns Dutch intelligence</a></strong></p><ul><li><p>After completing my dissertation chapter on China last year I would argue that China&#8217;s capabilities likely surpass the United States. It all matters on how you measure cyber capabilities, and Dutch intelligence&#8217;s assessment is a cautious one.</p></li></ul></li><li><p><strong><a href="https://united24media.com/latest-news/ukraines-cyber-division-infiltrates-russian-military-satellite-comms-gonets-in-multi-year-breach-18099">Ukraine&#8217;s Cyber Division Infiltrates Russian Military Satellite Comms &#8220;Gonets&#8221; in Multi-Year Breach</a></strong></p></li><li><p><strong><a href="https://www.politico.eu/article/hackers-attack-phone-of-german-parliament-president-julia-klockner/">President of German parliament hit by Signal hack, report says</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/04/22/france-confirms-data-breach-at-government-agency-that-manages-citizens-ids/">France confirms data breach at government agency that manages citizens&#8217; IDs</a></strong></p><ul><li><p>&#8220;data stolen in the breach could include full names, dates and places of birth, mailing and email addresses, and phone numbers on an undisclosed number of citizens.&#8221;</p></li></ul></li><li><p><strong><a href="https://therecord.media/italian-regulator-fines-postal-service-orgs-15-million-privacy">Italian regulator fines national postal service orgs $15 million for data privacy violations</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/04/24/another-spyware-maker-caught-distributing-fake-android-snooping-apps/">Another spyware maker caught distributing fake Android snooping apps</a></strong></p><ul><li><p>This time an Italian spyware maker.</p></li></ul></li><li><p><strong>(Google Translated) <a href="https://www.lemonde.fr/pixels/article/2026/04/23/un-hackeur-mis-en-examen-et-ecroue-apres-plusieurs-cyberattaques-visant-notamment-des-federations-sportives_6682831_4408996.html">A hacker, nicknamed &#8220;HexDex,&#8221; has been charged and imprisoned after several cyberattacks targeting, among others, sports federations.</a></strong></p><ul><li><p>Individual responsible for a string of cyber attacks in 2025 was arrested.</p></li></ul></li><li><p><strong><a href="https://www.theregister.com/2026/04/22/high_court_gives_thumbs_up">Scotland Yard can keep using live facial recognition on people in London, say judges</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://www.newswire.lk/2026/04/22/sri-lanka-finance-ministry-confirms-cyber-hackers-stole-funds/">Sri Lanka Finance Ministry confirms cyber hackers stole funds</a> (H/t Catalin Cimpanu)</strong></p><ul><li><p>Threat actors stole $2.5 USD that was diverted during a foreign debt repayment.</p></li></ul></li><li><p><strong><a href="https://therecord.media/hackers-venezuela-wiper-malware-oil">Hackers deployed wiper malware in destructive attacks on Venezuela&#8217;s energy sector</a></strong></p><ul><li><p>Criminal groups generally don&#8217;t use wiper malware. This is usually the action of a state/APT.</p></li></ul></li><li><p>(Iranian Source) <strong><a href="https://www.entekhab.ir/fa/news/917640/%D9%81%D8%A7%D8%B1%D8%B3-%D8%B7%DB%8C-%D8%A7%D8%AA%D9%81%D8%A7%D9%82%DB%8C-%D8%B9%D8%AC%DB%8C%D8%A8-%D9%88-%D9%87%D8%B4%D8%AF%D8%A7%D8%B1-%D8%AF%D9%87%D9%86%D8%AF%D9%87-%D8%AC%D8%B9%D8%A8%D9%87%E2%80%8C%D9%87%D8%A7%DB%8C-%D8%B3%DB%8C%D8%A7%D9%87-%D8%A2%D9%85%D8%B1%DB%8C%DA%A9%D8%A7%DB%8C%DB%8C-%D8%AF%D8%B1-%D8%B3%D8%A7%D8%B9%D8%AA-%D8%B5%D9%81%D8%B1-%D8%AD%D9%85%D9%84%D9%87-%D8%A8%D9%87-%D8%A7%D8%B5%D9%81%D9%87%D8%A7%D9%86-%D8%A7%D8%B2-%DA%A9%D8%A7%D8%B1-%D8%A7%D9%81%D8%AA%D8%A7%D8%AF%D9%86%D8%AF-%D8%A7%DB%8C%D9%86-%D8%A7%D8%AE%D8%AA%D9%84%D8%A7%D9%84-%D8%AF%D8%B1-%D8%B4%D8%B1%D8%A7%DB%8C%D8%B7%DB%8C-%D8%B1%D8%AE-%D8%AF%D8%A7%D8%AF-%DA%A9%D9%87-%DA%AF%DB%8C%D8%AA%E2%80%8C%D9%88%DB%8C%E2%80%8C%D9%87%D8%A7%DB%8C-%D8%A8%DB%8C%D9%86%E2%80%8C%D8%A7%D9%84%D9%85%D9%84%D9%84-%D8%B9%D9%85%D9%84%D8%A7%D9%8B-%D9%85%D8%B3%D8%AF%D9%88%D8%AF-%D8%A8%D9%88%D8%AF%D9%86%D8%AF-%D8%A8%D9%86%D8%A7%D8%A8%D8%B1%D8%A7%DB%8C%D9%86-%D9%81%D8%B1%D9%88%D9%BE%D8%A7%D8%B4%DB%8C-%D9%85%D8%B0%DA%A9%D9%88%D8%B1-%D9%86%D8%B4%D8%A7%D9%86-%D8%A7%D8%B2-%DB%8C%DA%A9-%D8%AE%D8%B1%D8%A7%D8%A8%DA%A9%D8%A7%D8%B1%DB%8C-%D8%B9%D9%85%DB%8C%D9%82-%D8%AF%D8%A7%D8%B1%D8%AF-%D8%B3%D9%86%D8%A7%D8%B1%DB%8C%D9%88%DB%8C-%D8%AE%D8%B7%D8%B1%D9%86%D8%A7%DA%A9-%D8%AF%D8%B3%D8%AA%DA%A9%D8%A7%D8%B1%DB%8C-%D8%AF%D8%B1-%D9%85%D8%A8%D8%AF%D8%A3-%D8%AA%D9%88%D9%84%DB%8C%D8%AF-%D8%A7%D8%B3%D8%AA-%D8%A7%DA%AF%D8%B1-%D9%81%D8%A7%DB%8C%D9%84%E2%80%8C%D9%87%D8%A7%DB%8C-%D9%86%D8%B5%D8%A8%DB%8C-%D9%82%D8%A8%D9%84-%D8%A7%D8%B2-%D9%88%D8%B1%D9%88%D8%AF-%D8%A8%D9%87-%D8%A7%DB%8C%D8%B1%D8%A7%D9%86-%D8%A2%D9%84%D9%88%D8%AF%D9%87-%D8%B4%D8%AF%D9%87-%D8%A8%D8%A7%D8%B4%D9%86%D8%AF-%D8%AD%D8%AA%DB%8C-%D8%AA%D8%B9%D9%88%DB%8C%D8%B6-%D8%B3%DB%8C%D8%B3%D8%AA%D9%85-%D8%B9%D8%A7%D9%85%D9%84-%D9%87%D9%85-%D9%85%D8%B4%DA%A9%D9%84-%D8%B1%D8%A7-%D8%AD%D9%84-%D9%86%D9%85%DB%8C%E2%80%8C%DA%A9%D9%86%D8%AF">Networking equipment mysteriously malfunctioned at Iranian nuclear site before US/Israeli Strikes</a></strong> (H/t Risky Business)</p><ul><li><p>Not a big surprise if true. Iran is one of the most targeted countries for cyber operations by Israel and the United States.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Media of the Week</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Spqj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Spqj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 424w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 848w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 1272w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Spqj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp" width="677" height="865" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:865,&quot;width&quot;:677,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Spqj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 424w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 848w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 1272w, https://substackcdn.com/image/fetch/$s_!Spqj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa9c2df3-f0cf-4e10-b408-c4a7464eb464_677x865.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-250426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Program for Cyber Security Certification (CPCSC): Evaluation Findings Explained]]></title><description><![CDATA[What can the evaluation tell us about the initial roll out of the CPCSC?]]></description><link>https://www.cyberincontext.ca/p/canadian-program-for-cyber-security-bb9</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-program-for-cyber-security-bb9</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Tue, 21 Apr 2026 10:01:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5a6ab90d-ed50-4b03-a8a9-d62f6dd83ecd_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><strong>Canadian Cyber in Context is sponsored by</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.123cyber.ca/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png" width="442" height="170.30357142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:561,&quot;width&quot;:1456,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:26108,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.123cyber.ca/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">123 Cyber Inc.</figcaption></figure></div><h6><strong>All views expressed belong to Canadian Cyber in Context and do not reflect the position of any sponsor.</strong></h6><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><p>In 2025, Public Services and Procurement Canada (PSPC) conducted an evaluation of the Canadian Program for Cyber Security Certification (CPCSC). Luckily for us, the <a href="https://www.canada.ca/en/public-services-procurement/corporate/transparency/evaluation-report/2025-2026/evaluation-cyber-security-certification.html">full report and management action plan</a> were released to the public early this year.</p><p>The evaluation covered the period from April 2023 to June 2025, which includes the soft launch in early 2025. This means this only covers the initial preparation and phase 1 of implementation for CPCSC, and roughly a year of CPCSC activity is not covered by this report. Despite this gap, we get some interesting insights into program&#8217;s organization and the delays that occurred during this time. In particular, the report confirms much of what has been unspoken about CPCSC and the program's direction since January 2025.</p><p>Although this evaluation focuses on a period approximately a year ago, note that it was conducted specifically to improve the program, and a management action plan was developed in response. As a result, we can use the report and the management action plan to understand the CPCSC's current operations and direction.</p><p>With that said, the CPCSC Secretariat officially released CPCSC level 1, including the <a href="https://cyberpostureassessments.ops.cyber.gc.ca/Interview/9792cec1-383e-405a-abe5-4cbd3bb4de29">level 1 self-assessment tool</a> and <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada/meet-level1-certification-requirements/scoping-guide.html">scoping guide</a>. As much as this evaluation can inform us about the program itself and how it is developing, the program itself is continuing and making progress. Despite this major progress and milestones, the program still needs ongoing industry and stakeholder feedback on its activities, as this evaluation found. </p><p><a href="https://www.linkedin.com/in/altechguy/">Andrew Laliberte</a> and I are underway with reviewing the new materials and hope to have a lot more out soon about CPCSC level 1, so make sure you are subscribed. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-program-for-cyber-security-bb9?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-program-for-cyber-security-bb9?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>What is the Evaluation?</h3><p>PSPC&#8217;s Departmental Evaluation Plan for 2024-2025 to 2026-2030 included a mandatory evaluation of CPCSC, which was conducted by the Evaluation Services Directorate between April and June 2025. The evaluation focused on <em>&#8220;assessing stakeholder engagement and its contribution to CPSCC implementation, the extent to which risk management practices have been employed, as well as the prioritization of activities and available resources.&#8221;</em><strong> </strong>To assess these variables, the evaluators reviewed documents, conducted interviews and surveys.</p><p>As noted, the evaluation was conducted to improve the program, in particular, to ensure that the CPCSC program, as it is being rolled out, is in line with the priorities of the Government of Canada, to assess PSPC&#8217;s support of the program, and the inclusion/role of other departments in the implementation of the CPCSC.</p><p>In response to the report, PSPC developed a Management Action Plan, which will be reviewed at the end of this article.</p><div><hr></div><h3>Key Findings</h3><p>The key findings of the evaluation are divided into three categories: relevance, effectiveness, and delivery.</p><h4>Issue 1: Relevance</h4><p>Relevance generally asks,&#8221; Why do we even need the CPCSC?&#8221; The answer is simple: Canada needs a mechanism to ensure the security of sensitive government data in non-government systems. CPCSC has been developed to fill this gap. </p><p>Although reciprocity with the United States&#8217; Cybersecurity Maturity Model Certification (CMMC) was one of the primary motivations for creating the CPCSC, the CPCSC remains relevant and necessary regardless of alignment with other programs. Nevertheless, as will be discussed more later, the lack of reciprocation with CMMC had a major impact on the program.</p><p>One key question that was asked, and continues to be asked, is why CPCSC was not integrated into PSPC&#8217;s existing programs, such as Contract Security Program (CSP) and Controlled Goods Program (CGP). The report explains that CPCSC, CSP, and CGP all require specific compliance and assurances that, while complementary, address different areas that are governed by different policies and authorities. In particular, CSP is managed under the <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=16578">Policy on Government Security </a>and CGP is governed by the <a href="https://laws-lois.justice.gc.ca/eng/acts/d-1/">Defence Production Act</a> and <a href="https://laws-lois.justice.gc.ca/eng/regulations/SOR-2001-32/">Controlled Goods Regulations</a>. CPCSC is managed under the <a href="https://www.tbs-sct.canada.ca/pol/doc-eng.aspx?id=16578">Policy on Government Security</a> and is defined by the&nbsp;<a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">ITSP 10.171</a>&nbsp;and ITSP 10.172 standards (10.172 not yet released).</p><h4>Issue 2: Effectiveness</h4><p>As CPCSC is still an in development program, effectiveness predominantly deals with the program&#8217;s ability to deliver the program based on its own timeline and goals. Unfortunately, the report obfuscates the actual effectiveness of the program delivery by putting it into the context of the entire program versus the completion status of deliverables during the period examined. As a result </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BnJO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BnJO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 424w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 848w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 1272w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BnJO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png" width="1157" height="142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:142,&quot;width&quot;:1157,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:31362,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/192012565?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BnJO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 424w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 848w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 1272w, https://substackcdn.com/image/fetch/$s_!BnJO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F231d4fcf-7ea2-4e77-aa1f-f3ecd202b2d9_1157x142.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The report explicitly states that the CPCSC implementation was slower than anticipated due to &#8220;factors such as the need to redevelop it with a Canada-only focus in early 2025.&#8221; In other words, Canada did not anticipate the United States' refusal to agree to reciprocity and thus had to switch to a Canada-only approach. What I find curious is that the phrasing makes it sound like there was a completely different plan and design for the program, and that they had to make modifications to launch it in March 2025 rather than January 2025. This begs the question as to what was so different to require changes, or was this a reassessment of the overall plan about CPCSC. Despite this lack of reciprocation, CPCSC is still based on CMMC and the ITSP 10.171 standard that is used in CPCSC is based on CMMC&#8217;s NIST 800-171. Further, the recently released self-assessement tool is based heavily on United States tools and wording. So there appears to be very little change.</p><p>Although the report states the delays are a result of a lack of reciprocity, a more kind interpretation would likely be that, after the initial delay, the delays have had a domino effect. These delays have been compounded by additional, more recent delays in CPCSC implementation that were not covered in the evaluation. All of this is understandable, and perhaps their timeline was optimistic in the first place, but what has increasingly frustrated industry and stakeholders is the CPCSC secretariat's lack of communication, which quietly updates its website with new dates and timelines.</p><p>While the program ultimately continues to roll out with occasional delays, the lack of communication about these delays and the resulting frustration are not captured by this report. However, as will be shown, we at least have an answer for this lack of communication.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h4>Issue 3: Delivery</h4><p>Issue 3 predominantly deals with the governance and overall organization of CPCSC program and its secretariat to implement the program. In other words, less to do with the work of implementing the CPCSC and more to do with the work of the government implementing the CPCSC program. Overall, the CPCSC secretariat reported satisfaction with PSPC's support, but there was a need to clarify roles and responsibilities in administering the CPCSC. </p><p>Despite this, the report greatly overstates the organization and governance of the CPCSC and makes it sound like they have more resources and support than they have. The report states that the CPCSC is supported by clearly defined governance that includes The ADM Cyber Security Commtitee, Director General committees, and the Tiger Team. The Tiger Team Working Group is the group actually responsible for developing and implementing the CPCSC. So while the ADM Cyber Security Committee and Director Generals do technically have oversight and manages the Tiger Team, this is like saying Cabinet oversaw the creation of the Defence Industrial Strategy. While technically correct, the actual writing and work is done by a smaller team that reports up.</p><p>The precise composition of the The Tiger Team Working Group, also known as the CPCSC Secretariat, is unclear, but it is primarily composed of and led by members of PSPC&#8217;s Defence and Marine Procurement Branch and the Departmental Oversight Branch as the designers, implementers, and technical authority for the CPCSC. They are then supported by an inter-departmental group from DND, Treasury Board Secretariat, Communications Security Establishment/Canadian Centre for Cyber Security.  The Standards Council of Canada is mentioned among partners, but as a Crown corporation, it is likely more of a partner than an active participant on the Tiger Team. This small, multi-departmental team is what has allowed them to stand up the program without running into mandate issues and ensure everyone is involved without being enormously slow.</p><p>One of the biggest complaints I have heard related to CPCSC thus far is about understanding its role in broader government cybersecurity compliance, such as the role of Canadian cloud profiles and CPCSC/ITSP 10.171. The reason that there has yet to be any adequate reconcilitation is stated plainly in the report:</p><p>&#8220;Several interviewees recognized the CSE-CCCS as the primary source of cybersecurity technical expertise for CPCSC and noted their limited involvement to date, citing a lack of funding and capacity as a barrier.&#8221;</p><p>CPCSC essentially rely upon CSE/CCCS for technical expertise related to the standard, but their capacity to deal with anything other than the standard are significantly limited or non-existent. As much as the Tiger Team organization has allowed them significant leeway to develop the CPCSC, there are limitations as it relates to the implementation of the program. The report notes insufficient technical cybersecurity expertise within CPCSC stakeholder departments, leading to reliance on technical authorities and experts such as CSE/CCCS. </p><p>These existing gaps were identified as risks to the ongoing implementation of CPCSC and could lead to further delays in the program.</p><p>This is closely related to the CPCSC's risk management. The report notes that the Secretariat undertook significant efforts to identify risks and included multiple stakeholders in this process, but there was minimal activity to address the identified risks, other than to help inform the planning and implementation of the CPCSC. Despite this, some interviewed noted that some risks were not fully addressed, which include:</p><ul><li><p>SMEs are struggling with the financial and technical demands of CPCSC</p></li><li><p>Lack of reciprocity</p></li><li><p>Insufficient personnel, project management, and technical cybersecurity expertise in CPCSC stakeholder departments</p></li><li><p>Inconsistent stakeholder priorities, coordination, and engagement</p></li><li><p>Unclear plans to transfer CPCSC management following implementation.</p></li></ul><p>Take note that all of these risks have still not been adequately addressed. While some issues may not be fully addressable, such as the lack of reciprocity, CPCSC has found a middle ground by allowing CMMC to apply to CPCSC on a case-by-case basis. </p><p>The management action plan includes details related to the development of CPCSC risk management tools after the evaluation was completed, but these tools do not neccesarily address the full breadth of risks noted above.</p><div><hr></div><h3>Long Term Program Governance and the CPCSC</h3><p><a href="https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin">What CPCSC is and where to start</a> have already been covered in detail, but this report does a good job of showing how many different departments and teams are involved. Here is a breakdown of the overall structure of those involved, including those outside of the program (<a href="https://www.linkedin.com/in/altechguy/">Thanks to Andrew Laliberte</a>):</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;1bba1be5-de24-4d0e-8f36-563b0bd7bd09&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">DM Committees (Defence Procurement Strategy)

&#9492;&#9472;&#9472; ADM Committees (GC Cyber Security Oversight)

    &#9492;&#9472;&#9472; DG Cyber Security Certification Steering Committee

        &#9492;&#9472;&#9472; PSPC &#8211; DMPB (Program Lead)

            &#9492;&#9472;&#9472; CPCSC Secretariat

                &#9500;&#9472;&#9472; DOB (Technical Authority / Business Owner)

                &#9500;&#9472;&#9472; Procurement Branch (Data Systems)

                &#9500;&#9472;&#9472; Tiger Team Working Group

                &#9474;   &#9500;&#9472;&#9472; PSPC (DMPB + DOB)

                &#9474;   &#9500;&#9472;&#9472; DND (Client / Assessments)

                &#9474;   &#9500;&#9472;&#9472; TBS (Policy)

                &#9474;   &#9500;&#9472;&#9472; CSE / CCCS (Technical Authority)

                &#9474;   &#9492;&#9472;&#9472; SCC (Accreditation)

                &#9492;&#9472;&#9472; External Ecosystem

                    &#9500;&#9472;&#9472; Industry (Suppliers)

                    &#9500;&#9472;&#9472; Third-Party Assessors

                    &#9492;&#9472;&#9472; Cyber / IT Providers</code></pre></div><p>Before CPCSC and informed folk yell at me, I know this does not fully/accurately reflect how the Tiger Team is organized, but it is a rough breakdown of the overall organization and stakeholders involved. it is meant to show just how many people are involved in this. As much as we would like to complain about a lack of communication or about how CPCSC is developing or being delayed, they&#8217;re essentially doing a giant juggling act among the different mandates of the organizations involved in this process. </p><p>The report is very explicit that a lack of personnel, project management, and cybersecurity knowledge is affecting implementation. The Tiger Team organization gives them a lot of flexibility, but may not have the capacity to accomplish everything to ensure that the program&#8217;s successful implementation. This should be a major concern for the government, military, and defence industry, as this is essentially saying CPCSC does not have the resources it needs.</p><div><hr></div><h3>Costs</h3><p>One particular passage really stood out to me that I want to unpack:</p><p>&#8220;The evaluation also found that cost to industry is a major concern for all cyber security programs reviewed. In the case of Canada, CPCSC Secretariat-led industry engagements in May 2024, reported 46% of sub-contractors expecting to invest less than $50,000, while 29% of consultants projected costs of $150,000 to 175,000. 68% of respondents want comprehensive support: financial assistance, guidance, and resources in order to prepare for CPCSC assessment.&#8221;</p><p>When PSPC conducted the evaluation, this data was already approximately a year old. At this point, it is one month shy of being two years old and is likely inaccurate.</p><p>This data is from May 2024, long before ITSP 10.171 was released. Although we generally knew it would be based on CMMC&#8217;s NIST SP 800-171A, CPCSC remains a different mechanism and had to pivot after failing to acquire reciprocity with the United States&#8217; CMMC. As a result, PSPC/CSPSC Secretariat must consider doing another RFI to determine how well industry is beginning to understand CPCSC, especially as level 1 is being introduced. </p><div><hr></div><h3>Takeaways - What Does This Tell Us About CPCSC?</h3><ul><li><p><strong>The government has not provided CPCSC with sufficient resources to develop and implement the program.</strong></p></li></ul><p>The program states that there is &#8220;insufficient personnel, project management and technical cyber security expertise within CPCSC stakeholder departments.&#8221; It is unclear if this has been resolved since this report was released</p><p>Part of the problem with this appears to be the level of funding allocated to departments, where DND, the Treasury Board Secretariat, and CSE/CCCS were not given any funding for CPCSC activities despite having a role in implementation. </p><p>The need to prioritize funding is also likely what has led to a lack of communication between CPCSC and industry and external stakeholders, as they&#8217;re prioritizing program development over engagement. This is a completely understandable approach, but it is making it harder for the CPCSC Secretariat to develop the program.</p><p>Communication and engagement with external stakeholders are critical to maintaining an active dialogue for additional feedback and ensuring successful implementation. Ultimately, it is industry that will be implementing the program and be affected by it, so any supply chain program should include the feedback of the supply chain. Deprioritizing engagement due to a lack of funding ultimately hurts the CPCSC and makes their job so much harder. </p><p>In the end, the report even confirms this when it states &#8220;it was suggested that industry engagement should be increased to boost CPCSC awareness and buy-in, however interviews noted that CPCSC was not provided funds for industry engagement or program promotion.&#8221;</p><ul><li><p><strong>The CPCSC Secretariat does not have an accurate survey of the state of the defence industry and CPCSC implementation, particularly costs.</strong></p></li></ul><p><a href="https://www.cyberincontext.ca/p/what-is-the-canadian-program-for">When CPCSC first conducted their RFI a few years ago</a>, CPCSC was still in its very early stages and only 91 organizations responded. There is likely a strong chance that you only responded to this RFI if you were already aware of CMMC and the role it plays on CPCSC.</p><p>This is to say that many more organizations are now aware of CPCSC; we have the standard and understand its full scope, so now is a time for CPCSC to release another RFI to gain a better understanding of the preparedness of Canada&#8217;s defence industry supply chain and perceptions of CPCSC.</p><p>The report specifically notes recognition of the risk of SMEs struggling with financial and technical demands. More information about these risks and concerns from a new RFI and surveys could potentially help persuade the government, that is very defence conscious, to provide additional funding to ensure the success of the CPCSC.</p><p>The report specifically highlights the high costs associated with similar compliance programs, especially for SMEs, and notes that Australia used loans and regional development funds. This does not mean that the government will institute such programs, but awareness of this and the compliance costs are a positive step towards the government developing programs to assist SMEs and the broader sector in ensuring compliance. This is optimistic thinking, but these types of evaluations and audits are bureaucratic processes that motivate a lot of action on cyber-related programs in the Canadian government.</p><ul><li><p><strong>The CPCSC Secretariat is temporary</strong></p></li></ul><p>Unless this has changed, the handoff plan seems risky. The evaluation states that <em>&#8220;the current CPCSC management model&#8230; was designed to be temporary with a reassessment and transfer of management to another entity following program implementation.&#8221; </em>Authority and oversight of CPCSC was always going to be vested in other authorities when the implementation of CPCSC was completed, but there does not appear to be long-term thinking about governance of this program.</p><p>The evaluation in particular notes that CPCSC&#8217;s management is concerned about when CPCSC moves from DMPB in PSPC to &#8220;another organization.&#8221; Although we know that CPCSC level 3 will be largely be overseen and assessed by DND, there remain questions about the long-term management of the overall CPCSC program. As the CPCSC Tiger Team is a multi-departmental group with an organization and mandate that is unique, it is likely difficult to transition this into normal operations and continue on as normal. </p><p>Another aspect that the report overlooks is that the loss of expertise about CPCSC is likely to occur if CPCSC management is transferred. The report only emphasizes ensuring proper documentation of roles to enable short and long-term effectiveness, but this may not capture the full institutional knowledge and experience with CPCSC stand up that will be important during the course of implementation. </p><p>As a result, it may be better for the program to transition to long-term management sooner rather than later, as the program becomes more complex, the more difficult it may be to transfer management. Despite the stated problems of lack of technical knowledge in PSPC to manage CSPSC, this can be addressed better with a more long-term arrangement with CSE/CCCS.</p><div><hr></div><h3>Conclusion</h3><p>There are many in the wider cyber defence and compliance space in Canada that does not give enough credit to the work of the CPCSC Secretariat. As this report notes, the CPCSC has simply not been provided with sufficient resources by the federal government and remains constrained in what it can achieve. Despite these constraints, its unique construction and &#8220;Tiger Team&#8221; approach have enabled the program to accomplish a great deal with a relatively small team. </p><p>It is unclear how much PSPC has been able to adjust its processes based on this evaluation report and the subsequent action plan, because the Management Action Plan only addresses the need for risk management tools and improved program documentation. These types of programmatic actions are relatively easy and do not suggest that the government has yet to provide CPCSC with the appropriate resources to ensure its success.</p><p>Although this evaluation covers a relatively old time period, it still tell us a lot about how the program is being developed and what has contributed to the delays. Rather than addressing some of the major risks the program has identified, PSPC has strengthened programmatic functions, since addressing anything beyond this would likely require ministerial or cabinet input. </p><p>In the coming weeks, <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;id&quot;:1431708,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/canadiancyber&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;uuid&quot;:&quot;3aa34ab6-3e0c-4e38-9d9d-ae0c9a653235&quot;}" data-component-name="MentionToDOM"></span> will be releasing content and informational content about CPCSC level 1 with <a href="https://www.linkedin.com/in/altechguy/">Andrew Laliberte</a>. Already, Andy and I are finding that many of the risks identified in this evaluation are affecting the level 1 implementation.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 18/04/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending April 18]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426</guid><pubDate>Mon, 20 Apr 2026 13:59:25 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/cc0d2671-07cc-42a9-8f6b-d81d103dc55f_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>. </p></li></ul></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-180426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://www.cbc.ca/news/canada/edmonton/edmonton-police-emails-documents-provide-new-information-on-canada-first-ai-facial-recognition-bodycam-pilot-9.7157991">Edmonton police emails, documents provide new information on Canada-first AI facial recognition bodycam pilot</a></strong></p><ul><li><p>AI Facial recognition has been shown to produce false positives often, so this should be a major concern.</p></li><li><p>&#8220;The facial recognition model was supplied by Corsight AI, an Israeli company whose technology has reportedly been used for mass surveillance in Gaza.&#8221;</p></li></ul></li><li><p><strong><a href="https://archive.ph/UZdMZ#selection-2571.0-2571.70">AI firm Cohere in merger talks with Germany&#8217;s Aleph Alpha, sources say</a></strong></p><ul><li><p>This is pretty big news because Cohere is a Canadian AI darling that the Government of Canada has championed as a Canadian AI leader. Cohere has also loved to play up its Canadianness, so a merger with German company would upend a lot of the dynamics.</p></li><li><p><strong><a href="https://betakit.com/cohere-exec-pledges-ai-firm-will-stay-canadian-headquartered-amid-merger-reports/">Cohere exec pledges AI firm will stay Canadian-headquartered amid merger reports</a></strong></p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/public-services-procurement/news/2026/04/government-of-canada-introduces-level-1-of-canadian-program-for-cyber-security-certification.html">Government of Canada introduces Level 1 of Canadian Program for Cyber Security Certification</a></strong></p><ul><li><p>For those unfamiliar, CPCSC is Canada&#8217;s answer to the Cybersecurity Maturity Model Certification. Originally, Canada wanted reciprocity, but it didn&#8217;t get it. Nevertheless, the program is still important. This is a big milestone as we steadily get closer to a defence industry-wide implementation.</p><ul><li><p><strong><a href="https://cyberpostureassessments.ops.cyber.gc.ca/Interview/9792cec1-383e-405a-abe5-4cbd3bb4de29">Canadian Program for Cyber Security Certification Level 1 Self-Assesment</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada/meet-level1-certification-requirements.html">How to meet Level 1 Cyber Security Certification Requirements</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada/meet-level1-certification-requirements/scoping-guide.html">Level 1 CPCSC Certification Scoping Guide</a></strong></p></li></ul></li></ul></li><li><p><strong><a href="https://betakit.com/kepler-to-lead-testing-of-european-space-agencys-high-speed-data-network/">Kepler to lead testing of European Space Agency&#8217;s high-speed data network</a></strong></p><ul><li><p>Toronto-based Kepler Communications will be the prime contractor for the ESA&#8217;s HydRON ELement 3. There&#8217;s been a lot of Canada-European engagement on space, particularly space communications. I wouldn&#8217;t be surprised if this is the start of wider industry moves.</p></li></ul></li><li><p><strong>From last week, but activities continued to this week: <a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/04/cafcybercom-participates-latvia-led-threat-hunt-workshop-riga.html">CAFCYBERCOM participates in Latvia-led Threat Hunt Workshop in Riga</a></strong></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rigl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rigl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 424w, https://substackcdn.com/image/fetch/$s_!rigl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 848w, https://substackcdn.com/image/fetch/$s_!rigl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 1272w, https://substackcdn.com/image/fetch/$s_!rigl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rigl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png" width="548" height="670" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:670,&quot;width&quot;:548,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:391702,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/194087792?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rigl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 424w, https://substackcdn.com/image/fetch/$s_!rigl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 848w, https://substackcdn.com/image/fetch/$s_!rigl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 1272w, https://substackcdn.com/image/fetch/$s_!rigl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff019ab42-8dc4-47ad-906a-d9c4cbf5f1f6_548x670.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong><a href="https://feeds.issuerdirect.com/news-release.html?newsid=6478895330456046&amp;symbol=BB,BB:CA">QNX and TKMS Collaborate to Bring Canadian Software Innovation to Global Naval Defence Programs</a></strong></p><ul><li><p>TKMS has partnered with QNX, a division of Blackberry, fo collaboration in support of Canada&#8217;s submarine program</p></li></ul></li><li><p><strong><a href="https://mda.space/article/mda-space-unveils-space-control-platform-mda-midnight-designed-to-defend-and-protect-the-space-domain">MDA Space Unveils Space Control Platform MDA Midnight, Designed to Defend and protect the Space Domain</a></strong></p><ul><li><p>MDA has a VERY interesting new platform that raises questions:</p><ul><li><p>On-orbit inspection and reporting of satellite status</p></li><li><p>Electronic counter measures detection, attribution and mitigation</p></li><li><p>Rendezvous and proximity operations, cooperative satellite capture and release</p></li><li><p>De-orbiting of a customer&#8217;s non-operational asset</p></li></ul></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/04/canada-launches-national-initiative-to-build-large-scale-ai-supercomputing-capacity.html">Canada launches national initiative to build large-scale AI supercomputing capacity</a></strong></p></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/17/news/wealthsimple-x-integration-prediction-markets">Wealthsimple bets on X and Canadian users aren&#8217;t happy</a></strong></p><ul><li><p>I honestly cannot imagine this was done with any understanding of the limited number of Canadians who still use Twitter.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/public-services-procurement/news/2026/04/canada-and-european-space-agency-sign-general-security-of-information-agreement.html">Canada and European Space Agency sign General Security of Information Agreement</a></strong></p><ul><li><p>These agreements usually precede greater levels of cooperation between organizations/countries.</p></li></ul></li><li><p><strong>Canadian Centre for Cyber Security launches <a href="https://www.cyber.gc.ca/en/cyber-security-readiness/critical-infrastructure-resilience-escalated-threat-navigation-initiative">Critical infrastructure resilience and escalated threat navigation initiative</a></strong></p><ul><li><p>&#8220;The Critical Infrastructure Resilience and Escalated Threat Navigation (CIREN) initiative to drive immediate preparedness across organizations to reinforce and protect Canada&#8217;s sovereignty and essential services.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/04/canada-finland-joint-statement-on-sovereign-technology-and-ai-cooperation.html">Canada-Finland Joint Statement on Sovereign Technology and AI Cooperation</a></strong></p><ul><li><p>I&#8217;d argue that a quantum-focused agreement would be even better for Canada and Finland. Quantum is included in this, but is just one part of a large whole.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/economic-development-southern-ontario/news/2026/04/government-of-canada-invests-in-francophone-and-bilingual-digital-health-innovation.html">Government of Canada invests in Francophone and bilingual digital health innovation</a></strong></p></li><li><p><strong><a href="https://www.alberta.ca/release.cfm?xID=96001813BA503-9E45-AC37-D438F38CC353444E">Alberta creates Cyber Crime Task Force: Protecting Albertans from cybercriminals</a></strong></p><ul><li><p>Cyber crime is one of the most pervasive crimes that affect all Canadians, so establishing it as a central priority is good for protecting Canadians and is good politics.</p></li></ul></li><li><p><strong><a href="https://news.gov.bc.ca/releases/2026PSSG0033-000432">British Columbia Launching AI Pilot Project: Disrupting the illicit drug trade with first-in-Canada technology</a></strong></p><ul><li><p>BC is launching a pilot project to use AI for &#8220;enhance police intelligence and understanding of toxic-drug supply patterns to help inform enforcement efforts and issue earlier warnings for bad batches of toxic drugs .&#8221;</p></li></ul></li><li><p><strong><a href="https://www.priv.gc.ca/en/opc-news/news-and-announcements/2026/nr-c_260416/">Privacy Commissioner of Canada appears before Parliamentary Committee to discuss potential privacy implications of the Canada-China Preliminary Joint Arrangement on the Electric Vehicle Sector</a></strong></p><ul><li><p>Privacy Commissioner says new privacy laws are needed. The context was about the incoming electric vehicles from China, but really, the concerns about privacy and cybersecurity with Chinese electric vehicles are just as much of an issue with North American-built electric vehicles.</p></li></ul></li><li><p><strong><a href="https://archive.ph/k0qoC#selection-2565.0-2565.81">Canada must move quickly to address AI-related cybersecurity risks, Macklem warns</a></strong></p><ul><li><p>Bank of Canada Governor warns about looming risks to cybersecurity due to AI like Claude&#8217;s Mythos.</p></li></ul></li><li><p><strong><a href="https://halifax.citynews.ca/2026/04/13/canadian-banks-regulators-discussed-mythos-ai-minister-to-meet-with-anthropic/">Canadian banks, regulators discussed Mythos AI, minister to meet with Anthropic</a></strong></p><ul><li><p>Solomon says Canada can withstand such risks, but I trust anything Solomon says as much as I trust any snake oil salesman.</p></li></ul></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, this section is for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section, which is 100% focused on Canada</h6><ul><li><p><strong><a href="https://www.wired.com/story/meta-ray-ban-oakley-smart-glasses-no-face-recognition-civil-society/">Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators</a></strong></p></li><li><p><strong><a href="https://kotaku.com/rockstar-games-reportedly-hacked-massive-data-leak-ransom-gta-6-shinyhunters-2000686858">Rockstar Games Hacked, ShinyHunters Threaten A Massive Data Leak If Not Paid Ransom</a></strong></p><ul><li><p>Unclear if this will affect the release date of GTA 6.</p></li></ul></li><li><p><strong><a href="https://www.404media.co/google-microsoft-meta-all-tracking-you-even-when-you-opt-out-according-to-an-independent-audit/">Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit</a></strong></p></li><li><p><strong><a href="https://www.wired.com/story/deepfake-nudify-schools-global-crisis/">The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought</a></strong></p><ul><li><p>&#8220;Nearly 90 schools and 600 students around the world impacted by AI-generated deepfake nude images&#8221; - Keep in mind this is only verified and reported, the problem is significantly much worse than this.</p></li></ul></li><li><p><strong><a href="https://cyberscoop.com/ai-chip-smuggling-china-export-controls-enforcement-op-ed/">We&#8217;re only seeing the tip of the chip-smuggling iceberg</a></strong></p></li><li><p><strong><a href="https://hackread.com/booking-com-data-breach-hackers-customer-details/">Booking.com Confirms Data Breach as Hackers Access Customer Details</a></strong></p><ul><li><p>No payment data accessed, but customer information was exposed.</p></li><li><p><strong><a href="https://www.malwarebytes.com/blog/data-breaches/2026/04/booking-com-breach-gives-scammers-what-they-need-to-target-guests">Booking.com breach gives scammers what they need to target guests</a></strong></p><ul><li><p>Good article from MalwareBytes on potential impact.</p></li></ul></li></ul></li><li><p><strong><a href="https://industrialcyber.co/reports/ransomware-reaches-elevated-new-normal-as-attack-volumes-hold-steady-into-2026-reshape-baseline-risk-expectations/">Ransomware reaches elevated &#8216;new normal&#8217; as attack volumes hold steady into 2026, reshape baseline risk expectations</a></strong></p></li><li><p><strong><a href="https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/remotepc/understanding-security-warnings">Understanding security warnings when opening Remote Desktop (RDP) files</a></strong></p><ul><li><p>Windows will begin to show warnings when remote desktop connection files are opened. This is great news, but also what took them so long?</p></li></ul></li><li><p><strong><a href="https://www.theverge.com/ai-artificial-intelligence/914672/the-ram-shortage-could-last-years">The RAM shortage could last years</a> (h/t Catalin Cimpanu)</strong></p><ul><li><p>Although many organizations have already adjusted, I feel like we&#8217;re only seeing the tip of the iceberg when it comes to RAM shortages. Massive demand for AI is putting pressure on RAM producers, who cannot keep up. Additional fabrication capacity will not be online until 2027, and I don&#8217;t think it will be sufficient to meet current demand, which is likely to continue increasing.</p></li></ul></li><li><p><strong><a href="https://www.ietf.org/archive/id/draft-thain-ipv8-00.html">Internet Protocol Version 8 (IPv8)</a></strong></p><ul><li><p>IPv6 traffic has crossed 50%, so it is time to think about the future.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://9to5google.com/2026/04/13/google-search-back-button-hijacking/">Google Search to classify &#8216;back button hijacking&#8217; as spam</a></strong></p></li><li><p><strong><a href="https://databreaches.net/2026/04/05/how-often-do-threat-actors-default-on-promises-to-delete-data/">How often do threat actors default on promises to delete data?</a></strong></p><ul><li><p>This is a few weeks old, but a great article that I want to highlight.</p></li></ul></li><li><p><strong><a href="https://www-securityweek-com.cdn.ampproject.org/c/s/www.securityweek.com/by-design-flaw-in-mcp-could-enable-widespread-ai-supply-chain-attacks/amp/">&#8216;By Design&#8217; Flaw in MCP Could Enable Widespread AI Supply Chain Attacks</a></strong></p></li><li><p><strong><a href="https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/">Someone Bought 30 WordPress Plugins and Planted a Backdoor in All of Them.</a></strong></p><ul><li><p>Easier to do this than to take over open-source projects.</p></li></ul></li><li><p><strong><a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident">Vercel April 2026 security incident</a></strong></p><ul><li><p>Cloud provider hit by ShinyHunters</p></li></ul></li><li><p><strong><a href="https://www.hookphish.com/blog/ransomware-group-shinyhunters-hits-the-canada-life-assurance-company-canadalife-com/">Ransomware Group shinyhunters Hits: The Canada Life Assurance Company (canadalife.com)</a></strong></p><ul><li><p>Major Canadian life assurance company hit by Shinyhunters.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><ul><li><p><strong><a href="https://mollyrosefoundation.org/more-than-60-of-australian-children-still-using-social-media-despite-ban-for-under-16s-research-shows/">More than 60% of Australian children still using social media despite ban for under-16s, research shows</a></strong></p><ul><li><p>The Liberal Party is interested in a ban and should pay attention to how it doesn&#8217;t work.</p></li></ul></li><li><p><strong><a href="https://cybersecurecatalyst.ca/to-build-a-modern-canadian-defence-sector-make-smes-cybersecure/">To build a modern Canadian defence sector, make SMEs cybersecure</a></strong></p><ul><li><p>Op-ed by Charles Finlay of Rogers Cybersecure Catalyst and Daniel Blanc, former Chief of Staff of CAFCYBERCOM</p></li></ul></li><li><p><strong><a href="https://easychair.org/cfp/PST2026">EVENT: 23rd Annual International Conference on Privacy, Security &amp; Trust (PST) to be held in Ottawa, Canada</a></strong></p><ul><li><p>To be held August 26 - 28. Submission deadline is passed, but should be an interesting conference.</p></li></ul></li><li><p><strong><a href="https://eucyberdirect.eu/blog/the-risk-of-making-offensive-cyber-the-new-shiny-silver-bullet">The Risk of Making Offensive Cyber the New Shiny Silver Bullet</a></strong></p><ul><li><p>The direction many NATO countries are considering does not have modern precedence and has a lot of preconceived notions.</p></li></ul></li><li><p>Parliamentary Meetings of Note:</p><ul><li><p><strong><a href="https://sencanada.ca/en/committees/trcm/noticeofmeeting/691633/45-1">April 21: Senate Transport and Communications Committee - Examine and report on the opportunities and challenges of artificial intelligence (AI) in the information and communication technology sector</a></strong></p></li><li><p><strong><a href="https://sencanada.ca/en/committees/trcm/noticeofmeeting/691634/45-1">April 22: Senate Transport and Communications Committee - Examine and report on the opportunities and challenges of artificial intelligence (AI) in the information and communication technology sector</a></strong></p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://docs.fcc.gov/public/attachments/DOC-420764A1.pdf">FCC Selects New Lead Administrator for U.S. Cyber Trust Mark Program (h/t Eric Geller)</a></strong></p><ul><li><p>The FCC selected ioXt Alliance to oversee its Internet of Things labeling program</p></li></ul></li><li><p><strong><a href="https://www.nextgov.com/cybersecurity/2026/04/us-push-counter-hackers-draws-industry-deeper-offensive-cyber-debate/412770/">The White House is expanding the market for offensive cyber capabilities &#8212; and drawing more of the private sector into that ecosystem &#8212; even as policy boundaries around their use remain unclear</a></strong></p><ul><li><p>The White House has had they aren&#8217;t interested in cyber letters of marquee, but there are still major changes underway in how the US uses and cooperates with the private sector to counter cyber threat actors.</p></li></ul></li><li><p><strong><a href="https://www.politico.com/news/2026/04/13/missouri-city-council-data-center-00867259">Missouri town fires half its city council over data center deal</a></strong></p><ul><li><p>Yes we need data centres, but governments at all levels must recognize the harm that they can do to local ecosystems and communities and do consultation. </p></li></ul></li><li><p><strong><a href="https://archive.ph/gWjRA#selection-1285.0-1285.68">The FCC just saved Netgear from its router ban for no obvious reason</a></strong></p><ul><li><p>There were already some concerns that this would lead to corruption and this is not quelling those concerns.</p></li></ul></li><li><p><strong><a href="https://www.nbcnews.com/tech/tech-news/san-jose-drivers-sue-city-police-flock-cameras-rcna331750">Drivers sue San Jose over nearly 500 police cameras used to track drivers across the state</a></strong></p><ul><li><p>This has the potential to establish a lot of precedence regarding private surveillance.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/16/two-americans-sentenced-for-helping-north-korea-steal-5-million-in-fake-it-worker-scheme/">Two Americans sentenced for helping North Korea steal $5 million in fake IT worker scheme</a></strong></p><ul><li><p>I have yet to see any specific reports about Canadian firms hiring North Korean fake IT workers nor anyone assisting them apart from general warnings about North Korea, although this just means it has yet to be reported.</p></li></ul></li><li><p><strong><a href="https://thehill.com/homenews/state-watch/5832039-maine-data-center-ban/">Maine passes first-in-nation freeze on big data centers</a></strong></p><ul><li><p>Although temporary, this is pretty big and likely to lead to similar legislation.</p></li></ul></li><li><p><strong><a href="https://finance.yahoo.com/sectors/technology/articles/bessent-calls-anthropic-mythos-breakthrough-010339669.html">White House Works to Give US Agencies Anthropic Mythos AI</a></strong></p><ul><li><p>Remember, just a few weeks ago, Anthropic was being labelled a supply chain risk?</p></li></ul></li><li><p><strong><a href="https://therecord.media/cargo-thieving-hackers-running-sophisticated-campaigns">Cargo thieving hackers running sophisticated remote access campaigns, researchers find</a></strong></p><ul><li><p>Criminal hackers helping organized crime with cargo thefts.</p></li></ul></li><li><p><strong><a href="https://www.axios.com/2026/04/19/nsa-anthropic-mythos-pentagon">Scoop: NSA using Anthropic&#8217;s Mythos despite blacklist</a></strong></p><ul><li><p>Almost like the current US administration&#8217;s words are hollow and they can&#8217;t be trusted.</p></li></ul></li><li><p><strong><a href="https://www.tallahassee.com/story/news/local/2026/04/17/tallahassee-city-website-down-after-cyberattack/89664260007/">Cyberattack targets city of Tallahassee; official says no data compromised</a></strong></p></li><li><p><strong><a href="https://www.cnbc.com/2026/04/18/justice-department-france-probe-exlon-musk-x.html">Justice Department refuses to assist French probe into Musk&#8217;s X, WSJ reports</a></strong></p><ul><li><p>US Justice Department claims child sexual abuse material constitutes free speech.</p></li></ul></li><li><p><strong><a href="https://lustra.news/en/us-congress/119/legislations/119_HR_8250/">Parents Decide Act: Mandatory Age Verification for Operating Systems</a></strong></p><ul><li><p>This would require operating system providers to verify the age of all users.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://www.gld.nl/nieuws/8463135/oorlogsschip-van-500-miljoen-euro-gevonden-met-gadget-van-5-euro">500 million euro warship found with 5 euro gadget</a></strong></p><ul><li><p>Dutch ship tracked via cheap bluetooth tracker.</p></li></ul></li><li><p><strong><a href="https://www.politico.eu/article/european-civil-servants-new-messaging-services/">European civil servants are being forced off WhatsApp</a></strong></p></li><li><p><strong><a href="https://www.techpolicy.press/how-big-tech-lobbied-the-eu-to-hide-data-centers-environmental-toll/">How Big Tech Lobbied the EU to Hide Data Centers&#8217; Environmental Toll</a></strong></p></li><li><p><strong><a href="https://www.politico.eu/article/eu-brussels-launched-age-checking-app-hackers-say-took-them-2-minutes-break-it/">Brussels launched an age checking app. Hackers say it takes 2 minutes to break it.</a></strong></p><ul><li><p>Governments increasingly want to strip the average person of privacy to avoid responsibility for regulating social media, but they are putting so little effort into implementing these bans that it&#8217;s making everything worse.</p></li></ul></li><li><p><strong><a href="https://therecord.media/ukraine-confirms-suspected-apt28-campaign-targeting-prosecutors">Ukraine confirms suspected APT28 campaign targeting prosecutors, anti-corruption agencies</a></strong></p><ul><li><p></p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://biz.chosun.com/en/en-science/2026/04/12/I2XWXIXVWVEMDCTUAS33I2L6FE/">Hospitals face cyberattacks as Korea underfunds medical data security</a></strong></p><ul><li><p>Republic of Korea is very much like Canada and other Western countries in underfunding cybersecurity in healthcare.</p></li></ul></li><li><p><strong><a href="https://therecord.media/new-janaware-ransomware-targeting-turkey">New &#8216;JanaWare&#8217; ransomware targeting Turkish citizens as cybercriminal ecosystem fragments</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/04/15/sweden-blames-russian-hackers-for-attempting-destructive-cyberattack-on-thermal-plant/">Sweden blames Russian hackers for attempting &#8216;destructive&#8217; cyberattack on thermal plant</a></strong></p><ul><li><p>Russia has been stepping up cyber attacks on critical infrastructure over the past few years.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 11/04/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending April 11]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426</guid><pubDate>Mon, 13 Apr 2026 14:21:26 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8de99a66-80ad-4529-b549-2235d4e486d4_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><strong><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></strong></p></li><li><p><strong><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></strong></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>.</p></li></ul></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-110426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://archive.ph/XCBZ8">AI being used to add fake details in immigration, asylum applications, federal officials say</a></strong></p><ul><li><p>An article on one instance of this came out a couple of weeks ago; this is a broader expos&#233; on the wider use of AI and the problems it will cause.</p></li></ul></li><li><p><strong><a href="https://securitybrief.ca/story/kyndryl-foundation-backs-jedi-for-cyber-skills-training">Kyndryl Foundation backs JEDI for cyber skills training</a></strong></p><ul><li><p>JEDI is a New Brunswick group that focuses on working with Indigenous communities on economic and workforce development.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/politics/saab-lockheed-martin-fighters-data-defence-9.7157673">Saab dangles sovereign data centre in Montreal to undercut F-35 fighter contract</a></strong></p><ul><li><p>I honestly don&#8217;t think this will affect the overall calculus that much because the military is 100% behind F-35, and any decision is based on politics and long-term strategic balancing.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/04/invisible-shield-how-cafcybercom-protects-systems-protect-canada.html">Invisible shield: How CAFCYBERCOM protects the systems that protect Canada</a></strong></p><ul><li><p>Bit of a fluff piece out by CAFCYBERCOM Public Affairs</p></li></ul></li><li><p><strong><a href="https://www.ctvnews.ca/canada/article/a-new-alarming-scam-trend-is-running-rampant-in-canada/">A new, alarming scam trend is running rampant in Canada</a></strong></p><ul><li><p>About leveraging media reports about class-action settlements for use in scams. This is not really &#8220;new,&#8221; it&#8217;s just another scam.</p></li></ul></li><li><p><strong><a href="https://www.winnipegfreepress.com/arts-and-life/life/sci-tech/2026/04/11/liberal-party-adopts-motion-to-restrict-kids-from-social-media">Liberals adopt policy to restrict kids from social media</a></strong></p><ul><li><p>The Federal Liberal Party of Canada adopted a non-binding resolution in favor of banning the use of social media by those under the age of 16.</p></li><li><p>There are major issues with such policies because it relies on identity verification. Canada doesn&#8217;t even have updated privacy laws yet, but the Liberals want to rush ahead and force private corporations to store our data to verify ages. This is quite dangerous for Canadians&#8217; privacy.</p></li></ul></li><li><p><strong><a href="https://archive.ph/Jzvln#selection-3745.26-3745.115">Ontario and Quebec police probing cyber network that hacked millions of household devices</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://digitalnovascotia.com/news/how-a-volunteer-run-cyber-conference-grew-to-fill-halifaxs-convention-centre/">How a volunteer-run cyber conference grew to fill Halifax&#8217;s convention centre</a></strong></p><ul><li><p>Article about ATLSEC </p></li></ul></li><li><p><strong><a href="https://lockheedmartin.ca.mediaroom.com/index.php?s=2429&amp;item=122586">Lockheed Martin Canada Invests $3.6M CAD in Ottawa-based Lemay.ai</a></strong></p><ul><li><p>Investment as part of ITB commients to support in-service support for CC-130J Super Hercules aircraft fleet.</p></li></ul></li><li><p><strong><a href="https://documentsearch.oas.org/documents/X_2_26_CICTE_doc-7/X_2_26_CICTE_doc-7-rev1-en.pdf">Canada is Working with Organisation for American States on Cybersecurity</a></strong><a href="https://documentsearch.oas.org/documents/X_2_26_CICTE_doc-7/X_2_26_CICTE_doc-7-rev1-en.pdf"> </a></p><ul><li><p>Canada is the listed donor country on projects addressing the gender gap in cybersecurity and strengthening capacity to address cybercrime in the Americas</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/04/crtc-seeking-new-broadband-fund-proposals-to-help-improve-internet-services-for-canadians.html">CRTC seeking new Broadband Fund proposals to help improve Internet services for Canadians</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/04/crtc-launches-new-call-for-proposals-to-its-broadband-fund-to-help-improve-internet-and-cellphone-services.html">CRTC launches new call for proposals to its Broadband Fund to help improve Internet and cellphone services</a></strong></p><ul><li><p>Rural and Northern/Arctic communities remain severely underserved with limited options for access in Canada.</p></li></ul></li><li><p><strong>Provinces view digital sovereignty very differently&#8230;</strong></p><ul><li><p><strong><a href="https://news.ontario.ca/en/release/1007259/ontario-welcomes-microsofts-ai-infrastructure-expansion">Ontario Welcomes Microsoft&#8217;s AI Infrastructure Expansion</a></strong></p></li><li><p>(Google Translated) <strong><a href="https://www.quebec.ca/nouvelles/actualites/details/mission-du-ministre-gilles-belanger-renforcer-le-partenariat-strategique-entre-la-france-et-le-quebec-en-matiere-de-souverainete-numerique-69659">Minister Gilles B&#233;langer&#8217;s mission: to strengthen the strategic partnership between France and Quebec in the area of &#8203;&#8203;digital sovereignty</a></strong></p></li></ul></li><li><p><strong><a href="https://archive.ph/00jw1#selection-1249.0-1249.60">Bank of Canada, Major Lenders Met on Anthropic AI Cyber Risk</a></strong></p><ul><li><p>While it is good they are meeting to discuss cyber risk, it should likely be focused more broadly than just Anthropic&#8217;s latest marketing.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/04/cafcybercom-participates-latvia-led-threat-hunt-workshop-riga.html">CAFCYBERCOM participates in Latvia-led Threat Hunt Workshop in Riga</a></strong></p><ul><li><p>CAF Cyber Forces have been working closely with Latvia on cyber threat hunting since at least 2022.</p></li></ul></li><li><p>Ambassador of the Phillipines to Canada met with Sami Khoury, who is the Senior Official for Cyber Security and former head of the Canadian Centre for Cyber Security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Whvn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Whvn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 424w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 848w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 1272w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Whvn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png" width="872" height="829" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:829,&quot;width&quot;:872,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:709804,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/193373566?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Whvn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 424w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 848w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 1272w, https://substackcdn.com/image/fetch/$s_!Whvn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe3bcedc-631a-4e63-9284-a0fc6e7c7cd8_872x829.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p></li></ul><div><hr></div><h4 style="text-align: center;">Canada-Relevant News</h4><h6 style="text-align: center;">As many issues don&#8217;t respect borders, I am creating this section for stories that impact Canada, but may not be Canadian-sourced or focused, to differentiate from the previous section that will be 100% focused on Canada</h6><ul><li><p><strong><a href="https://gizmodo.com/microsoft-says-youre-not-supposed-to-take-copilots-advice-seriously-2000742630">Microsoft Says You&#8217;re Not Supposed to Take Copilot&#8217;s Advice Seriously</a></strong></p><ul><li><p>Microsoft recently slipped into its terms of service that you should basically treat copilot as a toy and not for anything important. That should tell you a lot about its efficacy.</p></li></ul></li><li><p><strong><a href="https://arstechnica.com/ai/2026/04/anthropic-limits-access-to-mythos-its-new-cybersecurity-ai-model/?utm_source=bsky&amp;utm_medium=social">Anthropic limits access to Mythos, its new cybersecurity AI model</a></strong></p><ul><li><p>I am seeing/hearing a lot of interesting things about this new model. Anthropic is making some major advancements in the use of AI for cybersecurity. With that said, people should still have a healthy amount of skepticism about Anthropic&#8217;s marketing.</p></li></ul></li><li><p><strong><a href="https://arstechnica.com/security/2026/04/heres-why-its-prudent-for-openclaw-users-to-assume-compromise/">OpenClaw gives users yet another reason to be freaked out about security</a></strong></p><ul><li><p>I haven&#8217;t shared too much about OpenClaw, but it is just a colossal mess.</p></li></ul></li><li><p><strong><a href="https://futurism.com/artificial-intelligence/google-ai-overviews-misinformation">Analysis Finds That Google&#8217;s AI Overviews Are Providing Misinformation at a Scale Possibly Unprecedented in the History of Human Civilization</a></strong></p></li><li><p><strong><a href="https://security.googleblog.com/2026/04/bringing-rust-to-pixel-baseband.html">Bringing Rust to the Pixel Baseband</a></strong> (h/t Catalin Cimpanu)</p><ul><li><p>Apparently Google used the Rust in the last Pixel release. Rust is a programming language that is know for its benefits to cybersecurity, especially regarding memory safety..</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/men-are-buying-hacking-tools-to-use-against-their-wives-and-friends/">Men Are Buying Hacking Tools to Use Against Their Wives and Friends</a></strong></p><ul><li><p>The ease of access is turning this into a crime of convenience for many.</p></li></ul></li><li><p><strong><a href="https://www.404media.co/webinartv-secretly-scraped-zoom-meetings-of-anonymous-recovery-programs/">WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs</a></strong></p><ul><li><p>Zoom remains popular in Canada.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Threat Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-007-vulnerability-impacting-fortinet-forticlientems-cve-2026-35616">Alert - AL26-007 - Vulnerability impacting Fortinet FortiClientEMS - CVE-2026-35616</a></strong></p></li><li><p><strong><a href="https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html">Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/">Disgruntled researcher leaks &#8220;BlueHammer&#8221; Windows zero-day exploit</a></strong></p><ul><li><p>If you don&#8217;t have an engaged, cooperative disclosure process, you&#8217;ll get disclosures you&#8217;ll wish you had cooperated with.</p></li></ul></li><li><p><strong><a href="https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/">Investigating Storm-2755: &#8220;Payroll pirate&#8221; attacks targeting Canadian employees</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://www.sophos.com/en-us/blog/adobe-reader-zero-day-vulnerability-in-active-exploitation">Adobe Reader zero-day vulnerability in active exploitation</a></strong></p></li><li><p><strong><a href="https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Adds One Known Fortinet Exploited Vulnerability to Catalog</a></strong></p></li><li><p><strong><a href="https://cybernews.com/security/cpuid-hwmonitor-hwinfo-cpuz-deliver-malware/">CPUID website hacked: users report HWMonitor and CPU-Z delivering malware</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/new-venom-phishing-attacks-steal-senior-executives-microsoft-logins/">New VENOM phishing attacks steal senior executives&#8217; Microsoft logins</a></strong></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p>Michael Geist:<strong> <a href="https://www.michaelgeist.ca/2026/04/could-bill-c-22-make-canadians-less-safe-the-systemic-vulnerability-gap-in-canadas-new-surveillance-law/">Could Bill C-22 Make Canadians Less Safe? The Systemic Vulnerability Gap in Canada&#8217;s New Surveillance Law</a></strong></p></li><li><p><strong>Globe and Mail OpEd by Michael Geist: <a href="https://archive.ph/xCo10">The U.S. isn&#8217;t happy about Canada&#8217;s quest for digital sovereignty</a></strong></p></li><li><p><strong>Event April 29: <a href="https://events.teams.microsoft.com/event/8b275e5e-a10b-46b6-963d-267540902a83@fcf67057-50c9-4ad4-98f3-ffca64add9e9">Defence Disrupted: Technology, Readiness, and the Future of Canadian Defence</a></strong></p><ul><li><p>Put on by IBM Canada</p></li></ul></li><li><p><strong>Citizen Lab: <a href="https://citizenlab.ca/research/analysis-of-penlinks-ad-based-geolocation-surveillance-tech/">Uncovering Webloc: An Analysis of Penlink&#8217;s Ad-based Geolocation Surveillance Tech</a></strong></p><ul><li><p>&#8220;Webloc is a global geolocation surveillance system that monitors hundreds of millions of people based on data purchased from consumer apps and digital advertising. It was developed by Cobwebs Technologies and is now sold by its successor Penlink.&#8221;</p></li></ul></li><li><p><strong>The Conversation: <a href="https://theconversation.com/canadas-cybersecurity-sector-has-a-pipeline-problem-and-a-glass-ceiling-270764">Canada&#8217;s cybersecurity sector has a pipeline problem &#8212; and a glass ceiling</a></strong></p><ul><li><p>By Sepideh Borzoo, Atefeh (Atty) Mashatan, and Rupa Banerjee from Toronto Metropolitan University</p></li></ul></li><li><p><strong><a href="https://aiforensics.org/work/telegram-harassment-infrastructure">Harassment as Infrastructure: How Telegram&#8217;s design enables TFGBV</a></strong></p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:193503283,&quot;url&quot;:&quot;https://www.nattothoughts.com/p/cybersecurity-strategy-in-chinas&quot;,&quot;publication_id&quot;:835088,&quot;publication_name&quot;:&quot;Natto Thoughts&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!t3eQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png&quot;,&quot;title&quot;:&quot;Cybersecurity Strategy in China&#8217;s 15th Five-Year Plan&quot;,&quot;truncated_body_text&quot;:&quot;On March 12, 2026, the National People&#8217;s Congress approved the &#8220;Outline of the 15th Five-Year Plan for National Economic and Social Development (15th FYP) of the People&#8217;s Republic of China&#8221; (&#20013;&#21326;&#20154;&#27665;&#20849;&#21644;&#22269;&#22269;&#27665;&#32463;&#27982;&#21644;&#31038;&#20250;&#21457;&#23637;&#31532;&#21313;&#20116;&#20010;&#20116;&#24180;&#35268;&#21010;&#32434;&#35201;) (15th FYP), the country&#8217;s highest-level development blueprint, which covers the years 2026 to 2030. Over the years, the Western cybersecurity&quot;,&quot;date&quot;:&quot;2026-04-08T14:03:21.660Z&quot;,&quot;like_count&quot;:5,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:86550903,&quot;name&quot;:&quot;Natto Team&quot;,&quot;handle&quot;:&quot;nattothoughts&quot;,&quot;previous_name&quot;:&quot;Project MNP&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15b484a6-590b-44d5-9774-de4cb42631df_954x954.png&quot;,&quot;bio&quot;:&quot;We are a group of experts with decades of experience in geopolitical analysis and cyber threat intelligence. We do research in a variety of European and Asian languages. &quot;,&quot;profile_set_up_at&quot;:&quot;2022-04-07T01:38:15.619Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:774421,&quot;user_id&quot;:86550903,&quot;publication_id&quot;:835088,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:835088,&quot;name&quot;:&quot;Natto Thoughts&quot;,&quot;subdomain&quot;:&quot;nattothoughts&quot;,&quot;custom_domain&quot;:&quot;www.nattothoughts.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Stories, analysis and insights from the intersection of culture, technology, and security.\n&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png&quot;,&quot;author_id&quot;:86550903,&quot;primary_user_id&quot;:86550903,&quot;theme_var_background_pop&quot;:&quot;#EA410B&quot;,&quot;created_at&quot;:&quot;2022-04-07T01:41:45.349Z&quot;,&quot;email_from_name&quot;:&quot;Natto Thoughts&quot;,&quot;copyright&quot;:&quot;Natto Thoughts&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.nattothoughts.com/p/cybersecurity-strategy-in-chinas?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!t3eQ!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd0e4005-414e-4e49-9a9a-3b89d3e533f5_629x629.png" loading="lazy"><span class="embedded-post-publication-name">Natto Thoughts</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Cybersecurity Strategy in China&#8217;s 15th Five-Year Plan</div></div><div class="embedded-post-body">On March 12, 2026, the National People&#8217;s Congress approved the &#8220;Outline of the 15th Five-Year Plan for National Economic and Social Development (15th FYP) of the People&#8217;s Republic of China&#8221; (&#20013;&#21326;&#20154;&#27665;&#20849;&#21644;&#22269;&#22269;&#27665;&#32463;&#27982;&#21644;&#31038;&#20250;&#21457;&#23637;&#31532;&#21313;&#20116;&#20010;&#20116;&#24180;&#35268;&#21010;&#32434;&#35201;) (15th FYP), the country&#8217;s highest-level development blueprint, which covers the years 2026 to 2030. Over the years, the Western cybersecurity&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">a month ago &#183; 5 likes &#183; Natto Team</div></a></div><ul><li><p>Natto Thoughts is one of the best sources for research and analysis on Chinese cyber, so go give them a follow.</p></li></ul></li><li><p><strong>Parliament is holding a few hearings on AI this upcoming week:</strong></p><ul><li><p><strong><a href="https://www.ourcommons.ca/DocumentViewer/en/45-1/INDU/meeting-31/notice">April 13, House of Commons Industry and Technology Committee: Opportunities, Risks, and Regulation of AI in Canada&#8217;s Strategic Industries</a></strong></p></li><li><p><strong><a href="https://sencanada.ca/en/committees/trcm/noticeofmeeting/691631/45-1">April 14, Senate Transport and Communications, Examine and report on the opportunities and challenges of artificial intelligence (AI) in the information and communication technology sector</a></strong></p></li><li><p><strong><a href="https://sencanada.ca/en/committees/trcm/noticeofmeeting/691632/45-1">April 15, Senate Transport and Communications, Examine and report on the opportunities and challenges of artificial intelligence (AI) in the information and communication technology sector</a></strong></p></li></ul></li><li><p>DND is holding public engagement sessions related to NORAD modernization infrastructure projects in the North, some of which will include information infrastruture</p><ul><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/news/2026/04/national-defence-to-hold-public-engagement-session-in-inuvik-northwest-territories.html">Inuvik: April 21</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/news/2026/04/national-defence-to-hold-public-engagement-session-in-yellowknife-northwest-territories.html">Yellowknife: April 23</a></strong></p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a">Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</a></strong></p><ul><li><p>Ongoing warnings to all critical infrastructure operators.</p></li></ul></li><li><p><strong><a href="https://www.latimes.com/california/story/2026-04-07/lapd-records-suspected-hack">Trove of sensitive LAPD records leaked in data hack of city attorney&#8217;s office</a></strong></p><ul><li><p>It&#8217;s hard to find a more corrupt police department than the LAPD in the US (there are receipts for this), so it's unsurprising that this has happened.</p></li></ul></li><li><p><strong><a href="https://therecord.media/cia-director-elevated-agency-cyber-espionage-division">CIA director quietly elevated agency&#8217;s cyber espionage division</a></strong></p><ul><li><p>This should not be a big surprise and is likely the direction for many Western human-intelligence organizations, but should be a major concern. The CIA has been in the game for a while, but it&#8217;s generally been a tertiary tool. The use of privately developed exploits and spyware sold to governments and private actors is greatly proliferating, and this will increasingly endanger civilians and the general public.</p></li></ul></li><li><p><strong><a href="https://hackread.com/dark-web-market-375tb-lockheed-martin-data/">Dark Web Market Lists Alleged 375TB Lockheed Martin Data for $600M</a></strong></p><ul><li><p>By a group &#8220;APT Iran&#8221;</p></li></ul></li><li><p><strong><a href="https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack">Massachusetts hospital turning ambulances away after cyberattack</a></strong></p><ul><li><p>Healthcare is one of the favorite targets for cyber threat actors.</p></li></ul></li><li><p><strong><a href="https://therecord.media/minnesota-sends-national-guard-after-local-cyberattack">Minnesota governor sends national guard to county after cyberattack</a></strong></p><ul><li><p>There is previous precedence for this in Minnesota. The importance of such actions are not always about skilled cybersecurity knowledge, but sometimes about additional labour to have people on hand to run programs, click through prompts, physically remove infected hardware from networks for additional work and recovery, etc.</p></li></ul></li><li><p><strong><a href="https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/">FBI Extracts Suspect&#8217;s Deleted Signal Messages Saved in iPhone Notification Database</a></strong></p><ul><li><p>Deleted signal messages recovered, along with a charge for &#8220;Antifa&#8221; activities.</p></li></ul></li><li><p><strong><a href="https://www.zetter-zeroday.com/trenchant-exec-says-he-had-depression-money-troubles-when-he-decided-to-sell-zero-days-to-russian-buyer-also-new-info-reveals-nature-of-his-work-for-australian-intelligence-agency/">Trenchant Exec Says He Had Depression, Money Troubles When He Decided to Sell Zero Days to Russian Buyer; Also, New Info Reveals Nature of His Work for Australian Intelligence Agency</a></strong></p><ul><li><p>A pretty common set of conditions that often leads to insider threats.</p></li></ul></li><li><p><strong><a href="https://therecord.media/treasury-department-announces-crypto-info-sharing">Treasury Department announces crypto industry cyber threat sharing initiative</a></strong></p></li><li><p><strong><a href="https://cyberscoop.com/fbi-operation-masquerade-russian-gru-router-takedown-brett-leatherman/">Inside the FBI&#8217;s router takedown that cut off APT28&#8217;s &#8216;tremendous access&#8217;</a></strong></p></li><li><p><strong><a href="https://defensescoop.com/2026/04/07/army-data-operations-center-plans-adoc/">Inside the Army&#8217;s new data operations center and its &#8216;sprint&#8217; to help fix digital headaches</a></strong></p><ul><li><p>DND/CAF are also dealing with various digital headaches, but I am not sure I would describe them as being in a similar &#8220;sprint&#8221; to fix them.</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/sam-altman-home-attack-openai-san-franisco-office-threat/">Suspect Arrested for Allegedly Throwing Molotov Cocktail at Sam Altman&#8217;s Home</a></strong></p></li><li><p><strong><a href="https://therecord.media/senator-launches-inquiry-into-tech-giants-csam">Senator launches inquiry into 8 tech giants for failures to adequately report CSAM</a></strong></p></li><li><p><strong><a href="https://therecord.media/florida-investigates-openai-chatgpt-deadly-shooting">Florida investigates OpenAI for role ChatGPT may have played in deadly shooting</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://therecord.media/cyberattack-hits-northern-ireland-schools">Cyberattack hits Northern Ireland&#8217;s centralized school network, disrupting access for thousands</a></strong></p></li><li><p><strong><a href="https://techcrunch.com/2026/04/07/russian-government-hackers-broke-into-thousands-of-home-routers-to-steal-passwords/">Russian government hackers broke into thousands of home routers to steal passwords</a></strong></p><ul><li><p>Edge devices will always remain a priority target for all cyber threat actors.</p></li></ul></li><li><p><strong><a href="https://linuxiac.com/france-launches-government-linux-desktop-plan-as-windows-exit-begins/">France Launches Government Linux Desktop Plan as Windows Exit Begins</a></strong></p><ul><li><p>This is after France dropped Teams and Zoom in January. It&#8217;s not clear what distro they&#8217;re using, which, honestly, they may not want to make too public but also likely something that will be determined later.</p></li></ul></li><li><p><strong><a href="https://therecord.media/russia-accuses-radio-free-europe-journalist-aiding-ukraine-cyberattack?mkt_tok=Njc4LUZITC03MTAAAAGhFjzQ1CE4sLLTzgOpA4pqhrXW7BaINhNovl5tm6-xPtJKYF9tomKCFIkQ1nXTkIB_60O0FAs_oNePUsNwWwYXCCANf5-CXBaI1kncRmWF">Russia accuses former Radio Free Europe journalist of aiding cyberattacks for Ukraine</a></strong></p></li><li><p><strong><a href="https://dysruptionhub.com/chevin-fleetwave-us-fleet-ops/">U.K.-based Chevin cyber incident disrupts U.S. fleet operations</a> </strong>(H/t Catalin Cimpanu)</p><ul><li><p>The attack is targeting fleet management software.</p></li></ul></li><li><p><strong><a href="https://news.sky.com/story/greece-to-ban-under-15s-from-social-media-from-next-year-13529181">Greece to ban under-15s from social media from next year</a></strong></p><ul><li><p>I would not be surprised if we begin to see this in many more Western countries. Unsure how successful it will be in Canada, but hte liberals are interested in a similar ban.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://www.reuters.com/world/europe/russia-supplies-iran-with-cyber-support-spy-imagery-hone-attacks-ukraine-says-2026-04-07/">Russia supplies Iran with cyber support, spy imagery to hone attacks, Ukraine says</a></strong></p><ul><li><p></p></li></ul></li><li><p><strong><a href="https://edition.cnn.com/2026/04/08/china/china-supercomputer-hackers-hnk-intl">A hacker has allegedly breached one of China&#8217;s supercomputers and is attempting to sell a trove of stolen data</a></strong></p></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/eurail-says-december-data-breach-impacts-300-000-individuals/">Eurail says December data breach impacts 300,000 individuals</a></strong></p></li><li><p><strong><a href="https://www.accessnow.org/mena-phishing-2026/">Espionage for repression: hack-for-hire phishing campaign targets civil society in MENA</a> </strong>(h/t Catalin Cimpanu)</p><ul><li><p>Hack-for-hire is slowly growing as a viable option for cyber criminal groups.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 4/04/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending April 4]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426</guid><pubDate>Tue, 07 Apr 2026 09:05:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/77b8e77b-27f3-46d0-b2f3-fb78b5ff640a_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have two new papers out with the Canadian Global Affairs Institute: </p><ul><li><p><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></p></li><li><p><a href="https://www.cgai.ca/th_pp_everything_you_should_know_about_caf_cyber_command">Everything You Should Know About CAF Cyber Command</a></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>.</p></li></ul></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-40426?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><strong><a href="https://www.dal.ca/news/2026/03/30/agriculture-technology-artificial-intelligence.html">Hackers, barns, and breakfast: Why agriculture needs cybersecurity</a></strong></p><ul><li><p>Agriculture cyber security has been a long time coming.</p></li></ul></li><li><p><strong><a href="https://www.theglobeandmail.com/business/article-rogers-freedom-mobile-data-breaches-telecom-quebecor/">Rogers and Freedom Mobile say they suffered data breaches in recent weeks</a></strong></p><ul><li><p>Have any Canadian telecoms not suffered a breach?</p></li></ul></li><li><p><strong><a href="https://thewalrus.ca/why-does-ottawa-keep-funding-fake-canadian-companies/">Why Does Ottawa Keep Funding Fake Canadian Companies?</a></strong></p><ul><li><p>The definitions of what is a &#8220;Canadian&#8221; company are very loose. This affects cyber and cloud as we have discussed before, but it has larger economic impact that the government is slowly trying to address.</p></li></ul></li><li><p><strong><a href="https://rollingout.com/2026/03/31/oracle-slashes-30000-jobs-with-a-cold-6/">Oracle slashes 30,000 jobs with a cold 6 a.m. email</a></strong></p><ul><li><p>Unclear of the direct impact on Canada, but Oracle has a large presence in Canada, especially in government.</p></li><li><p><strong><a href="https://finance.yahoo.com/markets/stocks/articles/oracle-fired-30-000-workers-174000364.html">Oracle fired up to 30,000 workers via email after a 95% profit surge. Tech companies are cutting almost 1,000 jobs/day</a></strong></p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/shared-services/news/2026/03/government-of-canada-advances-digital-sovereignty-and-secure-communications-through-contract-extension-with-blackberry.html">Government of Canada advances digital sovereignty and secure communications through contract extension with BlackBerry</a></strong></p><ul><li><p>Blackberry has shifted away from its cellphone does and does great now in cybersecurity, so they are ones to keep an eye on.</p></li></ul></li><li><p><strong><a href="https://financialpost.com/news/economy/us-targets-canada-cloud-computing-trade-irritant">U.S. targets Canada&#8217;s cloud-computing move as trade irritant</a></strong></p><ul><li><p>The United States doesn&#8217;t want Canada to have sovereignty. They are incapable of understanding they are the risk we want to avoid.</p></li></ul></li><li><p><strong><a href="https://www.csoonline.com/article/4152830/anthropic-employee-error-exposes-claude-code-source-2.html">Anthropic employee error exposes Claude Code source</a></strong></p><ul><li><p>Company that habitually infringes on other&#8217;s copyright is now concerned about their own copyright. </p></li></ul></li><li><p><strong><a href="https://www.microsoft.com/en-us/microsoft-copilot/for-individuals/termsofuse">Microsoft&#8217;s Terms of Use says Copilot is only for entertainment purposes</a></strong></p><ul><li><p>Exact wording: &#8220;Copilot is for entertainment purposes only. It can make mistakes, and it may not work as intended. Don&#8217;t rely on Copilot for important advice. Use Copilot at your own risk.&#8221;</p><ul><li><p>This should tell you everything you should know about LLMs. They are toys that Microsoft and others are trying to convince you will change the world, while they themselves know it is breaking and making everything worse.</p></li></ul></li></ul></li><li><p><strong><a href="https://www.platformer.news/meta-oversight-board-funding-cancel/">Exclusive: Meta has discussed ending funding to the Oversight Board</a></strong></p><ul><li><p>This should be grounds to increase litigation against Meta and Facebook. This oversight board was setup due to the overwhelming unethical behaviour on behalf of Facebook, now Meta. Meta stands out amongst social media companies in that they seem to actively try to make things worse, more toxic, and harmful all to produce profit.</p></li><li><p>Stop using Facebook.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/pacific-economic-development/news/2026/03/pacifican-invests-138-million-to-advance-defence-innovation-in-ai-and-aerospace-in-british-columbia.html">PacifiCan invests $13.8 million to advance defence innovation in AI and aerospace in British Columbia</a></strong></p><ul><li><p>There&#8217;s a small, but growing defence and security industry in BC.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/economic-development-southern-ontario/news/2026/04/government-of-canada-supports-aerospace-and-space-innovation-to-strengthen-security-boost-prosperity-and-enhance-sovereign-capabilities.html">Government of Canada supports aerospace and space innovation to strengthen security, boost prosperity, and enhance sovereign capabilities</a></strong></p></li><li><p><strong><a href="https://browsergate.eu/">LinkedIn Is Illegally Searching Your Computer</a></strong></p><ul><li><p>Major claims that Microsoft is essentially running one of the largest corporate espionage operations via Linkedin.</p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/news/2026/04/canadian-armed-forces-cyber-command-launches-official-command-badge.html">Canadian Armed Forces Cyber Command launches Official Command Badge</a></strong></p><ul><li><p>They&#8217;ve had an unofficial patch/bade for a while, so great they now have an official command badge.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bzdx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bzdx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 424w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 848w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 1272w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png" width="266" height="344" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a838b55b-7021-4ad9-801e-f4ed76702446_266x344.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:344,&quot;width&quot;:266,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:150864,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/192625842?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Bzdx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 424w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 848w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 1272w, https://substackcdn.com/image/fetch/$s_!Bzdx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa838b55b-7021-4ad9-801e-f4ed76702446_266x344.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li><li><p>&#8220;The green and black field reflects the Command&#8217;s integration of signals intelligence, electronic warfare, and cyber operations across the digital and electromagnetic domains. The green represents signals intelligence heritage, while the black represents electronic warfare and operations within the contested electromagnetic spectrum. The chess knight represents the deliberate application of cyber capabilities in both defensive and offensive contexts. A lightning bolt and interlaced rings highlight operational precision and expertise in signals intelligence, while the Royal Crown and maple leaves affirm constitutional authority and national service.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.nationalobserver.com/2026/04/03/news/alberta-scraps-environmental-assessment-kevin-olearys-worlds-largest-data-centre">Alberta scraps environmental assessment for Kevin O&#8217;Leary&#8217;s &#8216;world&#8217;s largest&#8217; data centre</a></strong></p><ul><li><p>Still in the planning phases so there&#8217;s a chance nothing will come of this, especially with O&#8217;Leary attached to this. However, this lack of environmental assessment is likely to become the norm, which sets a concerning precedent due to how major of an impact data centres can have on local environments and populations.</p></li></ul></li><li><p><strong><a href="https://www.cbc.ca/news/canada/london/officials-still-investigating-what-led-to-cyber-incident-at-london-health-unit-9.7121106">Officials still investigating what led to cyber incident at London health unit</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/03/cafcybercom-showcases-new-ai-cyber-tool-nato-exercise.html">CAFCYBERCOM showcases new AI cyber tool at NATO exercise</a></strong></p><ul><li><p>I have heard of this tool before, but I don&#8217;t know much about it other than that it&#8217;s really well liked and getting a lot of attention</p></li><li><p>&#8220;The capability, a Cyber Indications and Warning (I&amp;W) tool, was designed and developed by five members of 33 Signals Regiment working on Class A time since January 2025. Their objective was to explore how large language models could support cyber operations through analysis, translation, and geolocation, while also enabling the seamless sharing of insights into a broader operational picture.&#8221;</p></li></ul></li><li><p><strong><a href="https://www.newswire.ca/news-releases/larus-awarded-8-3m-contract-by-department-of-national-defence-to-advance-ai-powered-tactical-intelligence-in-partnership-with-the-canadian-army-896794905.html">Larus awarded an $8.3 million IDEaS Test Drive contract by DND to advance AI/ML in tactical planning and decision intelligence</a></strong></p></li><li><p><strong><a href="https://www.cbc.ca/news/canada/kitchener-waterloo/security-incident-personal-health-information-exposed-waterloo-region-health-network-9.7149980">&#8216;Security incident&#8217; may have exposed files of thousands of patients, Waterloo Regional Health Network warns</a></strong></p></li><li><p><strong><a href="https://betakit.com/canadas-first-full-stack-university-owned-quantum-computer-comes-to-usask/">Canada&#8217;s first full-stack, university-owned quantum computer comes to USask</a></strong></p><ul><li><p>Some of the best uses for quantum computers remain to write academic papers about, but we&#8217;re slowly getting to more operational use with hybrid computing.</p></li></ul></li><li><p><strong><a href="https://betakit.com/ngen-announces-nearly-80-million-for-canadian-manufacturers-to-adopt-ai/">NGen announces nearly $80 million for Canadian manufacturers to adopt AI</a></strong></p></li><li><p><strong><a href="https://www.canada.ca/en/treasury-board-secretariat/news/2026/04/government-of-canada-launches-review-of-the-privacy-act.html">Government of Canada launches review of the Privacy Act</a></strong></p><ul><li><p>Canada is LONG overdue for updated privacy laws. </p></li></ul></li><li><p><strong><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/04/canada-is-expanding-high-speed-internet-access-in-nunavut.html">Canada is expanding high-speed Internet access in Nunavut</a></strong></p><ul><li><p>$86 million federal investment, piggybacks off the <a href="https://www.canada.ca/en/innovation-science-economic-development/news/2020/11/universal-broadband-fund-and-telesat-low-earth-orbit-capacity-agreement.html">$600 million contract w/Telesat</a></p></li></ul></li><li><p><strong>CDW Canada: <a href="https://finance.yahoo.com/sectors/technology/articles/cyberattacks-targeting-canadian-enterprises-surge-121500060.html">Cyberattacks Targeting Canadian Enterprises Surge Nearly 80% Year Over Year</a></strong></p><ul><li><p>Report from CDW Canada has some very interesting info and statistics. Suggest that there is a &#8220;security maturity illusion.&#8221; which is a common topic, but fascinating that it is getting to a level that a cybersecurity firm is saying it&#8217;s impacting the wider Canadian threat surface.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canadian Cyber Intelligence</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><strong><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-006-vulnerability-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2026-3055">Alert - AL26-006 - Vulnerability impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2026-3055</a></strong></p><ul><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks/">Critical Citrix NetScaler memory flaw actively exploited in attacks</a></strong></p><ul><li><p>Citrix used to be quite common in Canada amongst businesses, but not sure what its market presence is these days.</p></li></ul></li></ul></li><li><p><strong><a href="https://opensourcemalware.com/blog/axios-compromised">One of the most popular JavaScript packages on earth Axios has been compromised</a></strong></p><ul><li><p>I&#8217;ve been saying for a year now that there needs to be industry- and government-wide engagement to address the growing security problem with open-source software.</p></li><li><p><strong><a href="https://therecord.media/google-links-axios-supply-chain-attack-north-korea">Google links axios supply chain attack to North Korean group</a></strong></p><ul><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package">Google&#8217;s report here</a></p></li></ul></li></ul></li><li><p><strong><a href="https://www.theregister.com/2026/03/31/iran_password_spraying_m365/">Iran targets M365 accounts with password-spraying attacks</a></strong></p><ul><li><p>They&#8217;ve been doing M365 password spraying for years</p></li></ul></li><li><p><strong><a href="https://blog.talosintelligence.com/qilin-edr-killer/">Qilin EDR killer infection chain</a></strong></p></li><li><p><strong><a href="https://workspaceupdates.googleblog.com/2026/03/ransomware-detection-and-file-restoration-for-Google-Drive-now-generally-available.html">Ransomware detection and file restoration for Google Drive now generally available</a></strong></p></li><li><p><strong><a href="https://www.theregister.com/2026/03/31/red_hat_ai_dev/">Leaked memo suggests Red Hat&#8217;s chugging the AI Kool-Aid</a></strong></p></li><li><p><strong><a href="https://adversa.ai/claude-code-security-bypass-deny-rules-disabled/">Critical Claude Code vulnerability: Deny rules silently bypassed because security checks cost too many tokens</a></strong></p></li><li><p><strong><a href="https://therecord.media/new-criminal-service-plans-to-monetize-ransomware-data">New criminal service plans to monetize data stolen by ransomware gangs</a></strong></p><ul><li><p>This is a particularly concerning innovation. If successful, this will change the cyber crime market.</p></li></ul></li><li><p><strong><a href="https://dti.domaintools.com/research/dprk-malware-modularity-diversity-and-functional-specialization">DPRK Malware Modularity: Diversity and Functional Specialization</a></strong></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><strong><a href="https://www.bbc.co.uk/mediacentre/2025/new-ebu-research-ai-assistants-news-content">Largest study of its kind shows AI assistants misrepresent news content 45% of the time &#8211; regardless of language or territory</a></strong></p><ul><li><p>This will change nothing. Those selling you AI will downplay this.</p></li></ul></li><li><p><strong><a href="https://www.bleepingcomputer.com/news/security/evolution-of-ransomware-multi-extortion-ransomware-attacks/">Evolution of Ransomware: Multi-Extortion Ransomware Attacks</a></strong></p></li><li><p><strong><a href="https://www.lawfaremedia.org/article/the-perils-of-privatized-cyberwarfare">The Perils of Privatized Cyberwarfare</a></strong></p><ul><li><p>By Ron Deibert from Citizen Lab, who is on the forefront of defending civilians from privatized cyber warfare.</p></li></ul></li><li><p><strong>Event: <a href="https://www.nationalacademies.org/units/DEPS-CSTB-13-03/event/46521">Securing AI systems: New challenges and research priorities</a></strong></p><ul><li><p>Being held April 20-21, online attendance is possible.</p></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:193351972,&quot;url&quot;:&quot;https://teresascassa.substack.com/p/consultation-on-long-overdue-privacy&quot;,&quot;publication_id&quot;:3380257,&quot;publication_name&quot;:&quot;Teresa Scassa&#8217;s Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0Wwc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;title&quot;:&quot;Consultation on long overdue Privacy Act reform promises a significant overhaul&quot;,&quot;truncated_body_text&quot;:&quot;Treasury Board Secretariat has published a discussion paper and launched a consultation into the long-overdue reform of the federal Privacy Act. The consultation is open until July 10, 2026.&quot;,&quot;date&quot;:&quot;2026-04-06T13:45:56.190Z&quot;,&quot;like_count&quot;:5,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:103039402,&quot;name&quot;:&quot;Teresa Scassa&quot;,&quot;handle&quot;:&quot;tscassa&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;bio&quot;:&quot;I'm a law professor at the University of Ottawa, where I hold the Canada Research Chair in Information Law and Policy. My research areas include privacy law, AI regulation, and data governance. All opinions and commentary are my own.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-11-19T15:35:43.741Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:3444266,&quot;user_id&quot;:103039402,&quot;publication_id&quot;:3380257,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3380257,&quot;name&quot;:&quot;Teresa Scassa&#8217;s Substack&quot;,&quot;subdomain&quot;:&quot;teresascassa&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Posts about developments in law and technology with a focus on AI, privacy, and data governance.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;author_id&quot;:103039402,&quot;primary_user_id&quot;:103039402,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-19T16:15:47.041Z&quot;,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;Teresa Scassa&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://teresascassa.substack.com/p/consultation-on-long-overdue-privacy?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!0Wwc!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg" loading="lazy"><span class="embedded-post-publication-name">Teresa Scassa&#8217;s Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Consultation on long overdue Privacy Act reform promises a significant overhaul</div></div><div class="embedded-post-body">Treasury Board Secretariat has published a discussion paper and launched a consultation into the long-overdue reform of the federal Privacy Act. The consultation is open until July 10, 2026&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 months ago &#183; 5 likes &#183; Teresa Scassa</div></a></div></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="http://Meta ordered to pay $375m after being found liable in child exploitation case">Meta ordered to pay $375m after being found liable in child exploitation case</a></strong></p></li><li><p><strong><a href="https://www.404media.co/how-thomson-reuters-powers-ice-and-palantir/">How Thomson Reuters Powers ICE and Palantir</a></strong></p><ul><li><p>Data brokers generally don&#8217;t care about ethics.</p></li></ul></li><li><p><strong><a href="https://therecord.media/iran-hackers-state-department-reward">State Department reissues $10 million reward for info on Iranian hackers</a> (Handala)</strong></p></li><li><p><strong><a href="https://www.cnbc.com/2026/04/01/iran-irgc-nvidia-appple-attack-threat.html">Iran threatens Nvidia, Apple and other tech giants with attacks</a></strong></p><ul><li><p>Also includes Cisco, HP, Intel, Oracle, IBM, Dell, Palantir, JPMorgan, Tesla, GE, and more. </p></li></ul></li><li><p><strong><a href="https://therecord.media/hasbro-takes-some-systems-offline-after-cyber-incident">Hasbro takes some systems offline after cybersecurity incident</a></strong></p><ul><li><p>May need a few weeks to recover.</p></li></ul></li><li><p><strong><a href="https://www.wcvb.com/article/cyberattack-town-public-safety-systems-patriot-regional/70908585">&#8216;Serious cyberattack&#8217; impacts phones, public safety systems in Massachusetts towns</a></strong></p></li><li><p><strong><a href="https://www.politico.com/news/2026/04/01/fbi-hack-surveillance-system-major-incident-00854237">FBI declares suspected Chinese hack of US surveillance system a &#8216;major cyber incident&#8217;</a></strong></p></li><li><p><strong><a href="https://www.nextgov.com/people/2026/03/new-nsa-director-pushes-more-intel-sharing-allies-internal-meeting/412350/">New NSA director pushes for more intel-sharing with allies in internal meeting</a></strong></p><ul><li><p>This is good to hear. He is former Indo-Pacific deputy commander, so that likely plays a role in his understanding that partnerships are key.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/02/ice-says-it-bought-paragons-spyware-to-use-in-drug-trafficking-cases/">ICE says it bought Paragon&#8217;s spyware to use in drug trafficking cases</a></strong></p><ul><li><p>Acting Director states they will comply with constitutional requirements. Somehow we&#8217;re supposed to believe ICE, which has a greater track record than any other agency of infringing on people&#8217;s constitutional rights.</p></li><li><p><strong><a href="https://summerlee.house.gov/newsroom/press-releases/rep-summer-lee-colleagues-slam-dhs-response-on-ice-use-of-foreign-spyware-vow-continued-oversight">Rep. Summer Lee, Colleagues Slam DHS Response on ICE Use of Foreign Spyware, Vow Continued Oversight</a></strong></p></li></ul></li><li><p><strong><a href="https://federalnewsnetwork.com/cybersecurity/2026/04/cybercorps-grads-consider-private-sector-as-fed-hiring-challenges-persist/">CyberCorps grads consider private sector as fed hiring challenges persist</a></strong></p><ul><li><p>CyberCorps is a program of the US Office of Personnel Management to provide scholarship for cybersecurity professionals. It has been a great program to bring cybersecurity professionals in the government and has been a constant source of people. The Trump admin has completely destroyed its government cybersecurity workforce and institutions.</p></li></ul></li><li><p><strong><a href="https://www.wired.com/story/artemis-ii-microsoft-outlook-problems/">Even Artemis II Astronauts Have Microsoft Outlook Problems</a></strong></p><ul><li><p>At the end of time and the universe there will be Microsoft Outlook problems.</p></li></ul></li><li><p><strong><a href="https://federalnewsnetwork.com/defense-news/2026/04/dod-still-failing-to-properly-mark-cui-data-years-after-initial-audit/">DoD still failing to properly mark CUI data years after initial audit</a></strong></p></li><li><p><strong><a href="https://defensescoop.com/2026/03/31/army-cybersecurity-training-policy-change/">Commanders now responsible for cybersecurity training after Army cuts online course requirement to once every 5 years</a></strong></p><ul><li><p>This is a hilariously bad idea. China and DPRK have growing and more advanced cyber operations programs, but the Army is relaxing cybersecurity training.</p></li></ul></li><li><p><strong><a href="https://fortune.com/2026/04/02/mercor-ai-startup-security-incident-10-billion/">Mercor, a $10 billion AI startup that works with companies including OpenAI and Anthropic, confirms major data breach</a></strong></p></li><li><p><strong><a href="https://chinaselectcommittee.house.gov/media/press-releases/house-committee-passes-chip-security-act">House Committee Passes Chip Security Act</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><strong><a href="https://www.prospectmagazine.co.uk/ideas/technology/72853/rise-facial-recognition-policing">The rise of facial recognition policing</a></strong></p><ul><li><p>This is a UK-focused article, but has global implications.</p></li></ul></li><li><p><strong><a href="https://therecord.media/european-commission-downplays-shinyhunters-cyber-claim">European Commission downplays ShinyHunters cyberattack impact</a></strong></p><ul><li><p>ShinyHunters do have a history of overblowing their extortion attempts. However, most ransomware and extortion cyber threat actors tend to do the same, so it&#8217;s why everything they cyber threat actors claim should always be taken cautiously.</p></li></ul></li><li><p><strong><a href="https://techcrunch.com/2026/04/03/europes-cyber-agency-blames-hacking-gangs-for-massive-data-breach-and-leak/">Europe&#8217;s cyber agency blames hacking gangs for massive data breach and leak</a></strong></p><ul><li><p>&#8220;The stolen data was then posted online by another hacking group, the notorious ShinyHunters. &#8220;</p></li></ul></li><li><p><strong>(Google Translated) <a href="https://www.repubblica.it/tecnologia/2026/04/01/news/meta_denuncia_spyware_clone_di_whatsapp-425257968/">An Italian company&#8217;s spyware was posing as WhatsApp. Meta: &#8220;Affected users notified.&#8221;</a></strong></p></li><li><p><strong><a href="https://www.techpolicy.press/uk-cloud-regulator-opts-for-voluntary-commitments-launches-microsoft-investigation/">UK Regulator Probes Microsoft While Backing Voluntary Cloud Rules</a></strong></p></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><strong><a href="https://www.404media.co/an-ai-agent-was-banned-from-creating-wikipedia-articles-then-wrote-angry-blogs-about-being-banned/">An AI Agent Was Banned From Creating Wikipedia Articles, Then Wrote Angry Blogs About Being Banned</a></strong></p><ul><li><p>Didn&#8217;t take them long to ban their first clanker.</p></li></ul></li><li><p><strong><a href="https://restofworld.org/2026/ai-avatar-colombia-political-candidate">An AI avatar is running to represent Indigenous voters in Colombia</a></strong></p></li><li><p><strong>Australia: <a href="https://www.esafety.gov.au/newsroom/media-releases/five-social-media-platforms-flagged-for-compliance-issues">Five social media platforms flagged for compliance issues</a></strong></p><ul><li><p>Facebook, Instagram, Snapchat, TikTok and YouTube are being investigated related to Australia&#8217;s social media minimum age laws.</p></li></ul></li><li><p><strong>(Google Translated) <a href="https://www.kisa.or.kr/402/form?postSeq=2580&amp;page=1">Korea Internet &amp; Security Agency Launches &#8216;Ransomware Full Lifecycle Response Task Force&#8217;</a></strong></p><ul><li><p>There has been a spat of high level ransomware incidents in South Korea of late, so this is an unsurprising, but welcome response.</p></li></ul></li><li><p><strong><a href="https://gizmodo.com/iran-says-it-hit-oracle-facilities-in-uae-2000741785">Iran Says It Hit Oracle Facilities in the UAE</a></strong></p><ul><li><p>Not the first data centres hit, but now confirms and shows that data centres are a target in military conflict.</p></li></ul></li><li><p><strong><a href="https://cityhub.com.au/sydney-councils-warn-data-centre-boom/">Sydney Councils Warn Data Centre Boom Is Set To Strain Housing And Utilities</a></strong></p><ul><li><p>Good article as this strain is going on everywhere right now. Because Western countries can no longer trust the United States, there&#8217;s a mad rush to develop sovereign data centres.</p></li></ul></li><li><p><strong><a href="https://www.aljazeera.com/news/2026/4/3/cambodia-parliament-approves-law-to-combat-cybercrime-scam-rings">Cambodia parliament approves law to combat cybercrime scam rings</a></strong></p></li><li><p><strong><a href="https://www.wired.com/story/inside-the-hack-that-exposed-syrias-security-failures/">The Hack That Exposed Syria&#8217;s Sweeping Security Failures</a></strong></p><ul><li><p>I&#8217;m not a fan of this article, but it is important to share. This sort of overlooks the context for which Syria is in and assumes a similar baseline of capacity.</p></li></ul></li><li><p><strong><a href="https://latinamericanpost.com/science-technology/mexico-confronts-a-silent-cyber-war-it-can-no-longer-outsource/">Mexico Confronts a Silent Cyber War. It Can No Longer Outsource</a></strong> (H/t <a href="https://sherpaintelligence.substack.com/">Sherpa Intelligence, go give them a follow</a>)</p><ul><li><p>As Mexico increasingly digitizes, it becomes the primary target in Latin America for cyber attacks.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 28/03/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending March 28]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326</guid><pubDate>Mon, 30 Mar 2026 13:43:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6be036aa-0f5e-47b7-b997-33c37747136d_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have a new paper out with the Canadian Global Affairs Institute: </p><ul><li><p><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>!</p><ul><li><p>The article is finally out and can be <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">read here</a>.</p></li></ul></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280326?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p><a href="https://betakit.com/spark-microsystems-secures-additional-17-million-in-series-b-funding/">Spark Microsystems secures additional $17 million in Series B funding</a></p><ul><li><p>Spark specializes in next-gen short-range wireless communications. </p></li></ul></li><li><p>Online Privacy at Stake in Cambridge Analytica Supreme Court of Canada Case</p></li><li><p><a href="https://betakit.com/cohere-teams-up-with-swedish-defence-firm-saab-on-ai-for-surveillance-jets/">Cohere teams up with Swedish defence firm Saab on AI for surveillance jets</a></p><ul><li><p>Canadian AI darling Cohere is starting to make increasingly big moves into defence.</p></li></ul></li><li><p><a href="https://abacusdata.ca/canadians-split-on-ai-data-centres-as-cost-concerns-and-local-opposition-emerge/">Canadians Split on AI Data Centres as Cost Concerns and Local Opposition Emerge</a></p><ul><li><p>New data from Abacus Data concerning Canadian attitudes towards AI data centres, which can likely be applied to data centres broadly despite there unique differences as the public is unlikely to care about the distinction when they both have massive impacts.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lUTn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lUTn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 424w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 848w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 1272w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lUTn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png" width="930" height="725" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:725,&quot;width&quot;:930,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:80122,&quot;alt&quot;:&quot;\&quot;At a broad level, Canadians are divided on whether building more AI data centres in the country is a good idea. Overall, 38% say it would be a good thing, including 12% who say it would be a very good thing, while 37% believe it would be a bad thing, including 21% who say it would be very bad. Another 9% say it would be neither good nor bad, and 15% say they don&#8217;t know enough to offer an opinion.\&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/191891137?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="&quot;At a broad level, Canadians are divided on whether building more AI data centres in the country is a good idea. Overall, 38% say it would be a good thing, including 12% who say it would be a very good thing, while 37% believe it would be a bad thing, including 21% who say it would be very bad. Another 9% say it would be neither good nor bad, and 15% say they don&#8217;t know enough to offer an opinion.&quot;" title="&quot;At a broad level, Canadians are divided on whether building more AI data centres in the country is a good idea. Overall, 38% say it would be a good thing, including 12% who say it would be a very good thing, while 37% believe it would be a bad thing, including 21% who say it would be very bad. Another 9% say it would be neither good nor bad, and 15% say they don&#8217;t know enough to offer an opinion.&quot;" srcset="https://substackcdn.com/image/fetch/$s_!lUTn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 424w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 848w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 1272w, https://substackcdn.com/image/fetch/$s_!lUTn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26314212-5f2b-4790-a7d1-b3c2b0ce5064_930x725.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://abacusdata.ca/canadians-split-on-ai-data-centres-as-cost-concerns-and-local-opposition-emerge/">Abacus Data</a></figcaption></figure></div></li></ul></li><li><p><a href="https://theijf.org/article/fire-rises-extremism-video-games">Federal government worried extremists recruiting through video games</a></p><ul><li><p>They are, but it&#8217;s a multi-prong issue. Toxic gaming culture is super prevalent that encourages extremist views and takes, which makes individuals predisposed to be influenced.</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/canada/nova-scotia/pc-mla-rick-burns-hackers-blackmail-intimate-images-9.7134004">PC MLA says hackers accessed and shared intimate images on his devices</a></p><ul><li><p>I am honestly surprised this does not occur more often, but I'm glad the MLA didn&#8217;t pay and is working with police and the RCMP.</p></li></ul></li><li><p><a href="https://archive.is/ELrCI#selection-3765.26-3765.137">Canada rejected her permanent residence application. Her job duties were made up &#8212; by Immigration&#8217;s AI reviewer</a></p><ul><li><p>This is just the start. More is to come as the CRA is experiencing MASSIVE cuts and will be investing significantly into AI.</p></li></ul></li><li><p><a href="https://www.ipc.on.ca/en/media-centre/news-releases/statement-on-proposed-fippa-changes-march-24">Updated statement on proposed changes to Ontario&#8217;s Freedom of Information and Protection of Privacy Act</a></p><ul><li><p>Ontario&#8217;s Privacy Commissioner updates their statement on the Ontario government&#8217;s attempts to exempt the premier and high levels of provincial government from freedom of information requests.</p></li><li><p>This is a great statement and really goes to the heart that Doug Ford is trying to hide what he is doing and prevent accountability. Doug Ford hates transparency and doesn&#8217;t want to be held accountable for his activities.</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/business/technology/article-coolit-sold-to-ecolab-for-475-billion-in-one-of-biggest-ever-canadian/">CoolIT sold to Ecolab for $4.75-billion in one of biggest-ever Canadian tech takeovers</a></p><ul><li><p>Oh look, another Canadian company sold to American company. Bought by private equity, no less. Guess that means we should start counting until another private equity firm destroys a company.</p></li></ul></li><li><p><a href="https://www.cyber.gc.ca/en/news-events/joint-guidance-securing-space-cyber-security-low-earth-orbit-satellite-communications">Joint guidance on securing space and cyber security for low earth orbit satellite communications</a></p><ul><li><p>Canada&#8217;s CCCS joins Australia, New Zealand, and the United States.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/26/cohere-launches-an-open-source-voice-model-specifically-for-transcription/">Cohere launches an open-source voice model specifically for transcription</a></p><ul><li><p>A nice move by Cohere. I&#8217;ll hold off until third-party verification of how good their model is, but with so many transcription models out there for voice-to-text, many are bad. Cohere is releasing an open source model based on Cohere&#8217;s tech and work, this could be great for those with disabilities, like myself, who use transcriptions of other people&#8217;s speech to help them.</p></li></ul></li><li><p><a href="https://betakit.com/opentext-employees-report-job-cuts-tied-to-apparent-restructuring/">OpenText lays off four percent of its global workforce</a></p></li><li><p><a href="https://betakit.com/denvr-partners-with-dominion-dynamics-on-drone-development/">Denvr signs two defence deals to deepen sovereign AI push in Canada</a></p><ul><li><p>Deals signed with Dominion Dynamics and Sapper Labs. Sapper Labs is pretty well known in Canada's cyber defence scene, so this automatically catches my eye.</p></li></ul></li><li><p><a href="https://theijf.org/article/osfi-cybersecurity-self-assessment?utm_source=Investigative+Journalism+Foundation">Can&#173;ada&#8217;s banking regulator gives itself substandard score on cybersecurity</a></p><ul><li><p>I provided some comments for this story.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/03/caf-and-five-eyes.html">CAF and Five Eyes partners advance Cyber Mission Assurance in pre-RIMPAC 26 tabletop exercise</a></p><ul><li><p>CAFCYBERCOM is doing a lot in the Indo-Pacific.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/economic-development-quebec-regions/news/2026/03/government-of-canada-invests-36m-in-defence-sector-with-support-for-universite-du-quebec-en-outaouais.html">Government of Canada invests $3.6M in defence sector with support for Universit&#233; du Qu&#233;bec en Outaouais</a></p><ul><li><p>A big part of this will be going towards cybersecurity range. I should likely map out how many cyber ranges there are in Canada. Just a few years ago, I would likely count on one hand, but now I feel like there&#8217;s been a major boom in just the last couple years.</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/canada/nova-scotia/hacked-power-security-data-breach-9.7141893">Nova Scotia Power agrees to beef up security after customer data breached</a></p><ul><li><p>They are responding to a compliance letter from Canada&#8217;s privacy commissioner.</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11748030/carney-3-billion-defence-projects/">Prime minister commits more than $3B for defence projects in the Maritimes</a></p><ul><li><p>A significant part of this will be cyber, information, and communications technology related.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/democratic-institutions/news/2026/03/government-of-canada-introduces-measures-to-further-protect-canadas-electoral-processes-and-strengthen-democracy.html">Bill C-25: Government of Canada introduces measures to further protect Canada&#8217;s electoral processes and strengthen democracy</a></p><ul><li><p>A few cyber-related aspects of this new bill. Includes privacy policy requirements and requirement to disclose data breaches, and bans deepfakes.</p></li><li><p><a href="https://www.parl.ca/DocumentViewer/en/45-1/bill/C-25/first-reading">Read the full Bill C-25 here</a></p></li></ul></li><li><p><a href="https://www.canada.ca/en/financial-consumer-agency/news/2026/03/final-report-from-the-second-financial-industry-forum-on-artificial-intelligence-fifai-2-now-available.html">Final report from the second Financial Industry Forum on Artificial Intelligence (FIFAI 2) now available</a></p><ul><li><p>Final report for the forum held last year.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/competition-bureau/news/2026/03/competition-bureaus-experts-available-to-discuss-ai-generated-government-impersonation-scams-with-media.html">Competition Bureau&#8217;s experts available to discuss AI-generated government impersonation scams with media</a></p><ul><li><p>Appears competition bureau is increasingly concerned about AI-generated government scams.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/03/minister-sidhu-and-indias-minister-of-commerce-and-industry-continue-to-strengthen-canadaindia-trade-cooperation.html">Canada and India Advance Dialogue on Digital Trade and Bilateral Economic Agreement</a></p><ul><li><p>Includes digital trade.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf">NIST updates Secure Domain Name System (DNS) Deployment Guide</a></p><ul><li><p>First update in a decade! As they say, it&#8217;s always DNS.</p></li></ul></li><li><p><a href="https://databreaches.net/2026/03/23/if-threat-actors-gave-you-a-chance-to-redact-the-patient-data-they-hacked-before-they-leak-it-would-you-take-them-up-on-the-offer-read-about-the-woundtech-incident/">If threat actors gave you a chance to redact the patient data they hacked before they leak it, would you take them up on the offer? Read about the Woundtech incident</a> (H/t Catalin Cimpanu)</p><ul><li><p>Very interesting case of a cyber threat actor targeting a health care provider and taking considerable effort to redact patient data. Even offering Woundtech to redact the data themselves.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-exploited-secure-fmc-flaw-in-zero-day-attacks-since-january/">Ransomware gang exploits Cisco flaw in zero-day attacks since January</a></p></li><li><p><a href="https://www.securityweek.com/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors/">&#8216;DarkSword&#8217; iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors</a></p><ul><li><p>More technical reporting on the Coruna exploit/toolkit</p></li></ul></li><li><p><a href="https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html">GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers</a></p><ul><li><p>Github/open source attacks. So hot right now.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/github-adds-ai-powered-bug-detection-to-expand-security-coverage/">GitHub adds AI-powered bug detection to expand security coverage</a></p><ul><li><p>And in response Github is trying to beef up their security</p></li></ul></li><li><p><a href="https://www.legitsecurity.com/blog/the-trivy-supply-chain-compromise-what-happened-and-playbooks-to-respond">The Trivy Supply Chain Compromise: What Happened and Playbooks to Respond</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday/">CISA orders feds to patch max-severity Cisco flaw by March 22</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">Canada needs a secure-coding policy &#8212; and AI is making that more urgent</a></p><ul><li><p>My new op-ed about the need for a secure-coding policy.</p></li></ul></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026">M-Trends 2026: Data, Insights, and Strategies From the Frontlines</a></p><ul><li><p>Dwell time increases as hand-off window &#8220;collapses&#8221; to 22 seconds. A lot of concerning trends, however, one positive trend is detections are up.</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/business/commentary/article-digital-sovereignty-data-tech/">Can Canada ever have true digital sovereignty?</a></p><ul><li><p>Good op-ed, which really gets to the heart of current debates: &#8220;When in doubt, remember that sovereignty is determined by which court can compel the access of data, not where that data is ultimately stored.&#8221;<br></p></li></ul></li><li><p><a href="https://www.linkedin.com/pulse/defence-industrial-strategys-initial-spending-hoped-da-mota-ph-d--fmsle/">The Defence Industrial Strategy&#8217;s initial spending is not as Canadian as hoped</a></p><ul><li><p>Some good research by ana anlyst from the Canadian Shield Institute.</p></li></ul></li><li><p><a href="https://www.science.org/doi/10.1126/science.aec8352">Sycophantic AI decreases prosocial intentions and promotes dependence</a></p><ul><li><p>Some great research on impacts of the use of certain types of AI models</p></li></ul></li><li><p><a href="https://www.tradecommissioner.gc.ca/en/trade-events-training/2026/09/international-defense-industry-exhibition-mspo.html">International Defence Industry Exhibition (MSPO 2026)</a></p><ul><li><p>Apply to join Canadian delegation to Europe&#8217;s third largest defence and security trade show.</p></li></ul></li><li><p><a href="https://cybersecurecatalyst.ca/advancing-defence/">Rogers Cybersecure Catalyst held a Defence Sector 101 catered for cyber and dual-use technology sectors.</a></p><p></p></li></ul><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><a href="https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers">FCC Updates Covered List to Include Foreign-Made Consumer Routers</a></p><ul><li><p>The FCC basically just banned all consumer routers not made in the United States. This will be a major disruption.</p></li></ul></li><li><p><a href="https://abcnews.com/amp/Politics/state-department-launches-effort-counter-cyberattacks-ai-risks/story?id=131265350">State Department launches effort to counter cyberattacks, AI risks from Iran, others </a></p><ul><li><p>Just in case you forgot that the United States is run by the biggest of idiots: <a href="https://www.cybersecuritydive.com/news/state-department-cyber-bureau-firings-reorganization/753370/">In July 2025, the State Department began to dismantle their Bureau of Cyberspace and Digital Policy.</a></p></li></ul></li><li><p><a href="https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/">Google launches threat disruption unit, stops short of calling it &#8216;offensive&#8217;</a></p><ul><li><p>Although we&#8217;re not likely to see cyber letters of marquee, we&#8217;re going to see private actors getting into &#8220;disruption.&#8221;</p></li><li><p>An explanation from one of the heads of Google Threat Intelligence&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Oa2f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Oa2f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 424w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 848w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 1272w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png" width="572" height="702" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:702,&quot;width&quot;:572,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79177,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/191891137?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Oa2f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 424w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 848w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 1272w, https://substackcdn.com/image/fetch/$s_!Oa2f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c003ded-2d3d-48b5-a272-33684fdaa2a6_572x702.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul></li><li><p><a href="https://therecord.media/stryker-cyberattack-malware-iran">Stryker says malware was involved in recent cyberattack as production lines reopen</a></p><ul><li><p>Stryker originally said malware was not used, so it is now unclear to what degree Stryker is releasing information for PR reasons versus what information is about the attack.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/24/crunchyroll-confirms-data-breach-after-hacker-claims-unauthorized-access/">Crunchyroll confirms data breach after hacker claims unauthorized access</a></p><ul><li><p>The attack stole customer service ticket information via a third-party vendor, which makes me suspect they may use this data to target customers.</p></li></ul></li><li><p><a href="https://www.wired.com/story/when-satellite-data-becomes-a-weapon/">When Satellite Data Becomes a Weapon</a></p><ul><li><p>Focused on the US, but this is universal and impacts Canada a lot.</p></li></ul></li><li><p><a href="https://www.wired.com/story/using-a-vpn-may-subject-you-to-nsa-spying/">Using a VPN May Subject You to NSA Spying</a></p><ul><li><p>The logic here is sound whereby the US is actively encouraging its citizens to use foreign VPNs to enable greater surveillance of their citizens.</p></li></ul></li><li><p><a href="https://www.axios.com/2026/03/27/fbi-kash-patel-iran-cyberattack">Iran-linked group claims hack of FBI Director Kash Patel</a></p><ul><li><p>Handala has claimed responsibility, who are also the ones behind the Stryker attack.</p></li><li><p><a href="https://therecord.media/fbi-confirms-theft-of-directors-personal-emails-iran-group">FBI confirms theft of director&#8217;s personal emails by Iran-linked hacking group</a></p></li></ul></li><li><p><a href="https://databreaches.net/2026/03/18/the-internet-yiff-machine-leaks-millions-of-anonymous-tips-to-ddosecrets/">The &#8220;Internet YIFF Machine&#8221; leaks millions of &#8220;anonymous&#8221; tips to DDoSecrets</a></p><ul><li><p>Anonymous tip line for police leaked.</p></li></ul></li><li><p><a href="https://www.economist.com/united-states/2026/03/22/america-goes-on-cyber-offence">America goes on cyber-offence</a></p><ul><li><p>Economist article about the US&#8217; new cyber strategy and Iran.</p></li></ul></li><li><p><a href="https://www.wired.com/story/a-school-district-tried-to-help-train-waymos-to-stop-for-school-buses-it-didnt-work/">A School District Tried to Help Train Waymos to Stop for School Buses. It Didn&#8217;t Work</a></p><ul><li><p>Businesses argue that their technology should be exempt from laws while humans continue to suffer. </p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><a href="https://therecord.media/russia-malware-arrest-clayrat">Russia-linked malware operation collapses after security failures, developer&#8217;s arrest</a></p></li><li><p><a href="https://www.heise.de/en/news/Vulnerability-in-CampusNet-Addresses-of-over-one-million-students-exposed-online-11218902.html">Vulnerability in German CampusNet:Addresses of over one million students exposed online</a></p></li><li><p><a href="https://techcrunch.com/2026/03/25/russia-arrests-alleged-owner-of-cybercrime-forum-leakbase-report-says/">Russia arrests alleged owner of cybercrime forum LeakBase, report says</a></p><ul><li><p>Russia arresting cyber criminals is still relatively rare as many will cooperate with Russian intelligence services and police, but this uneasy alliance has been strained in recent years.</p></li></ul></li><li><p><a href="https://www.iwf.org.uk/news-media/news/dangerous-ai-child-sexual-abuse-reaches-record-high-as-public-backs-clampdown-on-uncensored-tools/">&#8216;Dangerous&#8217; AI child sexual abuse reaches record high as public backs clampdown on &#8216;uncensored&#8217; tools</a></p><ul><li><p>Internet Watch Foundation identified over 8,000 AI-generated videos and images of child sexual abuse in 2025. How much of this was Grok?</p></li></ul></li><li><p><a href="https://www.bloomberg.com/news/newsletters/2026-03-18/chinese-partnerships-with-european-universities-stir-security-concerns">Chinese Partnerships With European Universities Stir Security Concerns</a></p><ul><li><p>Funny how China is okay with Europeans sharing/bringing research to China, but doesn&#8217;t want Chinese researchers sharing research or threat information with anyone outside of China.</p></li></ul></li><li><p><a href="https://www.c4isrnet.com/global/europe/2026/03/27/ukrainian-drones-hit-all-three-baltic-states-did-russia-redirect-them/">Ukrainian drones hit all three Baltic States &#8722; did Russia redirect them?</a></p><ul><li><p>Cyber Electro Magnetic Activities (CEMA) is the name of the game now for militaries. It is why CAFCYBERCOM commands electronic warfare in addition to cyber.</p></li></ul></li><li><p><a href="https://arstechnica.com/tech-policy/2026/03/elon-musk-loses-big-in-court-x-boycott-perfectly-legal/">Elon Musk loses big in court; X boycott perfectly legal</a></p><ul><li><p>Musk&#8217;s efforts to stiffle free speech and association fails and said to be a &#8220;fishing expedition.&#8221; Just a reminder that Musk profited off of CSAM. Yet, MInister of AI Solomon still believes X is a reputable platform.</p></li></ul></li><li><p><a href="https://therecord.media/ransomware-ukraine-russia-bearlyfy">Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware</a></p></li><li><p><a href="https://www.kommersant.ru/doc/8533998">The Not so Great Firewall of Russia to increase capacity by 2.5 times by 2030</a></p><ul><li><p>Russia is slowly moving towards a similar domestically controlled information space and internet as China.</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/sci-tech/article/poland-faced-a-surge-in-cyberattacks-in-2025-including-a-major-assault-on-the-energy-sector/">Poland faced a surge in cyberattacks in 2025, including a major assault on the energy sector</a></p><ul><li><p>Led by Russia and increasingly includes destrutive attacks.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><a href="https://biz.chosun.com/en/en-finance/2026/03/22/QN57OMWVMJG6BP6VIBN6IA42XI/">Hackers breach South Korea&#8217;s top lender subsidiary, leak customer data</a></p></li><li><p><a href="https://www.heise.de/en/news/WTF-Police-responded-on-Saturday-night-due-to-a-zero-day-11221590.html">WTF: Police responded on Saturday night due to a zero-day</a></p></li><li><p><a href="https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/">Self-propagating malware poisons open source software and wipes Iran-based machines</a></p><ul><li><p>A self-propagating backdoor in open source software that likes to deploy a data wiper on Iranian computers. Sounds like Israel to me.</p></li></ul></li><li><p><a href="https://www.sixthtone.com/news/1018313">&#8216;GEO&#8217; Services Are Flooding the Chinese Internet With Misinformation</a> (h/t Catalin Cimpanu)</p><ul><li><p>&#8220;Generative engine optimization, or GEO, to manipulate AI models, distort search result rankings, and spread misinformation to achieve commercial goals such as product promotion.&#8221;</p></li></ul></li><li><p><a href="https://www.israelnationalnews.com/news/424483">National Cyber Authority: 50 Israeli companies &#8216;digitally erased&#8217;</a></p><ul><li><p>The scope of cyber attacks related to conflict is never fully captured by mainstream media and you generally have to go to cybersecurity firms to understand the state of things. This can actually make things difficult because not all cybersecurity firms publish reputable information.</p></li></ul></li><li><p><a href="https://www.404media.co/wikipedia-bans-ai-generated-content/">Wikipedia Bans AI-Generated Content</a></p><ul><li><p>Good.</p></li></ul></li><li><p><a href="https://cybertechaccord.org/statement-from-the-cybersecurity-tech-accord-advancing-international-alignment-in-cybersecurity-regulation-to-strengthen-collective-resilience/">Statement from the Cybersecurity Tech Accord: Advancing International Alignment in Cybersecurity Regulation to Strengthen Collective Resilience </a> </p><ul><li><p>The Accord is calling on G7 and OECD to work together to better align regulations.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canada needs a secure-coding policy — and AI is making that more urgent]]></title><description><![CDATA[Software development is changing, and the government needs to respond]]></description><link>https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Fri, 27 Mar 2026 16:04:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/edb01877-f1d7-465f-978d-9ccc335732d7_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This article originally appeared in Digital Journal <a href="https://www.digitaljournal.com/tech-science/canada-needs-a-secure-coding-policy-and-ai-is-making-that-more-urgent">here</a>.</p><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><p>The federal government spends approximately $6.8 billion on information and communications technology every year.</p><p>It contracts extensively with the private sector for software development, database administration, cybersecurity, and more, handling core Canadian services that include sensitive financial and health information. Despite the scale of that investment and the criticality of those systems, Canada does not have a secure-coding policy. That gap is getting harder to ignore.</p><p>Secure coding refers to a set of practices designed to instill security into software development from the start. Security educator Tanya Janca describes it as<a href="https://claude.ai/chat/URL"> &#8220;fostering a proactive, security-minded culture in software development teams&#8221;</a>. The goal is to eliminate bugs and exploits that expose sensitive data or allow threat actors into an application or network.</p><p>The stakes are real. On average,<a href="https://claude.ai/chat/URL"> Canadian businesses lose nearly $7 million per data breach</a>.<a href="https://claude.ai/chat/URL"> Total recovery costs from cybersecurity incidents exceeded $1.2 billion in 2023</a>. Secure coding is not yet standard practice across the industry, but the case for it is becoming more difficult to dismiss.</p><p>AI is a big reason why.</p><p><a href="https://claude.ai/chat/URL">PwC has found</a> that AI is already automating tasks previously performed by developers, driving labour reductions, and enabling smaller teams to deliver software-as-a-service models. The<a href="https://claude.ai/chat/URL"> Information and Communications Technology Council</a> finds that many junior-level tasks, including programming, are increasingly automated. As AI accelerates through the industry, the need for a clear market signal around secure development is growing.</p><p>That signal has not come.</p><p>AI is increasingly used in programming and operations despite ongoing debate about its reliability. Anthropic, the creator of the<a href="https://claude.ai/chat/URL"> Claude programming model</a>, has acknowledged that the model &#8220;frequently overstated findings and occasionally fabricated data during autonomous operations.&#8221; AI can be productive and transformative, but it is not infallible. In some cases, poorly developed models can obscure their own errors. Human-in-the-loop oversight is not optional; it is a necessary condition for responsible deployment.</p><p>The Government of Canada is the largest ICT client in the country. Adopting a secure-coding policy would be a significant market lever, establishing strict requirements for secure software development across all government contracts, not just IT contracts.</p><p>That matters not just for security, but for digital sovereignty. A secure-coding policy can help ensure that Canadian data used in software development is handled in accordance with Canadian law without cross-border data transfers that could compromise sovereignty when US infrastructure is involved.</p><p>This is not about constraining AI or slowing innovation. It is about ensuring that adoption meets a security and safety standard, one that allows the federal government to tell Canadians their data is protected.</p><p>Such a policy also fits squarely within<a href="https://claude.ai/chat/URL"> Canada&#8217;s National Cyber Security Strategy</a>. Pillar 2 seeks to make Canada a global cybersecurity industry leader by prioritizing trusted innovation and building a foundational workforce. Fostering secure-coding and secure-AI practitioners advances all three of those objectives.</p><p>Janca, a Canadian information security leader and secure-coding advocate, has initiated a<a href="https://claude.ai/chat/URL"> petition to the Government of Canada</a> calling on the federal government to adopt a secure-coding policy for all custom software systems. It is one of the clearest signals yet that the practitioner community sees this as urgent. Whether Ottawa is paying attention is another question.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Canadian Cyber in Context! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canada-needs-a-secure-coding-policy?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 21/03/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending March 21]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326</guid><pubDate>Mon, 23 Mar 2026 13:07:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3f1ebb4a-9065-4a7c-b58a-57c002774ed4_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have a new paper out with the Canadian Global Affairs Institute: </p><ul><li><p><a href="https://www.cgai.ca/th_pp_following_the_digital_snail_s_trail_the_short_history_of_canadian_armed_forces_cyber_operations">Following the Digital Snail&#8217;s Trail: The Short History of Canadian Armed Forces Cyber Operations</a></p></li></ul></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (Article on this coming soon)</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210326?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3 style="text-align: center;">Canadian News</h3><ul><li><p>Bell to build 300MW Data centre in Saskatchewan</p><ul><li><p><a href="https://www.ctvnews.ca/business/article/bell-canada-to-build-300mw-data-centre-in-saskatchewan/">Bell Canada to build 300MW data centre in Saskatchewan</a></p></li><li><p><a href="https://www.bnnbloomberg.ca/investing/investor-outlook/2026/03/16/bell-plans-17b-ai-data-centre-in-saskatchewan-as-demand-for-computing-power-surges/">Bell plans $1.7B AI data centre in Saskatchewan as demand for computing power surges</a></p></li><li><p><a href="https://panow.com/2026/03/17/george-gordon-first-nation-excited-for-bell-canada-partnership-on-ai-data-centre/">George Gordon First Nation excited for Bell Canada partnership on AI data centre</a></p><ul><li><p>I have frequently said that Canada&#8217;s big telecoms are best positioned to enter the data centre game. Glad to see Bell leading the charge.</p></li><li><p>The tenants will be United States corporations &#8220;CoreWeave and Cerebras [which] will be bringing in the compute hardware to run the AI workloads in the data centre. If you take the $1.7 billion of direct Bell investment and consider the compute hardware the two tenants will bring, we&#8217;re talking essentially close to $12 billion of direct investment right here in the province.&#8221;</p><ul><li><p>This has major risk exposure under the US CLOUD Act, but unclear how much non-American data will be processed in this AI data centre.</p></li></ul></li></ul></li></ul></li><li><p><a href="https://www.bbc.com/news/articles/cqj9kgxqjwjo">Meta and TikTok let harmful content rise after evidence outrage drove engagement, say whistleblowers</a></p><ul><li><p>Whistleblowers confirming what we already knew.</p></li></ul></li><li><p>Bill C-22: <a href="https://archive.ph/uBKvM#selection-2489.0-2489.73">Lawful access bill could create vulnerabilities for hackers, experts warn</a></p><ul><li><p>One of the primary worries of Bill C-22 has been it could potentially enable the government to require integrating backdoors for easy lawful interception. Beyond the concerns that this could be abused, there is also major concerns that cyber threat actors, particularly China and Russia, could exploit this infrastructure.</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/opinion/editorials/article-secret-canada-dougs-transparent-cloak-of-self-serving-secrecy">Secret Canada: Doug&#8217;s transparent cloak of self-serving secrecy</a></p><ul><li><p>Doug Ford doesn&#8217;t want to be accountable and wants to hide what he is doing. Should we assume that Doug Ford&#8217;s office is engaged in illegal activities and that is why he does not want to release information?</p></li></ul></li><li><p><a href="https://news.gov.mb.ca/news/index.html?item=73120&amp;posted=2026-03-17">Manitoba Government Ending Predatory Pricing in Grocery Stores and Other Retail</a></p><ul><li><p>&#8220;Manitoba government has introduced an amendment to the Business Practices Act that would ban retailers from using consumers&#8217; personal data to increase the price of goods for a specific consumer&#8221;</p></li><li><p><a href="https://www.cbc.ca/news/canada/manitoba/bill-49-predatory-pricing-9.7131963">Manitoba bill goes after grocers using &#8216;predatory pricing&#8217; to charge some customers more online</a></p></li></ul></li><li><p><a href="https://www.theguardian.com/technology/2026/mar/18/instagram-to-remove-end-to-end-encryption-for-private-messages-in-may">Instagram to remove end-to-end encryption for private messages in May</a></p><ul><li><p>Meta will be ending end-to-end encryption in private messages. My only assumption can be that they will soon begin harvesting data from these messages to make a greater profit off of their users and occasionally for legal takedowns and removal of criminal content. </p></li></ul></li><li><p><a href="https://betakit.com/were-in-a-moment-in-canada-solomon-brings-ai-pitch-to-calgary/">&#8220;We&#8217;re in a moment in Canada&#8221;: Solomon brings AI pitch to Platform Calgary</a></p></li><li><p><a href="https://betakit.com/montreal-computer-scientist-gilles-brassard-wins-turing-award-for-quantum-discoveries/">Montr&#233;al computer scientist Gilles Brassard wins Turing Award for quantum discoveries</a></p><ul><li><p>A good reminder that Canada is the source for a lot of the most high-end and emerging quantum research that is helping Canada be amongst the leaders in quantum research and quantum applications.</p></li></ul></li><li><p><a href="https://betakit.com/manitoba-launches-ai-consultations-as-it-weighs-tougher-privacy-and-youth-protections/">Manitoba launches AI consultations as it weighs tougher privacy and youth protections</a></p><ul><li><p>Provinces will increasingly try to address the legal gap on AI as the federal government fails to enact regulations and laws to address the risks and threats of unmitigated AI.</p></li></ul></li><li><p><a href="https://www.theverge.com/tech/896490/google-replace-news-headlines-in-search-canary-coal-mine-experiment">Google Search is now using AI to replace headlines</a></p><ul><li><p>Google is destroying what turned it into a global giant.</p></li></ul></li><li><p><a href="https://betakit.com/1password-launches-new-platform-to-rein-in-companies-ai-agents/">1Password launches new platform to rein in companies&#8217; AI agents</a></p><ul><li><p>Securing AI agents is going to be massive business. Interesting to see 1Password getting in so early.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/corporate/reports-publications/departmental-plans/departmental-plan-2026-27.html">DND/CAF 2026-27 Departmental Plan</a></p><ul><li><p>DND/CAF releases its departmental plans. I am likely to do a long review of this and the departmental results for next month as I do every year.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/defence-investment-agency/news/2026/03/defence-investment-agency-announces-new-contract-for-surveillance-of-space-2-project.html">Defence Investment Agency announces new contract for Surveillance of Space 2 project</a></p><ul><li><p>DIA continues to be busy with space ISR projects.</p></li></ul></li><li><p><a href="https://vanguardcanada.com/c4isr-beyond-2026-highlights/">C4ISR &amp; Beyond 2026 Highlights</a></p><ul><li><p>Vanguard Canada summary of C4ISR and Beyond, a yearly conference on C4ISR and the CAF.</p></li><li><p>Canadian Cyber in Context subscribers can view and watch more <a href="https://www.cyberincontext.ca/p/missed-c4isr-and-beyond-dont-worry">here</a>.</p></li></ul></li><li><p><a href="https://www.cybersecuritydive.com/news/botnet-takedown-operation-us-canada-germany/815309/">US, Canada and Germany move to dismantle four high-volume IoT botnets</a></p><ul><li><p>Taking down botnets </p></li></ul></li><li><p><a href="https://bsky.app/profile/lukelebrun.ca/post/3mhminmy2ks2g">Individuals associated with Canadaland Podcast Allgedly Sends Phishing Emails with IP tracers to Journalists</a></p><ul><li><p>Developing story where it has been discovered that the Canadaland podcast worked with the Canadaland subreddit to create an IP tracer website and attempting to phish journalists to discover the ownership behind sock puppet accounts.</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/politics/article-canadians-face-tsunami-of-transnational-repression-in-coming-years/">Canadians face &#8216;tsunami&#8217; of transnational repression in coming years, cyber-research group says</a></p><ul><li><p>Ron Deibert and Citizen Lab providing testimony to House of Commons, this is coverage of that testimony.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/03/backgrounder-crtc-making-it-easier-to-connect-indigenous-communities-to-high-speed-internet-and-cellphone-services.html">CRTC making it easier to connect Indigenous communities to high-speed Internet and cellphone services</a></p></li><li><p><a href="https://www.canada.ca/en/canadian-heritage/news/2026/03/leaders-creators-and-innovators-come-together-at-canadas-first-ever-national-summit-on-artificial-intelligence-and-culture.html">Leaders, creators and innovators come together at Canada&#8217;s first-ever national summit on artificial intelligence and culture</a></p><ul><li><p>The first <a href="https://www.canada.ca/en/canadian-heritage/campaigns/ai-culture-summit.html">National Summit on Articial Intelligence and Culture</a> is held</p></li></ul></li><li><p><a href="https://ottawa.citynews.ca/2026/03/19/cost-of-federal-it-project-explodes-to-up-to-6-6-billion/">Cost of federal IT project explodes to up to $6.6 billion</a></p><ul><li><p>Not surprising. Ottawa has habitually underfunded such modernization efforts, so this is maybe a positive sign that the proper investment will occur.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-005-critical-vulnerability-impacting-microsoft-sharepoint-server-cve-2026-20963">Alert - AL26-005 &#8211; Critical vulnerability impacting Microsoft SharePoint Server &#8211; CVE-2026-20963</a></p></li><li><p><a href="https://hackread.com/shinyhunters-hackers-threat-stolen-salesforce-data/">ShinyHunters Hackers Threaten 400 Firms Over Stolen Salesforce Data</a></p><ul><li><p>ShinyHunters have seen increasing success lately. (See Telus)</p></li></ul></li><li><p><a href="https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/">Supply-chain attack using invisible code hits GitHub and other repositories</a></p><ul><li><p>A lot of supply chain attacks are hitting Github as both state actors and criminals see the potential to compromise github repositories as an attack vecture.</p></li></ul></li><li><p><a href="https://ctrlaltintel.com/threat%20research/FancyBear/#overview">FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</a></p><ul><li><p>Russian APT left open directories on a server with exploits and other major tools and information.</p></li></ul></li><li><p><a href="https://eclypsium.com/blog/condibot-monaco-malware-network-infrastructure/">New Malware Highlights Increased Systematic Targeting of Network Infrastructure</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/bitrefill-blames-north-korean-lazarus-group-for-cyberattack/">Crypto e-commerce platform Bitrefill accuses North Korea of stealing 18,500 purchase records</a></p><ul><li><p>Bitrefill can be used in Canada, so this has some impact on Canadians.</p></li></ul></li><li><p><a href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-campaign-targeting-enterprise-firewalls/">Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls</a></p></li><li><p>Vancouver-based <a href="https://www.globenewswire.com/news-release/2026/03/20/3259630/0/en/westport-s-statement-on-cybersecurity-incident.html">Westport Fuel System&#8217;s Statement on Cybersecurity Incident</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3 style="text-align: center;">Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><a href="https://www.recordedfuture.com/blog/identity-trend-report-march-blog">Recorded Future 2025 Identity Threat Landscape Report</a></p><ul><li><p>Nice eye catching opener: &#8220;Credential theft is the dominant initial access vector for enterprise breaches.&#8221;</p></li></ul></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/ransomware-ttps-shifting-threat-landscape/">Google Threat Intelligence Group: Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape</a></p><ul><li><p>Report on the broader ransomware ecosystem.</p></li></ul></li><li><p><a href="https://blog.checkpoint.com/research/telegrams-crackdown-in-2026-and-why-cyber-criminals-are-still-winning/">Telegram&#8217;s Crackdown in 2026 and Why Cyber Criminals Are Still Winning</a> (h/t Catalin Cimpanu)</p><ul><li><p>More than 43.5 million channels were blocked in 2025,  but that has done little to stem the flow of criminal activity on Telegram.</p></li></ul></li><li><p>Michael Geist: <a href="https://www.michaelgeist.ca/2026/03/the-lawful-access-privacy-risks-unpacking-bill-c-22s-expansive-metadata-retention-requirements/">The Lawful Access Privacy Risks: Unpacking Bill C-22&#8217;s Expansive Metadata Retention Requirements</a></p></li><li><p><a href="https://cyberdefensereview.army.mil/CDR-Content/Articles/Article-View/Article/4434149/why-alignment-matters-cyber-capabilities-and-military-operational-schemes-in-al/">Why Alignment Matters: Cyber Capabilities and Military Operational Schemes in All-Domain Operations</a></p><ul><li><p>By the authors of cyber persistence theory. A great article.</p></li></ul></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:190770972,&quot;url&quot;:&quot;https://www.newsguardrealitycheck.com/p/china-pushes-pro-iran-war-claims&quot;,&quot;publication_id&quot;:2106147,&quot;publication_name&quot;:&quot;NewsGuard's Reality Check&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!aEFD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F841cf339-6e75-4ac6-b007-2659e14239ee_176x176.png&quot;,&quot;title&quot;:&quot;China Pushes Pro-Iran War Claims&quot;,&quot;truncated_body_text&quot;:&quot;Welcome to Reality Check, NewsGuard&#8217;s nonpartisan newsletter that tracks the false claims and conspiracy theories that shape our world &#8212; and who&#8217;s behind them. Support us by becoming a premium member or sharing our work.&quot;,&quot;date&quot;:&quot;2026-03-12T20:50:17.222Z&quot;,&quot;like_count&quot;:33,&quot;comment_count&quot;:0,&quot;bylines&quot;:[],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.newsguardrealitycheck.com/p/china-pushes-pro-iran-war-claims?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!aEFD!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F841cf339-6e75-4ac6-b007-2659e14239ee_176x176.png" loading="lazy"><span class="embedded-post-publication-name">NewsGuard's Reality Check</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">China Pushes Pro-Iran War Claims</div></div><div class="embedded-post-body">Welcome to Reality Check, NewsGuard&#8217;s nonpartisan newsletter that tracks the false claims and conspiracy theories that shape our world &#8212; and who&#8217;s behind them. Support us by becoming a premium member or sharing our work&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 months ago &#183; 33 likes</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:191463360,&quot;url&quot;:&quot;https://netaskari.substack.com/p/chinas-massive-data-leak-of-military&quot;,&quot;publication_id&quot;:3812955,&quot;publication_name&quot;:&quot;NetAskari&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BsZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;title&quot;:&quot;China's massive data leak of military secrets ?&quot;,&quot;truncated_body_text&quot;:&quot;About two months ago we saw a sales announcement on a dark web forum by a hacker that goes by the name of &#8220;airborneshark1\&quot;. It offered a massive data set of 10 Petabyte that was apparently extracted from the National Super Computer Center of China ( NSCC ) in Tianjin. It was re-upped again a few days ago, probably to drive up the bidding process. The fi&#8230;&quot;,&quot;date&quot;:&quot;2026-03-19T13:12:10.352Z&quot;,&quot;like_count&quot;:65,&quot;comment_count&quot;:6,&quot;bylines&quot;:[{&quot;id&quot;:43092822,&quot;name&quot;:&quot;NetAskari&quot;,&quot;handle&quot;:&quot;netaskari&quot;,&quot;previous_name&quot;:&quot;Marc Hofer&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;bio&quot;:&quot;Over 16 years of all sorts of journalism: wars, troubles and where the wild things are. If you have data or info to leak, use: deaddrop.netaskari.online.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-08-04T07:37:41.859Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-08-04T07:39:13.534Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:3887885,&quot;user_id&quot;:43092822,&quot;publication_id&quot;:3812955,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3812955,&quot;name&quot;:&quot;NetAskari&quot;,&quot;subdomain&quot;:&quot;netaskari&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Over 16 years of visual journalism from around the globe. I have always questions. &quot;,&quot;logo_url&quot;:null,&quot;author_id&quot;:43092822,&quot;primary_user_id&quot;:43092822,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-01-20T07:22:21.937Z&quot;,&quot;email_from_name&quot;:&quot;NetAskari &quot;,&quot;copyright&quot;:&quot;NetAskari&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;profile&quot;,&quot;is_personal_mode&quot;:true,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://netaskari.substack.com/p/chinas-massive-data-leak-of-military?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!BsZQ!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png" loading="lazy"><span class="embedded-post-publication-name">NetAskari</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">China's massive data leak of military secrets ?</div></div><div class="embedded-post-body">About two months ago we saw a sales announcement on a dark web forum by a hacker that goes by the name of &#8220;airborneshark1". It offered a massive data set of 10 Petabyte that was apparently extracted from the National Super Computer Center of China ( NSCC ) in Tianjin. It was re-upped again a few days ago, probably to drive up the bidding process. The fi&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 months ago &#183; 65 likes &#183; 6 comments &#183; NetAskari</div></a></div><div><hr></div><h3 style="text-align: center;">United States News</h3><ul><li><p><strong><a href="https://www.politico.eu/article/us-congress-judiciary-committee-big-tech-private-communication-eu-officials/">US Congress Judiciary committee demands Big Tech share private comms with EU officials</a></strong></p><ul><li><p>US politicians are demanding the communications of the European Commission related to enforcement of EU law. </p></li><li><p>This is a direct attack on European sovereignty. The US CLOUD Act makes this infinitely easier for them to do this. This is a warning shot and it will only get worse. </p></li></ul></li><li><p><a href="https://smucker.house.gov/media/in-the-news/politico-house-republicans-introduce-bill-go-after-canadas-online-streaming-act">House Republicans introduce bill to go after Canada&#8217;s Online Streaming Act</a></p><ul><li><p>This was inevitable and there are major problems with the Online Streaming Act, but new implications as Republicans and the United States continue to attack Canadian sovereignty.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/16/elon-musks-xai-faces-child-porn-lawsuit-from-minors-grok-allegedly-undressed/">Elon Musk&#8217;s xAI faces child porn lawsuit from minors Grok allegedly undressed</a></p></li><li><p><a href="https://www.forbes.com/sites/the-wiretap/2026/03/17/us-strikes-killed-iranian-cyber-chiefs-but-the-hacks-continued/">U.S Strikes Killed Iranian Cyber Chiefs, But The Hacks Continued</a></p><ul><li><p>Not all countries conduct cyber operations the same. To assume a strict command and control and to remove all an actor&#8217;s capabilities to take our leadership or the HQ is extreme naivety or ignorance.</p></li></ul></li><li><p><a href="https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government">Federal Cyber Experts Thought Microsoft&#8217;s Cloud Was &#8220;a Pile of Shit.&#8221; They Approved It Anyway.</a></p><ul><li><p>Kind of reminds me of a few other examples north of the United States. The Government of Canada loves to spend money on Microsoft cloud, including DND/CAF.</p></li></ul></li><li><p><a href="https://www.pogo.org/investigates/declassified-report-reveals-nsa-broke-surveillance-rules">Declassified Report Reveals NSA Broke Surveillance Rules</a></p><ul><li><p>And now we are supposed to believe they&#8217;ll follow the US CLOUD Act rules correctly? This is how they act regarding their own citizens personal information and data. They care even less about non-Americans data.</p></li></ul></li><li><p><a href="https://www.denverpost.com/2026/03/16/hacked-crosswalks-denver-donald-trump/">Hacked crosswalks in Denver claim &#8216;Trump murders children&#8217;</a></p><ul><li><p>Low level hacktivism</p></li></ul></li><li><p><a href="https://therecord.media/energy-department-set-to-release-first-ever-cyber-strategy">Energy Department set to release its first-ever cyber strategy</a></p><ul><li><p>I am of the opinion all departments should have a cyber strategy. Most will have some level of planning, but it&#8217;s a matter of how much leadership is engaged in this planning that also includes strategizing.</p></li></ul></li><li><p><a href="https://www.politico.com/news/2026/03/18/fbi-buying-data-track-people-patel-00834080">FBI is buying data that can be used to track people, Patel says</a></p><ul><li><p>Why request data through a process that may not be legal when the corporation will just sell you the data?</p></li></ul></li><li><p><a href="https://defensescoop.com/2026/03/12/cmmc-implementation-gao-report-kirsten-davies-dod-cio/">Watchdog urges DOD to address external factors affecting CMMC implementation</a></p><ul><li><p>CMMC is what CPCSC is modelled after, although it has begun to diverge enough to make CPCSC its own approach.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/20/cyberattack-on-vehicle-breathalyzer-company-leaves-drivers-stranded-across-the-us/">Cyberattack on vehicle breathalyzer company leaves drivers stranded across US</a></p><ul><li><p>An Insane story of what happens when critical services that work on behalf of the state fails in their cybersecurity. Appears to be affecting multiple states. </p></li></ul></li><li><p><a href="https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html">Customer Updates: Stryker Network Disruption</a></p><ul><li><p>Stryker providing updates on its recovery operations after the Iranian cyber attack.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/18/marquis-says-over-672000-people-had-personal-and-financial-data-stolen-in-ransomware-attack/">Marquis says over 672,000 people had personal and financial data stolen in ransomware attack</a></p><ul><li><p>A lot of fintech compromises of late, which are a favorite target of criminals.</p></li></ul></li><li><p><a href="https://therecord.media/offensive-cyber-white-house-hacking">White House pours cold water on cyber &#8216;letters of marque&#8217; speculation</a></p><ul><li><p>Senior officials finally made clear they were not interested in allowing private companies to conduct offensive cyber operations. With that said, this administration is now to change directions on a whim, misinformation, or current senile rambling of the president, so take this with a grain of salt.</p></li></ul></li><li><p><a href="https://www.whitehouse.gov/articles/2026/03/president-donald-j-trump-unveils-national-ai-legislative-framework/">President Donald J. Trump Unveils National AI Legislative Framework</a></p><ul><li><p>Six key objectives: Protecting Children and Empowering Parents; Safeguarding and Strengthening American Communities; Respecting Intellectual Property Rights and Supporting Creators; Preventing Censorship and Protecting Free Speech; Enabling Innovation and Ensuring American AI Dominance; Educating Americans and Developing an AI-Ready Workforce.</p></li></ul></li><li><p><a href="https://therecord.media/california-city-reports-ransomware-attack-la-metro">California city reports ransomware attack as LA transit agency finds &#8216;unauthorized activity&#8217;</a></p><ul><li><p>I get the sense that attacks on public organizations is on the rise.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">United Kingdom and European Union News</h3><ul><li><p><a href="https://securityaffairs.com/189585/security/eu-sanctions-chinese-and-iranian-actors-over-cyberattacks-on-critical-infrastructure.html">EU sanctions Chinese and Iranian actors over cyberattacks on critical infrastructure</a></p><ul><li><p>Sanctioning a few companies and individuals.</p></li></ul></li><li><p><a href="https://www.gov.uk/government/news/new-disruption-unit-launched-in-crackdown-on-fraud">New UK disruption unit launched in crackdown on fraud</a></p><ul><li><p>UK investing $250 over 3 years into new Online Crime Centre.</p></li></ul></li><li><p><a href="https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/">Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild</a></p><ul><li><p>Another major iphone exploit tool found in the wild used by Russia.</p></li></ul></li><li><p><a href="https://therecord.media/russia-hackers-ukraine-zimbra-breach">Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency</a></p><ul><li><p>Cyber conflict remains active between Russia and Ukraine</p></li></ul></li><li><p><a href="https://www.belganewsagency.eu/belgium-launches-secure-messaging-app-for-government-staff">Belgium launches secure messaging app for government staff</a></p><ul><li><p>With how much no one can rely upon US-based apps and infrastructure, I am not surprised by this move.</p></li></ul></li><li><p>(Google Translated Title) <a href="https://www.lemonde.fr/international/article/2026/03/19/stravaleaks-le-porte-avions-charles-de-gaulle-localise-en-temps-reel-par-le-monde-grace-a-l-application-de-sport_6672445_3210.html">The aircraft carrier &#8220;Charles de Gaulle&#8221; located in real time by &#8220;Le Monde&#8221; thanks to the sports app</a></p><ul><li><p>&#171; StravaLeaks &#187; : le porte-avions &#171; Charles-de-Gaulle &#187; localis&#233; en temps r&#233;el par &#171; Le Monde &#187; gr&#226;ce &#224; l&#8217;application de sport</p></li><li><p>An every present problem for state defence and national security institutions. This has been a problem since the late 2000s with US forces in Iraq and Afghanistan. This is a known issue that I would wager a guess that all NATO countries have a policy about.</p></li></ul></li><li><p><a href="https://tvpworld.com/92030219/ukraine-cyber-ops-caused-220-mln-damage-to-russia">Cyber attacks inflicted $220 mln losses on Russia, says Kyiv</a></p><ul><li><p>Indirect losses amount to approximately $1.5 billion. </p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/09/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn/">Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn</a></p><ul><li><p>Encrypted messaging apps will always be a top target.</p></li></ul></li></ul><div><hr></div><h3 style="text-align: center;">Other International News</h3><ul><li><p><a href="https://digg.com/">Digg Shut Down due to Bot Problem</a></p><ul><li><p>This is just the beginning. This will continue to be a problem as many social media platforms </p></li></ul></li><li><p><a href="https://www.nippon.com/en/news/yjj2026031701011/">Japan to Begin Active Cyber Defense Operations in Oct.</a></p><ul><li><p>CAFCYBERCOM has increasingly been cooperating with many Indo-Pacific countries including Japan as part of greater Canadian presence in the Indo-Pacific. </p></li><li><p><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2025/08/masakari-25-canadian-japanese-militaries.html">CAFCYBERCOM and JDF conducted joint defensive cyber operations in 2025.</a></p></li></ul></li><li><p><a href="https://www.upguard.com/news/royal-bahrain-hospital-data-breach-2026-03-17">Payload Claims Data Breach on Royal Bahrain Hospital (RBH)</a></p><ul><li><p>Noteworthy for its target as Bahrain is amongst the targets for Iranian drones and reprisal attacks due to the United States and Israel&#8217;s attack on Iran.</p></li></ul></li><li><p><a href="https://www.linuxfoundation.org/press/linux-foundation-announces-12.5-million-in-grant-funding-from-leading-organizations-to-advance-open-source-security">Linux Foundation Announces $12.5 Million in Grant Funding from Leading Organizations to Advance Open Source Security</a></p><ul><li><p>Great to see this. Open source software is a massive target for APTs and cyber threat actors and a major ecosystem change needs to happen to better protect open source software.</p></li></ul></li><li><p><a href="https://services.google.com/fh/files/newsletters/industryaccord.pdf">Industry Accord Against Online Scams &amp; Fraud</a></p><ul><li><p>A group of major multinational corporations have signed an accord to word together and fight online scams and fraud.</p></li><li><p>Signatories so far include: Adobe, Pinterst, Google, OpenAI, LinkedIn, Match Group, Meta, Amazon, Microsoft, Target, Levi Strauss &amp; Co.</p></li></ul></li><li><p><a href="https://www.eff.org/deeplinks/2026/03/blocking-internet-archive-wont-stop-ai-it-will-erase-webs-historical-record">Blocking the Internet Archive Won&#8217;t Stop AI, But It Will Erase the Web&#8217;s Historical Record</a></p><ul><li><p>Internet Archive is increasingly being blocked as part of sweeping efforts to block website scraping, particularly to prevent AI and LLMs.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 14/03/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending March 14]]></description><link>https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326</guid><pubDate>Mon, 16 Mar 2026 15:15:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4125864a-26c9-4469-869b-4cd8ac6162d1_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (Article on this coming soon)</p><p></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/copy-canadian-cyber-news-rewire-140326?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/">Telus Digital confirms breach after hacker claims 1 petabyte data theft</a></p><ul><li><p>A <strong>PETABYTE</strong> of data. Telus Digital confirms one of the largest data thefts in history. ShinyHunters have claimed resonsibility. This is a massive mess up by Telus Digital to allow this much data to be exfiltrated. While Telus cannot be blamed for ShinyHunters getting access via a supply chain attack, but there should have been controls and monitoring to prevent this much theft to occur. </p></li></ul></li><li><p><a href="https://www.scc-csc.ca/cases-dossiers/search-recherche/41538/">Supreme Court of Canada hearing in Facebook v Privacy Commissioner is on March 19</a></p><ul><li><p>Supreme Court case concerning whether Facebook breached PIPEDA related to the Cambridge Analytica scandal. </p></li></ul></li><li><p><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/03/canada-and-global-partners-advance-6g-security-and-resilience-at-mobile-world-congress.html">Canada and global partners advance 6G security and resilience at Mobile World Congress</a></p><ul><li><p>Western countries learned after what happened with 5G and China and are much more active in developing future protocols. </p></li></ul></li><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/03/minister-sidhu-concludes-productive-meeting-on-comprehensive-economic-and-trade-agreement-with-european-union-in-toronto.html">Minister Sidhu concludes productive meeting on Comprehensive Economic and Trade Agreement with European Union in Toronto</a></p><ul><li><p>This has a lot of potential implications. The EU is potentially even more concerned about digital sovereignty than Canada, so improving Canada-EU digital trade would be great to grow Canadian cyber industry in the EU. </p></li></ul></li><li><p><a href="https://www.thecanadianpressnews.ca/science/bell-teams-up-with-coveo-to-modernize-digital-services-for-ottawa-provinces/article_2ee10da9-3450-5e59-8bed-ec6bece94134.html">Bell teams up with Coveo to modernize digital services for Ottawa, provinces</a></p></li><li><p><a href="https://www.tradecommissioner.gc.ca/en/our-solutions/support-programs/canadian-technology-accelerators/cybersecurity-enterprise-ai-silicon-valley.html">Cybersecurity and Enterprise AI: Silicon Valley Canadian Technology Accelerator</a></p><ul><li><p>Trade Commissioner and a group of Canadian cyber firms are headed to RSAC</p></li></ul></li><li><p><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/03/minister-jolys-statement-on-the-outcome-of-the-further-national-security-review-of-tiktok-technology-canada-inc-under-the-investment-canada-act.html">Minister Joly&#8217;s statement on the outcome of the further national security review of TikTok Technology Canada Inc. under the Investment Canada Act</a></p><ul><li><p>Government of Canada says jk, nevermind, TikTok is cool now as long as Americans are harvesting and exploiting our data instead of China.</p></li></ul></li><li><p><a href="https://toronto.citynews.ca/2026/03/10/loblaw-says-some-customers-affected-by-data-breach/">Loblaw says some customers affected by data breach</a></p><ul><li><p>&#8220;Low-level data breach&#8221; is an interesting phrasing here. A &#8220;criminal third-party&#8221; accessed names, phone numbers, and emails. Sounds like they&#8217;re trying to downplay this breach.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/national-research-council/news/2026/03/canada-advances-defence-industrial-strategy-to-strengthen-security-sovereignty-and-prosperity.html">Canada advances Defence Industrial Strategy to strengthen security, sovereignty and prosperity</a></p><ul><li><p>Largely for innovation overall, but part of this does go to cyber and ICT.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/atlantic-canada-opportunities/news/2026/03/projects-supporting-the-growth-of-atlantic-canadas-artificial-intelligence-ecosystem.html">Projects supporting the growth of Atlantic Canada&#8217;s artificial intelligence ecosystem</a></p><ul><li><p>This is the list of projects/businesses through the government&#8217;s $8.5 million investment into AI, which includes a handful of cybersecurity</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11719238/satellite-communications-defence-telesat-low-orbit/">Satellites are Canada&#8217;s next sovereignty frontier as global &#8216;race&#8217; heats up</a></p><ul><li><p>I have been saying for a while now that Canada has a really strong domestic space defence industry.</p></li></ul></li><li><p><a href="https://www.priv.gc.ca/en/opc-news/news-and-announcements/2026/nr-c_260312/">Privacy Commissioner of Canada tables in Parliament Special Report on ArriveCAN app investigation</a></p><ul><li><p>The special report can be read <a href="https://www.priv.gc.ca/en/opc-actions-and-decisions/ar_index/202526/sr_pa_20260312_arrivecan/">here</a>. The investigation was based on a complaint that the contractor did not have appropriate security clearances. OPC found the complaint is &#8220;not well-founded,&#8221; however they did find some deficiencies and provided recommendations for improvements.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/maple-leaf/defence/2026/03/turning-intent-into-action.html">Turning intent into action: inside CAFCYBERCOM&#8217;s Command Evolution Team</a></p><ul><li><p>Article from CAFCYBERCOM Public Affairs Officer on the standing up of CAFCYBERCOM.</p></li></ul></li><li><p><a href="https://flickr.com/photos/cafcombatcameradecombatfac/albums/72177720331541726/">Pictures from CAFCYBERCOM&#8217;s Military Cyber Security Operations Course Philippines 2026</a></p></li><li><p><a href="https://betakit.com/xanadu-in-talks-with-government-over-potential-390-million-for-domestic-quantum-manufacturing/">Xanadu in talks with government over potential $390 million for domestic quantum manufacturing</a></p><ul><li><p>This would be a big win for Canada. There&#8217;s limited quantum manufacturing in Canada right now, but it has been <a href="https://quantumcomputingreport.com/pasqal-opens-quantum-processor-factory-in-quebec-and-sells-100-qubit-system-to-distriq/">slowly growing over the past couple of years</a> and is a great potential area for growth.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/canadian-heritage/news/2026/03/government-of-canada-reconvenes-the-expert-advisory-group-on-online-safety.html">Government of Canada reconvenes the expert advisory group on online safety</a></p><ul><li><p>Kind of makes you wonder why they decided to not convene it until now.</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11720041/ontario-health-athome-ransomware/">Ontario health agency vendor suffered major ransomware attack in 2025</a></p><ul><li><p>This really highlights the major gaps in cybersecurity regulations and reporting in Canada.</p></li></ul></li><li><p>Government Reintroduces Bill C-22: <a href="https://www.canada.ca/en/public-safety-canada/news/2026/03/canada-introduces-new-tools-for-law-enforcement-to-investigate-threats-and-keep-canadians-safe.html">Canada introduces new tools for law enforcement to investigate threats and keep Canadians safe</a></p><ul><li><p>Some news coverage:</p><ul><li><p><a href="https://globalnews.ca/news/11727555/canada-lawful-access-bill-liberals/">Police will get new powers for online data in tweaked &#8216;lawful access&#8217; bill</a></p></li><li><p><a href="https://www.cbc.ca/news/politics/lawfull-access-legislation-liberal-9.7125891">New lawful access bill would give police, CSIS more powers to track suspects online</a></p></li><li><p>The scope of data retention is clarified: only prescribed metadata may be retained for up to one year, excluding content, browsing history, and social media activity.</p></li></ul></li></ul></li><li><p><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/03/crtc-eliminates-fees-to-make-it-easier-to-switch-internet-and-cellphone-plans.htm2">CRTC eliminates fees to make it easier to switch Internet and cellphone plans</a></p><ul><li><p>Every so often the CRTC makes some good decisions for the consumer. Part of CRTC&#8217;s overall <a href="https://crtc.gc.ca/eng/internet/protection.htm">Consumer Protections Action Plan</a>.</p></li></ul></li><li><p><a href="https://senparlvu.parl.gc.ca/Harmony/en/PowerBrowser/PowerBrowserV2?fk=687346&amp;">Standing Senate Committee on Social Affairs, Science and Technology</a></p><ul><li><p>Canadian Senate studying impacts of AI in Canada</p></li></ul></li><li><p><a href="https://news.ontario.ca/en/release/1007160/ontario-updating-cyber-security-privacy-and-access-framework-to-align-more-closely-with-jurisdictions-across-canada">Ontario Updating Cyber Security, Privacy and Access Framework to Align More Closely with Jurisdictions Across Canada</a></p><ul><li><p>Privacy and cyber security laws are not uniform across Canada, with Quebec having the most modern/up to date laws, so there&#8217;s a lot of incongruency across the provinces.</p></li></ul></li><li><p><a href="https://www.coalitioninc.com/en-ca/announcements/Coalition-Enters-Excess-Cyber-Insurance-Market-in-Canada">Coalition Enters Excess Cyber Insurance Market in Canada</a></p><ul><li><p>US-Based Coalition announces expansion into excess cyber insurance market in Canada. I&#8217;m honestly not a big fan of cyber insurance and think it can excerbate many problems.</p></li></ul></li><li><p><a href="https://rhisac.org/press-release/rcc-partnership/">Retail &amp; Hospitality ISAC and Retail Council of Canada Announce Strategic Partnership to Strengthen Cybersecurity Across Canadian Retail Sector</a></p><ul><li><p>Retail &amp; Hospitality Information Sharing and Analysis Center (RH-ISAC) and Retail Council of Canada is a partnership I am surprised isn&#8217;t done more with other trade associations. This is an easy path for any trade association to take to specifically address the cyber needs of their sector.</p></li></ul></li></ul><p>Read my analysis of sovereign cloud RFI and what it tells us about the Government of Canada's direction on sovereign cloud:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;65a9998c-1318-405a-8816-1eb9171b8fc1&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Canadian Government Provides Next Steps to Sovereign Cloud&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-06T21:26:56.872Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e1b4c37-bc01-4aa1-bda3-90650e2d1f9d_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-government-provides-next&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:190047079,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:3,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://hackread.com/shinyhunters-hackers-threat-stolen-salesforce-data/">ShinyHunters Hackers Threaten 400 Firms Over Stolen Salesforce Data</a></p><ul><li><p>ShinyHunters have seen increasing success lately. (See Telus)</p></li></ul></li><li><p><a href="https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/">Supply-chain attack using invisible code hits GitHub and other repositories</a></p><ul><li><p>A lot of supply chain attacks are hitting Github.</p></li></ul></li><li><p><a href="https://blog.barracuda.com/2026/03/16/sandworm--russia-s-global-infrastructure-wrecking-crew">Sandworm: Russia&#8217;s global infrastructure wrecking crew</a></p><ul><li><p>Decent CTI profile on Sandworm/APT44</p></li></ul></li><li><p><a href="https://blog.checkpoint.com/research/global-cyber-attacks-remain-near-record-highs-in-february-2026-despite-ransomware-decline/">Global Cyber Attacks Remain Near Record Highs in February 2026 Despite Ransomware Decline</a></p><ul><li><p>Checkpoint says Canada ranks second worldwide in ransomware. This isn&#8217;t good.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research, Op-Eds, and Events</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5303f284-c623-437a-985a-82956fde52eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Compliance is Cash - Where to Begin with CPCSC&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-10T12:02:59.952Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:189788422,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><ul><li><p><a href="https://canadianshieldinstitute.ca/latest-updates/f/briefing-note-quebecs-sovereign-it-policy">Briefing Note: Quebec&#8217;s Sovereign IT Policy</a></p><ul><li><p>Briefing note on Quebec&#8217;s Digital Sovereignty and IT Procurement Policy by Emily Osborne @ Canadian Shield Institute</p></li></ul></li><li><p><a href="https://www.theglobeandmail.com/business/commentary/article-big-tech-digital-ai-privacy/">As U.S. state and Big Tech become one, we become digital serfs, and it sucks</a></p><ul><li><p>Opinion piece by Vass Bednar, Managing Director of the Canadian Shield Institute</p></li></ul></li><li><p><a href="https://aicompetitiveness.ca/assets/Sovereign-by-Design-Full-Report-2026.pdf">Sovereign by Design: Strategic Options for Canadian AI Sovereignty</a></p><ul><li><p>Report on options to develop sovereign AI in Canada by former government bureaucrat who had a large role in the government&#8217;s policy, Jaxson Khan, and former Trudeau economic advisor Sean Mullin</p></li></ul></li><li><p>Event: <a href="https://us06web.zoom.us/webinar/register/3317720436685/WN_0MsezgsJQzOckoZ4mcDAuQ#/registration">Rogers Cybersecure Catalyst is hosting a Defence Sector 101</a></p><ul><li><p>Hosted by Daniel Blanc, former CAFCYBERCOM. If you are in the cyber sector and curious about defence, this is one not to miss.</p></li></ul></li><li><p><a href="https://www.theatlantic.com/magazine/2026/04/ai-data-centers-energy-demands/686064/">Inside the Dirty, Dystopian World of AI Data Centers</a></p><ul><li><p>There&#8217;s a massive demand for cloud and AI data centres, but there&#8217;s a major social, environmental, and health impact on humans.</p></li></ul></li><li><p><a href="https://www.cpac.ca/public-record/episode/panel-discussion-on-canadas-ai-strategy-consultations?id=135866a5-001e-4501-893c-0a7e84007387">Panel Discussion on Canada&#8217;s AI Strategy Consultations</a></p><ul><li><p>&#8220;Industry experts gather in Ottawa to discuss the findings of the federal government&#8217;s recent public consultations on Canada&#8217;s national artificial intelligence (AI) strategy. This panel discussion features Erin Kelly (Advanced Symbolics Inc.), Michael Geist (University of Ottawa), and Jaxson Khan (Aperture AI). The event is hosted by the Canadian Internet Society and is moderated by Brent Arnold, the society&#8217;s chair. Katie Preiss (TELUS) provides opening remarks.&#8221;</p></li></ul></li><li><p><a href="https://direct.mit.edu/isec/article/50/3/86/135683/Deception-and-Detection-Why-Artificial">Deception and Detection: Why Artificial Intelligence Empowers Cyber Defense over Offense</a></p><ul><li><p>Article by Lennart Maschmeyer, easily one of the best academics doing research on cyber conflict. (Even though we disagree on a lot)</p></li></ul></li><li><p><a href="https://tboteproject.com/">Age Verification Lobbying: Dark Money, Model Legislation &amp; Institutional Capture</a></p><ul><li><p>An investigation has found Meta and other social media companies behind a major push to lobby governments to shift age verification from websites to app stores.</p></li></ul></li></ul><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://archive.ph/dDwdY">Whistleblower claims ex-DOGE member says he took Social Security data to new job</a></p><ul><li><p>I would not be surprised if this turned out to be true with how terrible DOGE was at security and ruining everything it touched.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/09/an-iphone-hacking-toolkit-used-by-russian-spies-likely-came-from-u-s-military-contractor/">An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor</a></p><ul><li><p>Likely designed by L3Harris. L3Harris has a pretty big presence in Canada, but it is unclear if they sell exploits to Canada. I have been trying to learn just to what degree Canada purchases exploits from private sellers the past few years with nothing coming up yet, but that does not mean it is not occurring. </p></li><li><p>An L3Harris executive was sentenced to 7 years in prison for selling zero-days to Russian Operation Zero. There are some suspicions that he also sold this toolkit, which is also being used by Trickbot ransomware.</p></li><li><p><a href="https://arstechnica.com/security/2026/03/cisa-adds-3-ios-flaws-to-its-catalog-of-known-exploited-vulnerabilities/">Feds take notice of iOS vulnerabilities exploited under mysterious circumstances</a></p><ul><li><p>This is the Coruna exploit mentioned above.</p></li></ul></li></ul></li><li><p><a href="https://www.404media.co/viral-quittr-porn-addiction-app-exposed-the-masturbation-habits-of-hundreds-of-thousands-of-users/">Viral &#8216;Quittr&#8217; Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users</a></p><ul><li><p>From the author of this story: &#8220;these kids are making Ferrari money telling people to use their app in order to stop watching porn, but they exposed their most intimate data and then lied to me about it&#8221;</p></li></ul></li><li><p><a href="https://therecord.media/rudd-confirmed-nsa-cyber-command-chief">Rudd confirmed to head NSA, Cyber Command after near year-long vacancy</a></p></li><li><p><a href="https://www.gao.gov/products/gao-26-108685">Cybersecurity Regulations: Additional Industry Perspectives on the Impact, Progress, Challenges, and Opportunities of Harmonization</a></p><ul><li><p>GAO report on cybersecurity regulations in the US</p></li></ul></li><li><p><a href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/">Iranian Hacktivists Strike Medical Device Maker Stryker in &#8220;Severe&#8221; Attack that Wiped Systems</a></p><ul><li><p>Major attack on Stryker affecting global operations in US, Australia, India, Ireland.</p></li></ul></li><li><p><a href="https://cyberscoop.com/us-state-department-data-sovereignty-myth-op-ed/">No, it&#8217;s not &#8216;unnecessarily burdensome&#8217; to control your own data</a></p><ul><li><p>No one is believing the State department&#8217;s efforts to undermine digital sovereignty.</p></li></ul></li><li><p><a href="https://therecord.media/235000-affected-cyberattack-ambulance-provider">235,000 affected by cyberattack on largest ambulance provider in Wisconsin</a></p><ul><li><p>A lot of critical information stolen in this attack.</p></li></ul></li><li><p><a href="https://www.malwarebytes.com/blog/data-breaches/2026/03/hackers-may-have-breached-fbi-wiretap-network-via-supply-chain">Hackers may have breached FBI wiretap network via supply chain</a></p><ul><li><p>A lot of organizations getting hit with supply chain attacks at the moment.</p></li></ul></li><li><p><a href="https://therecord.media/new-data-shows-increase-fbi-searches-on-americans">Exclusive: New data shows increase in FBI searches of Americans&#8217; data last year</a></p><ul><li><p>Not a surprise at all. This will continue and I worry it will eventually increase in targeting non-Americans.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/">Starbucks discloses data breach affecting hundreds of employees</a></p><ul><li><p>Unclear how much and who are affected so far, could potentially include Canada.</p></li></ul></li></ul><div><hr></div><h3>United Kingdom and European Union News</h3><ul><li><p><a href="https://therecord.media/finnish-intel-warns-espionage-china-russia">Finnish intelligence warns of persistent cyber espionage from Russia, China</a></p></li><li><p><a href="https://www.corkbeo.ie/news/local-news/cork-stryker-plants-hit-suspected-33571864">Cork Stryker plants hit by suspected global Iranian-linked cyberattack</a></p><ul><li><p>Appears to be hitting global operations. This comany makes medical devices include defribulators. </p></li></ul></li><li><p><a href="https://www.theregister.com/2026/03/11/swiss_evote_usb_snafu/">Swiss e-voting pilot can&#8217;t count 2,048 ballots after USB keys fail to decrypt them</a></p><ul><li><p>Technical errors are dooming this test in e-voting.</p></li></ul></li><li><p><a href="https://www.manchestereveningnews.co.uk/news/uk-news/lloyds-issues-apology-after-bank-33579221">Lloyds issues apology after Bank of Scotland and Halifax bank customers &#8216;see other people&#8217;s transactions&#8217;</a></p><ul><li><p>Reason doesn&#8217;t seem to be clear yet, but investigation is ongoing.</p></li></ul></li><li><p><a href="https://therecord.media/iran-linked-hackers-claim-cyberattack-albania-parliament">Iran-linked hackers claim cyberattack on Albania&#8217;s parliament email systems</a></p></li><li><p><a href="https://thedefensepost.com/2026/03/11/germany-british-hacking-program/">German Military University Adopts British Defense Hacking Program</a></p><ul><li><p>&#8220;London-based Common Mission Project UK has announced the launch of its Hacking for Defense academic program in Germany in partnership with the University of the Bundeswehr Munich, marking the initiative&#8217;s first deployment in continental Europe.&#8221;</p></li></ul></li><li><p><a href="https://www.reuters.com/world/poland-says-foiled-cyberattack-nuclear-centre-may-have-come-iran-2026-03-12/">Poland says foiled cyberattack on nuclear centre may have come from Iran</a></p><ul><li><p>Hard to say how much of this is scare mongering, but Iran will be looking for any potential vulneraiblity just like Russia right now.</p></li></ul></li><li><p><a href="https://theins.press/en/inv/290235">Lost in translation: How Russia&#8217;s new elite hit squad was compromised by an idiotic lapse in tradecraft</a></p><ul><li><p>Understanding tradecraft is important to understanding many dynamics to international cyber conflict.</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/world/article/moscow-businesses-struggle-as-russia-restricts-cellphone-internet-services/">Moscow businesses struggle as Russia restricts cellphone internet services</a></p><ul><li><p>The article tries to frame this as Russia is increasingly trying to roll back the Internet in the country so that they eventually have their own <a href="https://en.wikipedia.org/wiki/Great_Firewall">Great Firewall of China</a>. In reality, it is more likely to do with preventing use of mobiel internet by Ukraine. I have seen some rumors of other concerns related to a coup, but nothing official yet.</p></li></ul></li><li><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-and-international-partners-disrupt-socksescort-proxy-service">Europol and international partners disrupt &#8216;SocksEscort&#8217; proxy service</a></p><ul><li><p>Paid criminal proxy service taken down: <a href="https://techcrunch.com/2026/03/12/law-enforcement-shuts-down-botnet-made-of-tens-of-thousands-of-hacked-routers/">Law enforcement shuts down botnet made of tens of thousands of hacked routers</a></p></li></ul></li><li><p><a href="https://www.spiegel.de/politik/deutschland/spionage-ehemaliger-bnd-vize-wird-opfer-von-cyberangriff-a-3fb118d6-b740-4e09-bfa2-6bf67c3fd1e9">Cyberattack against former BND vice president</a></p><ul><li><p>Former high-ranking official falls for Signal spear-phishing</p></li></ul></li><li><p><a href="https://office.eu/media/pressrelease-20260304">Office.eu officially launches in The Hague as Europe&#8217;s fully sovereign office platform</a></p><p></p></li></ul><div><hr></div><h3>Other News</h3><ul><li><p><a href="https://www.theguardian.com/global-development/2026/mar/12/invasive-ai-led-mass-surveillance-in-africa-violating-freedoms-warn-experts">&#8216;Invasive&#8217; AI-led mass surveillance in Africa violating freedoms, warn experts</a></p><ul><li><p>Where Authoritarian and dictatorial people operate, spyware and AI-led surveillance will follow.</p></li></ul></li><li><p><a href="https://www.404media.co/ai-is-african-intelligence-the-workers-who-train-ai-are-fighting-back/https://www.404media.co/ai-is-african-intelligence-the-workers-who-train-ai-are-fighting-back/">&#8216;AI Is African Intelligence&#8217;: The Workers Who Train AI Are Fighting Back</a></p><ul><li><p>Fantastic reporting here. AI is based on data, but not just any data, AI requires good data. To ensure the data that AI is trained on is good, reliable, and accurate requires a lot of labour, which can be both physically and mentally taxing. </p></li></ul></li><li><p>Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone</p><ul><li><p>Verifone has not reported a breach yet, but Stryker is already making a lot of headlines (noted above).</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Compliance is Cash - Where to Begin with CPCSC]]></title><description><![CDATA[The Canadian Program for Cyber Security Certification can be overwhelming, so let us start with the basics]]></description><link>https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Tue, 10 Mar 2026 12:02:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e7fd97de-179a-4913-b602-7a3332f76b2e_2752x1440.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><h5 style="text-align: center;">The Canadian Program for Cyber Security Certification (CPCSC) is still in development and is subject to change. The information in this will be updated as the CPCSC Secretariat releases more information.</h5><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XZt0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XZt0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 424w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 848w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 1272w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XZt0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png" width="466" height="406" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:406,&quot;width&quot;:466,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:65975,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/189788422?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17dd211e-4c80-4bb5-be88-5f039faeee46_500x500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XZt0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 424w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 848w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 1272w, https://substackcdn.com/image/fetch/$s_!XZt0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3575b8e0-ca81-480b-840b-600f26d9a5fd_466x406.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;m <a href="https://www.linkedin.com/in/altechguy/">Andrew Laliberte</a>. For years, I worked inside the Canadian Armed Forces and Department of National Defence networks, deploying and sustaining technical capabilities under strict governance, risk, and compliance constraints. It was not glamorous work. It was long hours, rapid learning curves, and constant pressure to keep complex systems stable in environments where resources were scarce and the rules were rigid&#8230; except when they weren&#8217;t.</p><p>That experience gave me something invaluable. A practical understanding of how compliance frameworks shape architecture, operations, procurement, and organizational survival.</p><p>Today, I work with organizations across the defence industrial base (DIB), from primes to specialized subcontractors, who are entering a new era. An era where compliance is not optional, not theoretical, and not negotiable.</p><p>Here is what many still miss.</p><p>Compliance is no longer a checkbox buried in the back of a contract.<br>In the defence industrial base, it is becoming the price of entry.</p><p>The defence industrial base is becoming one of the most compliance-driven sectors in North America. While it may not entail the liquidity and capital controls of banking, its cybersecurity requirements are increasingly mandatory, enforceable, and directly tied to revenue.</p><p>Over the next few years, mandatory frameworks like CMMC in the United States and Canada&#8217;s evolving CPCSC requirements will determine who can bid, who can handle controlled information, and ultimately who gets paid.</p><p>Compliance is not just a cost center.<br>Done properly, it is a market filter.<br>Market filters create competitive advantage.</p><p>This series breaks down what the coming compliance landscape means for your business and how to turn governance requirements into strategic leverage.</p><p>Because in the DIB, compliance is not paperwork.</p><p>It is cash.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h1>The 101 on CPCSC Level 1</h1><h2><strong>Who</strong></h2><p>Program governance is distributed across federal authorities:</p><p>&#8226; Program Manager: <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada.html">Public Services and Procurement Canada (PSPC)<br></a>&#8226; Defence Authority: <a href="https://www.canada.ca/en/department-national-defence.html">Department of National Defence (DND)<br></a>&#8226; Standards Development: <a href="https://www.cyber.gc.ca/en">Canadian Centre for Cyber Security (CCCS)<br></a>&#8226; Accreditation Authority: <a href="https://scc-ccn.ca/">Standards Council of Canada (SCC)</a></p><h2><strong>What</strong></h2><p>The Canadian Program for Cyber Security Certification (CPCSC) is the Government of Canada&#8217;s official cybersecurity certification program for defence suppliers.</p><p>It safeguards unclassified Specified/Sensitive Information that flows from federal departments to industry under defence contracts.</p><p>Specified/Sensitive Information is categorized as:</p><p>&#8226; SI Low<br>&#8226; SI Medium<br>&#8226; SI High</p><p>These categories align with specified/sensitive information data types such as <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/safeguarding-equipment-sites-assets-information/levels-security.html">Protected A, Protected B</a>, and certain Controlled Goods contexts, as well as several others. Organizations must understand how their data maps to these operational impact levels.</p><h2><strong>When</strong></h2><p>Beginning in Spring 2026, PSPC will introduce contractual language requiring self-attested CPCSC Level 1 compliance for award on most DND contracts.</p><h2><strong>Where</strong></h2><p>If non-commercial off-the-shelf (COTS)  activity or Specified/Sensitive Information (SI) is involved, CPCSC applicability and level will be determined through the Industry Contract Cyber Security Risk Assessment, CCSRA.</p><p>SI Low, aligned to CPCSC Level 1, includes:</p><p>&#8226; <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/safeguarding-equipment-sites-assets-information/levels-security.html">Protected A information</a><br>&#8226; Low sensitivity Dual Use Goods technical data<br>&#8226; Non-critical sensitive supplier financial information<br>&#8226; Low sensitivity procurement documentation such as RFQs, purchase orders, and schedules</p><h2><strong>Why</strong></h2><p>CPCSC is Canada&#8217;s response to systemic cybersecurity risk across the Defence Industrial Base. It marks a shift from compliance on paper to structured, enforceable cybersecurity maturity requirements.</p><p>Three realities drive this shift.</p><ul><li><p>The threat environment has evolved. Smaller subcontractors are often the easiest path into larger defence programs.</p></li><li><p>Self-attestation alone proved insufficient. Documentation did not always reflect operational reality.</p></li><li><p>Verification is now built into the model, but in a graduated form. Level 1 remains self-attested. Levels 2 and 3 introduce formal assessments to validate implementation and operational effectiveness.</p></li></ul><p>The direction is clear. Canada is moving toward higher assurance requirements for higher sensitivity work.</p><p>Cybersecurity in Canadian defence contracting is no longer an honour system. It is becoming a tiered eligibility framework.</p><p>For DIB firms, CPCSC is not a policy update. It is a structural shift in how eligibility, competitiveness, and trust are determined.</p><p>Those who treat compliance strategically will find it does more than protect contracts.</p><p>It positions them to win.</p><h2><strong>How</strong></h2><p>The best way to keep your costs and timelines down is accurate scoping.  You must first identify the systems, services, people, and workflows that touch defence contracts or Specified/Sensitive Information.</p><p>Once scoped, apply the <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada/cyber-security-certification-level1.html">13 CPCSC Level 1 controls</a> to that environment and build a controlled operating model that integrates people, process, policy, facilities, and technology.</p><p>Level 1 is not advanced security engineering.<br>It is just the minimum acceptable standard in 2026.</p><p>In 2026, we are 38 years removed from the first major internet worm (Morris Worm). Thirty-eight years of warnings. Thirty-eight years of incidents. Thirty-eight years to get the basics right.</p><p>There is no strategic justification left for ignoring technical debt, postponing governance, or hoping regulators will look the other way.</p><p>CPCSC Level 1 is not an innovation burden. It is the baseline cost of doing business in the modern defence ecosystem. Align with it or step aside for organizations that will.</p><p>It forces clarity on who has access, what systems matter and whether they are maintained. For some organizations, this will feel like overhead. For disciplined organizations, it becomes structured.</p><p>And structure scales.</p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h1>Where to Start with CPCSC</h1><p>In CPCSC level 1, there are 13 security requirements from 6 of the 17 security requirements families found in <a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">ITSP.10.171</a>.</p><p>All of that translates into 71 assessment objectives (AO), which is really the only thing you should focus on applying to your organization&#8217;s scope.</p><p>The AO are the questions on the open-book test. If you can confirm you&#8217;ve applied them to every applicable part of your scope, then you pass the test.</p><p>To make life interesting, of course, you also need to track and insert various &#8220;organization-defined parameters&#8221; or ODPs</p><p>Direct from <a href="https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171">ITSP.10.171</a> Sec. 2.2:</p><p>&#8220;ODPs are an important part of specifying a security requirement. ODPs provide both the flexibility and the specificity needed by organizations to clearly define their specified information security requirements according to their particular missions, business functions, operational environments and risk tolerance. In addition, ODPs support consistent security assessments to determine if specified security requirements have been satisfied. If a GC department or agency, or a group of departments or agencies, does not specify a particular value or range of values for an ODP, non-GC organizations must assign the value or values to complete the security requirement.&#8221;</p><p>And</p><p>&#8220;The term &#8216;organization&#8217; is used in many security requirements, and its meaning depends on context. For example, in a security requirement with an ODP, an organization can refer to either the GC department or agency or to the non-GC organization establishing the parameter values for the requirement.&#8221;</p><p>Which means that so far, unlike CMMC for which the DoD released an official list of ODP values you can just plug in and plan for, the ODPs in CPCSC will be left up to whichever government entity wants to take a stab at defining it before ultimately leaving the rest up to you.</p><p>How will that shake out? Will it be regulatory chaos? Time will tell but the most practical thing you can do is take those DoD-defined values as your starting point when planning as it would be unlikely to require much modification once you get your official values on a contract.</p><p>Now, let&#8217;s run through a couple of the most impactful security requirements to get a sense of what your new day-to-day reality looks like.</p><p><strong>Family: 3.1 Access control</strong></p><p>Security Requirement: 03.01.01 Account management</p><p>AO:</p><p><strong>A.03.01.01.d.01: access to the system is authorized based on a valid access authorization</strong></p><p><strong>A.03.01.01.d.02: access to the system is authorized based on intended system usage</strong></p><p><strong>Impact:</strong> For the average defence contractor, these CPCSC Level 1 objectives represent a shift from a &#8220;convenience-first&#8221; to a &#8220;compliance-first&#8221; operational mindset. Meeting A.03.01.01.d.01 requires a formal administrative process where identity is verified before a single login is generated; gone are the days of informal account creation or shared credentials.</p><p>Meanwhile, A.03.01.01.d.02 introduces the concept of Least Privilege, mandating that access isn&#8217;t granted simply because a person is &#8220;on the team,&#8221; but only because their specific role requires it. For a small-to-mid-sized firm, this means an increased administrative burden for which you&#8217;ll need documented evidence of who has access and why.</p><p>In practice, this forces contractors to tighten their internal HR and IT workflows, ensuring that when an employee&#8217;s role changes or they leave the company, their access is adjusted or revoked immediately to prevent unauthorized data exposure.</p><p><strong>Family: 3.14 System and information integrity</strong></p><p>Security Requirement: 03.14.01 &#8211; Flaw Remediation</p><p>AO:</p><p><strong>A.03.14.01.a[03]: system flaws are corrected</strong></p><p><strong>Impact: </strong>For the average defence contractor, objective A.03.14.01.a[03] transforms patch management from a &#8220;best effort&#8221; IT task into a high-stakes compliance requirement. The primary impact is the loss of operational flexibility; contractors can no longer afford to delay updates for months out of fear of software instability. Instead, they must implement a disciplined vulnerability remediation lifecycle that includes identifying, testing, and applying security patches within specific timeframes.</p><p>For many firms, this necessitates a move away from manual updates toward automated patch management tools to ensure nothing slips through the cracks. Beyond the technical shift, there is a significant documentation burden. Assessors won&#8217;t just want to see that the system is currently updated; they will want to see historical logs proving that flaws were corrected consistently and promptly. This effectively raises the &#8220;floor&#8221; for cybersecurity maturity, forcing smaller contractors to invest in more robust IT support or managed service providers to keep pace with the constant stream of newly discovered software vulnerabilities.</p><p>Even if you&#8217;re assessing your own organization, this is the level of consistent organizational effort required to meet that attestation.</p><p><strong>Family: 3.13 System and communications protection</strong></p><p>Security Requirement: 03.13.01 Boundary protection</p><p>AO:</p><p><strong>A.03.13.01.a[02]: communications at external managed interfaces to the system are controlled.</strong></p><p><strong>Impact: </strong>For the average defence contractor, objective A.03.13.01.a[02] marks the end of &#8220;open-door&#8221; networking and necessitates strengthening the digital perimeter. The impact is felt most acutely in how the company interacts with the outside world&#8212;specifically at the Managed Interface, which serves as the single, guarded gateway between the internal network and external entities such as the public internet or subcontractor portals.</p><p>Contractors must move away from ad hoc connectivity and instead implement strict Boundary Protection technologies, such as enterprise-grade firewalls or specialized gateways that perform deep packet inspection. This requirement often forces a structural redesign of the network to ensure that all data &#8220;traffic&#8221; is funnelled through controlled checkpoints where it can be monitored, filtered, and restricted based on pre-defined security policies.</p><p>For smaller firms, this typically means moving away from consumer-grade routing hardware toward more sophisticated managed security services, as the burden of constantly updating and auditing these interface controls requires specialized expertise to prevent unauthorized data exfiltration.</p><h1>From Vibes to Verifiable</h1><p>Seventy-one assessment objectives. ODPs that may or may not be pre-defined for you. Evidence trails. Role catalogs. Patch clocks. Firewall rules that now require justification instead of &#8220;vibes&#8221;. All of this at level one is your new reality. It is the methods and actions your organization will have to live by.</p><p>But here&#8217;s the uncomfortable truth: none of this is exotic. None of it is bleeding-edge cyber wizardry. It&#8217;s basic governance. It&#8217;s discipline. It&#8217;s documentation. It&#8217;s doing the boring fundamentals consistently enough that you can prove it.</p><p>CPCSC Level 1 doesn&#8217;t demand a security operations center or classified infrastructure. It demands that you stop running your defence business like a startup lab and start running it like a regulated supplier in a national security supply chain. Access must be justified. Vulnerabilities must be fixed. Network boundaries must be controlled, and you must be able to demonstrate that this isn&#8217;t aspirational, it&#8217;s operational.</p><p>Ultimately, the shift toward CPCSC Level 1 isn&#8217;t just about checking boxes or surviving an assessment. It&#8217;s about a fundamental change in how the defence supply chain operates. For the average contractor, these objectives move cybersecurity out of the IT basement and into the boardroom. Whether it&#8217;s formalizing who can log in, automating your patch cycles, or hardening your network boundaries, the common thread is verifiable control.</p><p>The tedious technical stuff is the baseline for doing business today. If you cannot prove you&#8217;re doing it, you technically aren&#8217;t doing it in the eyes of the Government of Canada. By aligning your ODPs with established benchmarks such as the DoD&#8217;s published values and treating the assessment objectives as your operational roadmap, you transform a regulatory obligation into a capability signal.</p><p>The transition is not light work. It requires structure, investment, and consistency. But what it builds is something far more valuable than compliance: a resilient, professional, and contract-ready organization positioned to compete in a regulated defence marketplace.</p><p>If you want to win defence-related contracts, accountability isn&#8217;t optional anymore. CPCSC will be the price of admission.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 7/03/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending March 7th]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326</guid><pubDate>Mon, 09 Mar 2026 14:41:29 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0364c8e9-ad45-4f34-80ea-fca893f326f9_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have completed the first rough draft of my dissertation (yay!). I will be entering a major editing phase over the next few weeks, so my availability may fluctuate.</p></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (Article on this coming soon)</p></li><li><p>Coming tomorrow, the first in Compliance is Cash! <a href="https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin">https://www.cyberincontext.ca/p/compliance-is-cash-where-to-begin</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-70326?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://betakit.com/ottawa-makes-first-rdii-investments-in-ontario-with-15-million-for-cdl-defence-and-wolf-advanced-technology/">Ottawa makes first RDII investments in Ontario with $15 million for CDL Defence and Wolf Advanced Technology</a></p><ul><li><p>A few really promising companies are being supported through this.</p></li></ul></li><li><p><a href="https://betakit.com/jetscaleai-secures-5-4-million-to-keep-cloud-costs-and-climate-impact-down/">JetScaleAI secures $5.4 million to keep cloud costs and climate impact down</a></p><ul><li><p>As compute costs continue to skyrocket amid the AI boom, there will be an increasing demand for the ability to reduce costs and increase efficiency.</p></li></ul></li><li><p><a href="https://securitybrief.ca/story/from-bill-c-26-to-c-8-canada-s-cyber-law-reboot-explained">From Bill C-26 to C-8: Canada&#8217;s cyber law reboot explained</a></p><ul><li><p>A good explainer on the current Bill C-8 making its way through Parliament.</p></li></ul></li><li><p><a href="https://betakit.com/ottawa-puts-8-5-million-behind-40-atlantic-canadian-ai-projects/">Ottawa puts $8.5 million behind 40 Atlantic Canadian AI projects</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/">Previously harmless Google API keys now expose Gemini AI data</a></p><ul><li><p>People are stealing Google API keys to use for Gemini, leading to some very shocking surpising costs.</p></li></ul></li><li><p><a href="https://www.pm.gc.ca/en/news/news-releases/2026/03/04/prime-minister-carney-announces-changes-senior-ranks-public-service">Prime Minister Carney announces changes in the senior ranks of the public service</a></p><ul><li><p>Chief Information Officer Dominic Rochon of Canada (TBS Secretariat) is now Deputy Secretary to the Cabinet (National Security and Intelligence). This is a big promotion, so props to Mr. Rochon, whom I have only heard nice things about.</p></li><li><p>Nothing yet on who the next Chief Information Officer is, which is not a good look.</p></li></ul></li><li><p>CCCS <a href="https://www.cyber.gc.ca/en/guidance/cyber-threat-bulletin-iranian-cyber-threat-response-usisrael-strikes-february-2026">Cyber threat bulletin: Iranian Cyber Threat Response to US/Israel strikes, February 2026</a></p><ul><li><p>Nothing major has surfaced yet, but we&#8217;re likely to see some reprisal operations. Iran was among the first to use wiper malware with the <a href="https://en.wikipedia.org/wiki/Shamoon">Shamoon virus against Saudi Arabia in 2012</a>. They have capabilities</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/canada/edmonton/alberta-government-budget-cybersecurity-9.7111533">Alberta to spend $40M on software upgrades after surge in cybersecurity incidents</a></p><ul><li><p>Technical debt remains one of the top sources of vulnerability. $40 million for updating &#8220;legacy application&#8221; is quite interesting and could mean a few different things. A good amount of it is likely to upgrade to software that is currently being supported.  Some of these applications are likely to be software that is no longer supported by the developer. Some cases could also be custom software where updates are needed.</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11713565/ai-generated-cra-tax-scams-increasing-cybersecurity-warning/">AI-generated CRA tax scams increasing, cybersecurity experts warn</a></p><ul><li><p>Scams and fraud has particularly been helped by AI.</p></li></ul></li><li><p><a href="https://www.bbc.com/news/articles/cly2m5e5ke4o">TikTok won&#8217;t protect DMs with end to end encryption, saying it would put users at risk</a></p><ul><li><p>Claims end to end encryption is &#8220;controversial,&#8221; which is an absolute load of bullshit. I guarantee you this means they&#8217;re scraping data from DMs. Do not use Tik Tok. </p></li></ul></li><li><p><a href="https://theijf.org/article/federal-institutions-average-259-days-to-report-privacy-breaches-theyre-supposed-to-flag-major-incidents-within-7-days">Federal institutions average 259 days to report privacy breaches. They&#8217;re supposed to flag major incidents within 7 days</a></p><ul><li><p>This is way worse than I would have expected, but I am honestly not surprised. Privacy breaches are usually treated less severe than cybersecurity breaches. While it may seem obvious, both are not the same, but often treated similarly as it involved the segmentation and protection of data. As David Fraser states in the article: "There seems to be no accountability for non-compliance with these laws and policies" </p></li></ul></li><li><p><a href="https://theijf.org/article/national-research-council-cyber-attacks">Internal briefing says Canada&#8217;s National Research Council remains exposed to high-risk cyber attacks</a></p><ul><li><p>National Research Council and any research-based organization should have a priority on cybersecurity, but it seems like they&#8217;re jumping from incident to incident.</p></li></ul></li><li><p><a href="https://www.healthcareinfosecurity.com/canadian-manufacturers-confront-rising-ot-cyber-risk-a-30911">Canadian Manufacturers Confront Rising OT Cyber Risk</a></p></li><li><p><a href="https://arstechnica.com/security/2026/03/from-iran-to-ukraine-everyones-trying-to-hack-security-cameras/">From Iran to Ukraine, everyone&#8217;s trying to hack security cameras</a></p><ul><li><p>Operational technology cybersecurity - so hot right now. More threat actors are aware of operational technology and its importance, so they&#8217;re increasingly trying to target it.</p></li></ul></li><li><p><a href="https://www.breachsettlementcanada.kpmg.ca/">Government of Canada Privacy Breach Class Action &#8211; Proposed Settlement</a></p><ul><li><p>Potential class action for privacy breach of Government of Canada account between March 1, 2020 and December 31, 2020. An Approval Hearing will be held on March 31, 2026, at 9:30 a.m. PST</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/atlantic/nova-scotia/article/halifax-water-investigating-privacy-breach-shuts-down-online-portal/">Halifax Water investigating privacy breach, shuts down online portal</a></p><ul><li><p>Hard to tell if this is a cybersecurity incident yet based on their messaging.</p></li></ul></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/">New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</a></p><ul><li><p>A new person in the middle attack that intercepts a target&#8217;s downlink traffic. </p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/">Threat Actor leveraged a Popular AI security testing platform tool for Attack</a></p></li><li><p><a href="https://cyberpress.org/apt37-air-gap-breach-campaign/">APT37 Targets Air-Gapped Networks With Novel Malware Strain</a></p><ul><li><p>Over the past few years we&#8217;ve been increasingly seeing unique methods of attack to jump air-gaps. Usually APTs, I don&#8217;t think we&#8217;ve seen one from a non-APT.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/05/google-says-half-of-all-zero-days-it-tracked-in-2025-targeted-buggy-enterprise-tech/">Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech</a></p><ul><li><p>Part of this report says that zero-days were exploited by syware makers (15) more oftenthan government-backed espionage groups (12). This should be a concern for everyone because, believe it or not, spyware firms are less trustworthy than governments.</p></li></ul></li><li><p><a href="https://www.anthropic.com/news/mozilla-firefox-security">Anthropic Partnering with Mozilla to improve Firefox&#8217;s security</a></p><ul><li><p>Claude is increasingly doing great stuff with vulnerability discovery, so we&#8217;ll likely see more and more of these partnerships.</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PRV0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PRV0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 424w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 848w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 1272w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PRV0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png" width="662" height="429" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:429,&quot;width&quot;:662,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111538,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/189657731?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PRV0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 424w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 848w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 1272w, https://substackcdn.com/image/fetch/$s_!PRV0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc90e9885-45a6-48fb-a2db-7a5c56a0d217_662x429.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/">Microsoft: Hackers abusing AI at every stage of cyberattacks</a></p><ul><li><p>More of what everyone is saying: AI is making it easier for everyone to conduct cyberattacks.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d0b7cb2a-e67f-44d6-b278-2bef0f8c3460&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cyber Dimensions to the Defence Industrial Strategy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-18T17:25:56.808Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a0b6015-0fff-4ff1-a9f6-5e8f304977fc_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188287976,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Read my cyber review of the Defence Industrial Strategy. TL;DR: It will help a lot of Canada&#8217;s cyber industry, but there are major gaps and hurdles to overcome regarding infrastructure and hyperscalers.</p><ul><li><p><a href="https://www.cigionline.org/publications/cross-border-data-transfer-regimes-current-landscape-and-outlook-ahead/">Cross-Border Data Transfer Regimes: Current Landscape and Outlook Ahead</a></p><ul><li><p>A good overview at global cross-border data transfer regimes, including Canada.</p></li></ul></li><li><p><a href="https://hackread.com/link11-releases-european-cyber-report-2026-ddos-attacks-become-a-constant-threat/">Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat</a></p><ul><li><p>I feel like we&#8217;ve certainly have already accepted DDoS attacks as a constant threat, but few have really elaborated on this.</p></li></ul></li><li><p><a href="https://www.rusi.org/explore-our-research/publications/commentary/fog-proxies-and-uncertainty-cyber-us-israeli-operations-iran">Fog, Proxies and Uncertainty: Cyber in US-Israeli Operations in Iran</a></p><ul><li><p>A good overview on the role of cyber in current war against Iran.</p></li></ul></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:189879839,&quot;url&quot;:&quot;https://teresascassa.substack.com/p/bcs-court-of-appeal-decision-in-clearview&quot;,&quot;publication_id&quot;:3380257,&quot;publication_name&quot;:&quot;Teresa Scassa&#8217;s Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!0Wwc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;title&quot;:&quot;BC's Court of Appeal decision in Clearview AI saga is a win for privacy&quot;,&quot;truncated_body_text&quot;:&quot;The British Columbia Court of Appeal has ruled that the BC Privacy Commissioner&#8217;s enforcement order against Clearview AI is both reasonable and enforceable. Clearview AI is a US-based company that scrapes photographs from the internet, including from social media websites, to build a massive facial recognition database which it offers as a service to la&#8230;&quot;,&quot;date&quot;:&quot;2026-03-04T14:20:22.201Z&quot;,&quot;like_count&quot;:3,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:103039402,&quot;name&quot;:&quot;Teresa Scassa&quot;,&quot;handle&quot;:&quot;tscassa&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;bio&quot;:&quot;I'm a law professor at the University of Ottawa, where I hold the Canada Research Chair in Information Law and Policy. My research areas include privacy law, AI regulation, and data governance. All opinions and commentary are my own.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-11-19T15:35:43.741Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:3444266,&quot;user_id&quot;:103039402,&quot;publication_id&quot;:3380257,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3380257,&quot;name&quot;:&quot;Teresa Scassa&#8217;s Substack&quot;,&quot;subdomain&quot;:&quot;teresascassa&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Posts about developments in law and technology with a focus on AI, privacy, and data governance.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg&quot;,&quot;author_id&quot;:103039402,&quot;primary_user_id&quot;:103039402,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-19T16:15:47.041Z&quot;,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;Teresa Scassa&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://teresascassa.substack.com/p/bcs-court-of-appeal-decision-in-clearview?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!0Wwc!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b7c31b0-5503-437e-9e4b-8aa4fb0f8622_1294x1394.jpeg" loading="lazy"><span class="embedded-post-publication-name">Teresa Scassa&#8217;s Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">BC's Court of Appeal decision in Clearview AI saga is a win for privacy</div></div><div class="embedded-post-body">The British Columbia Court of Appeal has ruled that the BC Privacy Commissioner&#8217;s enforcement order against Clearview AI is both reasonable and enforceable. Clearview AI is a US-based company that scrapes photographs from the internet, including from social media websites, to build a massive facial recognition database which it offers as a service to la&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">3 months ago &#183; 3 likes &#183; Teresa Scassa</div></a></div><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.nextgov.com/cybersecurity/2026/03/how-cyber-command-contributed-operation-epic-fury-against-iran/411818/">How Cyber Command contributed to Operation Epic Fury against Iran</a></p><ul><li><p>USCYBERCOM and USSPACECOM were the first to take action, degrading comms and command and control of Iran including its air defence.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/03/02/hacktivists-claim-to-have-hacked-homeland-security-to-release-ice-contract-data/">Hacktivists claim to have hacked Homeland Security to release ICE contract data</a></p><ul><li><p>Hacktivist group called &#8220;Department of Peace&#8221; leaked contract data between DHS Office of Industry Partnership and more than 6,000 companies including Raytheon, Anduril, Palantir, and more.</p></li></ul></li><li><p><a href="https://www.theverge.com/ai-artificial-intelligence/887309/openai-anthropic-dod-military-pentagon-contract-sam-altman-hegseth">How OpenAI caved to the Pentagon on AI surveillance</a></p><ul><li><p>Sam Altman is either lying, is grossly ignorant, or was intentionally misled by the Pentagon. The redlines that Altman thinks the Pentagon agreed to, they actually did not.</p></li></ul></li><li><p><a href="https://www.404media.co/cbp-tapped-into-the-online-advertising-ecosystem-to-track-peoples-movements/">CBP Tapped Into the Online Advertising Ecosystem To Track Peoples&#8217; Movements</a></p><ul><li><p>Every level of United States law enforcement are trying to track your every movement because everyone who isn&#8217;t law enforcement is considered a threat to them. Do not travel to the United States unless you have to.</p></li></ul></li><li><p><a href="https://archive.ph/vN8U5">A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals</a></p><ul><li><p>I am getting a lot of deja vu about this and the Wannacry ransomware attacks.</p></li></ul></li><li><p><a href="https://www.404media.co/the-fbi-is-using-ai-to-hack-targets/">The FBI Discusses the Potential to Use AI to Hack Targets</a></p><ul><li><p>The FBI states this is all hypothetical, but I trust the FBI as much as I trust the Trump administration.</p></li></ul></li><li><p><a href="https://www.techpolicy.press/will-nsos-us-lobbying-pay-off-under-trump/">Will NSO&#8217;s US Lobbying Pay Off Under Trump?</a></p><ul><li><p>Those who have bribed Trump with money have achieved significant gains. So, unless there is major internal pushback, then spyware firm NSO will benefit from bribing Trump.</p></li></ul></li><li><p><a href="https://www.theguardian.com/technology/2026/mar/03/iran-war-heralds-era-of-ai-powered-bombing-quicker-than-speed-of-thought">Iran war heralds era of AI-powered bombing quicker than &#8216;speed of thought&#8217;</a></p><ul><li><p>Anthropic&#8217;s Claude and other models used to support the attack on Iran.</p></li></ul></li><li><p><a href="https://hackread.com/ransomware-breach-university-of-hawaii-cancer-center/">Ransomware Breach at University of Hawaii Cancer Center Affects 1.2M People</a></p><ul><li><p>Ransomware groups love to target healthcare.</p></li></ul></li><li><p><a href="https://www.wired.com/story/how-vulnerable-are-computers-to-an-80-year-old-spy-technique-congress-wants-answers/">How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers</a></p></li><li><p><a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/president-trumps-cyber-strategy-for-america.pdf">United States releases its Cyber Strategy</a></p><ul><li><p>Six pillars include: Shape adversary behavior; promote common sense regulation; modernize and secure federal government networks; secure critical infrastructure; sustain supriority in critical and emerging technologies, and build talent and capacity.</p></li><li><p>Long story short: They are out of their depth and it is clear they don&#8217;t fully understand what they&#8217;re talking about. A lot of hot air. Long story short, they&#8217;ll do whatever they can get away with.</p></li></ul></li><li><p><a href="https://halifax.citynews.ca/2026/03/05/fbi-investigating-suspicious-cyber-activity-on-system-holding-sensitive-surveillance-information/">FBI investigating &#8216;suspicious&#8217; cyber activity on system holding sensitive surveillance information</a></p><ul><li><p>Chinese threat actor access FBI internal network that stores wiretaps and intelligence surveillance warrants.</p></li></ul></li><li><p><a href="https://www.whitehouse.gov/fact-sheets/2026/03/fact-sheet-president-donald-j-trump-combats-cybercrime-fraud-and-predatory-schemes-against-american-citizens/">Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens</a></p><ul><li><p>Some hints that the National Coordination Center may work with private sector orgs for hack-back.</p></li></ul></li><li><p><a href="https://cyberscoop.com/house-committee-advances-rural-utility-cybersecurity-act/">Congress looks to revive critical cyber program for rural electric utilities</a></p></li><li><p><a href="https://www.defenseone.com/policy/2026/03/dod-names-james-aaron-bishop-serve-ciso/411930/">Air Force cybersecurity chief tapped to lead Pentagon&#8217;s information-security efforts</a></p></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://hackread.com/shinyhunters-leak-dutch-telecom-odido-data/">ShinyHunters Leak 2M Records From Dutch Telecom Odido, Claim 21M Stolen</a></p><ul><li><p>This will likely continue as Odido has said it will not pay the ransom. I would honestly be a bit worried if I was ShinyHunters. The Dutch have a long history of and are well regarded for their hacking skills, so I wouldn&#8217;t be surprised if the Netherlands makes targeting ShinyHunters a priority.</p></li></ul></li><li><p><a href="https://www.bbc.com/news/articles/cz0ggkr2g77o">Transport for London hack in 2024 affected around 10 million people, BBC can reveal</a></p><ul><li><p>BBC claims this is one of the biggest hacks in British history. TfL was attacked by Scattered Spider </p></li></ul></li><li><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/project-compass-first-operational-results-against-com-network">Project Compass: first operational results against The Com network</a></p><ul><li><p>I applaud and celebrate whenever The Com members are arrested.</p></li></ul></li><li><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/major-data-leak-forum-dismantled-in-global-action-against-cybercrime-forum">Major data leak forum dismantled in global action against cybercrime forum</a></p><ul><li><p>Leakbase forum taken down.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p>North Korea&#8217;s <a href="https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/">APT37 hackers use new malware to breach air-gapped networks</a></p></li><li><p><a href="https://www.cnbc.com/2026/03/02/amazon-says-drone-strikes-damaged-3-facilities-in-uae-and-bahrain.html">Amazon says drone strikes damaged 3 facilities in UAE and Bahrain</a></p></li><li><p><a href="https://www.metacurity.com/the-iran-war-has-a-cyber-story-its-not-the-one-youre-reading/">The Iran war has a cyber story. It&#8217;s not the one you&#8217;re reading</a></p></li><li><p><a href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/">Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East</a></p><ul><li><p>Iran appears to be conducting a lot of scanning and using IP cameras to aid in missile target selection.</p></li></ul></li><li><p><a href="https://www.politico.com/news/2026/03/04/israel-iran-cyber-headquarters-00813364">Israel says it knocked out Iran&#8217;s cyber warfare headquarters</a></p><ul><li><p>Take this with a grain of salt.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/chinese-state-hackers-target-telcos-with-new-malware-toolkit/">Chinese state hackers target South American telcos with new malware toolkit</a></p><ul><li><p>If you&#8217;re a telco, China is targeting you.</p></li></ul></li><li><p><a href="https://www.svd.se/a/K8nrV4/metas-ai-smart-glasses-and-data-privacy-concerns-workers-say-we-see-everything">She Came Out of the Bathroom Naked, Employee Says</a></p><ul><li><p>Swedish investigation into the mass privacy infringement of Meta glasses.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Government Provides Next Steps to Sovereign Cloud]]></title><description><![CDATA[Is the Government of Canada headed towards true sovereign cloud?]]></description><link>https://www.cyberincontext.ca/p/canadian-government-provides-next</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-government-provides-next</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Fri, 06 Mar 2026 21:26:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0e1b4c37-bc01-4aa1-bda3-90650e2d1f9d_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><h4><strong>Canadian Cyber in Context is sponsored by</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.123cyber.ca/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png" width="442" height="170.30357142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:561,&quot;width&quot;:1456,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:26108,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.123cyber.ca/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">123 Cyber Inc.</figcaption></figure></div><h6><strong>All views expressed belong to Canadian Cyber in Context and do not reflect the position of any sponsor.</strong></h6><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-government-provides-next?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-government-provides-next?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Where are we at with Sovereign Cloud?</h3><p>Since early 2025, the Government of Canada has increasingly looked to shore up and improve Canada&#8217;s digital sovereignty. The reasons for this are myriad, including many strong economic reasons to invest in Canadian capacity to develop data centre infrastructure to support Canada&#8217;s digital technology. However, the most influential reason is the significant turn the United States has taken towards authoritarianism, and Canada&#8217;s growing realization of how much its digital sovereignty is compromised by its reliance on United States cloud providers.</p><p>Initial explorations by the federal government noted big loopholes in policy and procurement that allow major hyperscalers and United States-based corporations to refer to themselves sovereign cloud. This is problematic because <a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">United States law states that any data on a foreign server that a United States-based corporation has access to can be requested by the United States as part of a &#8220;criminal investigation,&#8221; and the country where that data is hosted will have no say in its transfer</a>. </p><p>One of the primary problems is that there are four different definitions of a &#8220;Canadian company,&#8221; including &#8220;<a href="https://core-ombuds.canada.ca/core_ombuds-ocre_ombuds/fact_sheet_9-fiche_descriptive_9.aspx?lang=eng">any company that is formed in Canada following the laws of either the Government of Canada or a provincial government. This includes government and private companies of any size</a>.&#8221; As a result, a company incorporated in Canada but owned by an American corporation still counts as a Canadian company. The Canadian Shield Institute have done some great work on this topic.</p><p><a href="https://ccianet.org/wp-content/uploads/2025/09/Canadas-Sovereign-Cloud-Initiative.pdf">Those opposed to</a>&nbsp;Canadian sovereign cloud being wholly owned by Canadian firms refuse to acknowledge Canadian national security and sovereignty issues, particularly due to United States law. Their error is ignorance and naivety in believing that their sovereignty matters more than ours. Fortunately, the Government of Canada is invoking the <a href="https://opo-boa.gc.ca/miseajour-esn-updated-nse-eng.html">national security exception</a>, which is something common in most countries that can be triggered to exclude a procurement from trade agreement obligations. This means Canada can say trade agreement rules concerning data localization and inclusion in procurement don&#8217;t matter, sovereign cloud is a matter of national security.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> </p><p>SSC updated the request for information (RFI) on March 3, which provides new information on the program's direction and who will be allowed in. Before jumping into what&#8217;s new, let us figure out what SSC first learned that may have contributed to this update.</p><div><hr></div><h3>What has SSC Learned?</h3><p>SSC released the <a href="https://web.archive.org/web/20251017093855/https://canadabuys.canada.ca/en/tender-opportunities/tender-notice/cb-416-17296820">first wave of its RFI on sovereign cloud capability last year</a>. In addition to requiring that data is processed, transmitted, and stored exclusively within Canada, the RFI also included a minimum requirement that &#8220;at all times only under the control of service providers, up to and including their ultimate parent corporations, that are not subject to foreign laws that permit foreign governments to obtain access to Canada&#8217;s data without Canada&#8217;s prior written consent.&#8221; This RFI is intended to inform the development of a procurement vehicle for a sovereign cloud Infrastructure as a Service (IaaS) and a native Platform as a Service (PaaS).</p><p>In the update to the RFI, this has been changed to &#8220;Cloud services remain at all times under the control of service providers (including their ultimate parent corporations) that are not subject to foreign laws permitting foreign governments to access or <strong>compel</strong> actions affecting Canada&#8217;s data or services without Canada&#8217;s prior written consent.&#8221;</p><p>This difference in wording is very telling as SSC figure out how to specifically frame and define the techno-legal constraints to ensure digital sovereignty. </p><p>The RFI examined a range of issues related to sovereign cloud, but that this is the basic entry point for it is a very positive sign. After the first wave, SSC released documents that elaborate upon what they are looking for and what they have learned so far:</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Rfi Dr Wave 1 Vague 1 Sovereign Cloud Webinar Questions &amp; Answers No1</div><div class="file-embed-details-h2">189KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/5a6b0a73-75d7-4a1a-a095-4a5ab65b5478.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/5a6b0a73-75d7-4a1a-a095-4a5ab65b5478.pdf"><span class="file-embed-button-text">Download</span></a></div></div><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Rfi Dr Wave 1 Wave 1 Sovereign Cloud Webinar Questions &amp; Answers No2</div><div class="file-embed-details-h2">189KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/01279546-a004-461c-b221-1cefdcbb1ea3.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/01279546-a004-461c-b221-1cefdcbb1ea3.pdf"><span class="file-embed-button-text">Download</span></a></div></div><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Rfi Dr Sovereign Cloud What We Heard Report</div><div class="file-embed-details-h2">376KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/fa6e0f30-f473-42db-b258-ffb268cf98c0.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/fa6e0f30-f473-42db-b258-ffb268cf98c0.pdf"><span class="file-embed-button-text">Download</span></a></div></div><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Rfi Dr Wave 1 Vague 1 Sovereign Cloud Supplier Webinar August 22 2025 0</div><div class="file-embed-details-h2">625KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.cyberincontext.ca/api/v1/file/e6795d40-fd9d-452a-834a-c36977733612.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.cyberincontext.ca/api/v1/file/e6795d40-fd9d-452a-834a-c36977733612.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-government-provides-next?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-government-provides-next?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7gFe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7gFe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 424w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 848w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 1272w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7gFe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png" width="1456" height="609" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/50585a76-5354-4702-b551-02a2400ea368_1878x785.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:609,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:567416,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/190047079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7gFe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 424w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 848w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 1272w, https://substackcdn.com/image/fetch/$s_!7gFe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50585a76-5354-4702-b551-02a2400ea368_1878x785.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Carney Government is making a lot of policy and proclamations about Canadian digital sovereignty in cloud and AI, but it is doing so without understanding the extent to which Canadian industry can meet what it is calling for, or the obstacles it faces. </p><p>This RFI is intended to help with this, and as SSC determine what is possible, it will seek more granularity to inform the government and eventual competitive process. Some highlights of what they&#8217;ve learned so far (Keep in mind that this is all self-reporting):</p><ul><li><p>40 suppliers participated, and 32 met the sovereign eligibility requirements</p><ul><li><p>This is honestly more than I expected. </p></li></ul></li><li><p>Sovereign cloud options do not match the &#8220;scalability&#8221; of hyperscalers.</p><ul><li><p>This confirms what I have been saying. Canadian cloud providers exist, but they cannot match the scale of the giants.</p></li></ul></li><li><p>Limited sovereign hardware and reliance on proprietary software</p><ul><li><p>This is no surprise. I do not want to call Canadian cloud providers resellers, but Canada hasn&#8217;t had much domestic innovation or development of cloud capabilities and technology. That means relying on other&#8217;s intellectual property a lot.</p></li><li><p>However, the current landscape and investment in this space mean this will be a growing sector.</p></li></ul></li></ul><h6>I provide some additional commentary on some RFI Q&amp;A at the end.</h6><div><hr></div><h3>What&#8217;s New in the Update?</h3><p>However, the federal government appears poised to address this gap. On March 3, Shared Services Canada (SSC) updated the <a href="https://canadabuys.canada.ca/en/tender-opportunities/tender-notice/cb-416-17296820">Request for Information (RFI) - Sovereign Cloud Capability - Upcoming Competitive Processes</a> with specific, targeted requests for information that should make proponents of Canadian sovereign cloud happy. I have covered a lot of information from last year here, so what&#8217;s new and so interesting about the update?</p><ul><li><p>As I already noted above, they have slightly adjusted their definition concerning what counts as sovereign cloud: &#8220;Cloud services remain at all times under the control of service providers (including their ultimate parent corporations) that are not subject to foreign laws permitting foreign governments to access or <strong>compel</strong> actions affecting Canada&#8217;s data or services without Canada&#8217;s prior written consent.&#8221;<br></p></li><li><p>They have released details on the planned competitive process</p><ul><li><p>Only Canadian small and medium businesses (SMBs) will be able to compete.</p></li><li><p>They use the <a href="https://www.statcan.gc.ca/o1/en/plus/1253-small-and-medium-businesses-driving-large-sized-economy">Statistics Canada definition of SMBs</a>:</p><ul><li><p>A small business has 1 to 99 paid employees</p></li><li><p>A medium-sized business has between 100 and 499 paid employees.</p></li></ul></li><li><p>When talking SMBs, they again want to emphasize that neither the corporation nor any parent corporation should be compelled by a foreign government to take any action without Canadian consent.</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gmXN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gmXN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 424w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 848w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 1272w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gmXN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png" width="784" height="176" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:176,&quot;width&quot;:784,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:45687,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/190047079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gmXN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 424w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 848w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 1272w, https://substackcdn.com/image/fetch/$s_!gmXN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a5d47af-97e7-4d8b-8b69-21ddc239dab4_784x176.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><ul><li><p>There are likely to be one-off competitive processes that &#8220;address specific [security or] sovereignty related challenges where Canadian firms can offer concrete solutions that materially enhance Canada&#8217;s sovereign cloud posture.&#8221;</p><ul><li><p>This seems to indicate that there will potentially be contracts where SMBs cannot meet the needs. This may even mean that United States-owned Canadian corporation could compete in these one-offs, but it is unclear what definition they are using for &#8220;Canadian firm&#8221; here. It likely means the narrow one they have developed to sovereign cloud, but for these one-off contracts it could be more permissible depending on the context.</p></li></ul></li><li><p>We also have a very vague timeline, but we at least know the steps. We know they are undertaking an agile procurement process, which is much more collaborative and can at times be quicker, so this is reflected in their timeline. It appears they are aiming to have a draft solicitation as soon as possible, which will be developed through engagement with industry.</p><ul><li><p>One thing to note is that SSC/PSPC may move towards an initial technical qualification as the process progresses, because they will need to discuss some security requirements at some point.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qaY9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qaY9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 424w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 848w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 1272w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qaY9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png" width="829" height="193" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:193,&quot;width&quot;:829,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:38069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/190047079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qaY9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 424w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 848w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 1272w, https://substackcdn.com/image/fetch/$s_!qaY9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa53053d-8fbf-41cf-b6f5-f32ff02b6e1f_829x193.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div></li></ul></li></ul><div><hr></div><h3>Takeaways</h3><ul><li><p>Shared Services Canada (SSC) is specifically &#8220;leveraging an adjusted definition specific to Sovereign Cloud Services procurement.&#8221; </p><ul><li><p>This may run into some difficulty later in the procurement process as the government&#8217;s wants and needs for sovereign cloud may not align with a lot of existing policies. This is particularly reflected in many of the questions received about specifics related to qualifications and existing definitions and policies of SSC<br></p></li></ul></li><li><p>SSC are trying to determine what can be achieved with current capabilities that meet the specific guidelines they set out.</p><ul><li><p>This may mean the results are not what we want to hear, but it will help the government determine what is feasible right now and what to invest in for the long term. <br></p></li></ul></li><li><p>Because there is a major market gap for Canadian firms specializing in data centre infrastructure, this creates a potential obstacle to seeing a full-stack sovereign cloud that is Canadian, but this is a starting point<br></p></li><li><p>Post-Quantum cryptography will likely be required. They don&#8217;t have much more on this yet, but they at least acknowledge it&#8217;s likely a requirement.<br></p></li><li><p>Do not expect any sovereign cloud investment and competitive process to replace the hyperscalers. The information SSC has received indicates significant market potential, but there remains a gap between the current potential of the Canadian sovereign cloud market and that of hyperscalers. This is likely contributing to the big focus on SMBs.</p><ul><li><p>In other words, major cloud and data centre/infrastructure projects, like secret cloud, will still likely go to a hyperscaler.</p></li></ul></li></ul><div><hr></div><h3>Selected Q&amp;A Commentary</h3><ul><li><p>One question raised during the initial RFI was why the national security exception was invoked and whether this could limit competition. </p><ul><li><p>It all depends on how you view competition. As this is an RFI, it is not a competition yet, but the exception will affect the competition in the end. Canada wants a sovereign Canadian cloud so using a national security exception doesn&#8217;t limit competition if it is specifically looking for Canadian firms. For American corporations who do not want Canadian to have digital sovereignty, this could be viewed as limiting competition because they aren&#8217;t involved. The problem here is that Canada doesn&#8217;t want their involvement, which is why the national security exception is being used. Americans do not seem to understand that they are the security problem we want to avoid.</p></li></ul></li><li><p>There was a question about the involvement of American hyperscaler-owned Canadian corporations in the process, such as Microsoft Canada and AWS Canada.</p><ul><li><p>The response was that the RFI is not a qualification process and is just about collecting market information. The question is largely wanting to speak to being qualified for the eventual IaaS and PaaS of sovereign cloud, many of them claim to sell sovereign cloud as well. However, the development of this specific procurement vehicle will mean American hyperscalers will not be able to say they provide sovereign cloud, because according to the RFI, they are leaning towards a very strict definition where </p></li></ul></li><li><p>One question specifically asked about using &#8220;multiple services and technology layers&#8221; and the degree to which part or all of the components are affected by the <a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">United States CLOUD Act</a>.</p><ul><li><p>This is one of the best questions. We think of digital technology as a black box, all-inclusive, but when it comes to large data centres, cloud, servers, and everything in between, this can involve a vast range of supply chains spanning software and hardware. This is where a lot of Canadian service providers are likely to have some trouble because even if it is wholly owned by a Canadian firm, it could be using all United States products, such as software developed by an American hyperscaler.</p></li></ul></li><li><p>One of the most important questions is concerning what is meant by &#8220;subject to foreign laws.&#8221; </p><ul><li><p>The core of this question is concerning a Canadian company with operations in the United States would still be affected by the United States CLOUD Act, or really other laws for that manner.</p></li><li><p>SSC is particularly looking for input on how a Canadian-owned company would address this. A major issue is that any major Canadian-owned corporation that operates at the data centre level and provide government cloud services are likely to be operating in the United States as well.</p><ul><li><p>I am of the view that any sovereign cloud would have to either not operate in the United States or places with similar sovereignty-infringing laws or to explicitly state they will refuse all foreign requests/demands for Canadian-hosted data.</p></li></ul></li></ul></li><li><p>One question asked if a Canadian-hosted service is sufficient, insinuating it is outside the scope of the US CLOUD Act.</p><ul><li><p>This is false and part of the ongoing strategy of misinformation from American hyperscalers. It is no longer sufficient for data to only be hosted in Canada. A United States-based corporation like Microsoft or AWS, which owns its Canadian subsidiaries, is still required to give data to the United States if the courts say so, even if the data is hosted in Canada.</p></li><li><p><strong>This is the entire reason for seeking to develop sovereign Canadian cloud.</strong></p></li></ul></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>The exception can be challenged if it wasn&#8217;t &#8220;properly invoked,&#8221; but I believe this is extremely rare.</p></div></div>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 28/02/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending February 28]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226</guid><pubDate>Mon, 02 Mar 2026 14:30:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/960bdebf-c878-4fb0-9f08-ad3425ef638b_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have completed the first rough draft of my dissertation (yay!). I will be entering a major editing phase over the next few weeks, so my availability may fluctuate.</p></li><li><p><a href="https://www.ourcommons.ca/petitions/en/Petition/Details?Petition=e-7115">Go sign Tanya Janca&#8217;s Secure-Coding Petition</a>! (Article on this coming soon)</p></li><li><p>There are no indications of major Iranian cyber attacks yet, but be careful out there.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-280226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://thenarwhal.ca/olds-alberta-ai-data-centre/">A $10-billion AI data centre races ahead in a rural Alberta town, population 9,679</a></p><ul><li><p>&#8220;The project, if built, would include the second-largest power plant in Alberta and consume as much electricity as the city of Edmonton.&#8221;</p></li><li><p>Reminds me of this article I wrote last year:</p></li></ul></li><li><p><a href="https://forms-formulaires.alpha.canada.ca/en/id/cmkbdzco801d4x901rf4gqboq">Government of Canada AI Register</a></p><ul><li><p>The Government of Canada has opened the consultation on the public AI register. The <a href="https://open.canada.ca/data/en/dataset/fcbc0200-79ba-4fa4-94a6-00e32facea6b">AI Register</a> provides information on where and how AI is being used in the federal government. The consultation is specifically seeking information on if it include the right information and how the AI register could be make easier to use. Submissions end March 31</p></li></ul></li><li><p><a href="https://www.cira.ca/en/resources/news/cybersecurity/mdr-24-7-canadian-cybersecurity/">CIRA MDR delivers a 24/7 Canadian-based managed detection and response cybersecurity service</a></p><ul><li><p>I certainly did not see this coming. CIRA is the Canadian Internet Registration Authority, which is in charge of the .CA domain. This is a pretty smart move as demands for sovereign security options grow, CIRA already has a strong market position. It will be interesting to see them entering what I feel to be a already heavily competitive sector.</p></li></ul></li><li><p><a href="https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/">Meta Director of AI Safety Allows AI Agent to Accidentally Delete Her Inbox</a></p><ul><li><p>These are the people we are supposed to trust about AI safety. It appears they gave OpenClaw access to their computer and email, which led to the entire inbox being deleted. I have resisted covering OpenClaw at all because of how plain dumb it is, but may </p></li></ul></li><li><p><a href="https://industrialcyber.co/utilities-energy-power-water-waste/google-cloud-calls-for-unified-ai-defense-as-energy-sector-faces-cyber-perfect-storm/">Google Cloud calls for unified AI defense as energy sector faces cyber &#8216;perfect storm&#8217;</a></p><ul><li><p>There is a growing need to better organize and defend critical infrastructure sectors. Although they frame this as defending things, this is really trying to say we should put more things in the cloud. While they do so as a means to leverage greater security tools and security, this is just marketing.</p></li></ul></li><li><p><a href="https://www.lemanic.ca/2026/02/18/cyberattaque-au-css-du-fer-voici-ce-que-les-parents-peuvent-faire-pour-se-proteger-selon-steve-waterhouse/">Cyberattaque au CSS du Fer : voici ce que les parents peuvent faire pour se prot&#233;ger, selon Steve Waterhouse</a></p><ul><li><p>Amid so many data leaks and breaches, I like Steve&#8217;s advice: assume your data will eventually be misused and respond accordingly. Compartmentalization, two-factor authentication, and password managers should all be the norm.</p></li><li><p>For my Francophone subscribers: I am working on including more Quebec and French content in some capacity. I do not know it myself </p></li></ul></li><li><p><a href="https://www.cbc.ca/news/politics/open-ai-government-meeting-tumbler-ridge-9.7104789">AI minister &#8216;disappointed&#8217; by OpenAI meeting held in wake of Tumbler Ridge shooting</a></p><ul><li><p>Who is going to tell Evan Solomon that his rose-colored glasses, failure to recognize and address risks and security threats, approach is a product of this, and he is part of the disappointment?</p></li><li><p><a href="https://www.usnews.com/news/top-news/articles/2026-02-25/canada-tells-openai-to-boost-safety-measures-or-be-forced-to-by-government">Canada Tells OpenAI to Boost Safety Measures or Be Forced to by Government</a></p><ul><li><p>This was based on statements from Justice Minister Sean Fraser. I would say this is likely all bark and no bite, but it remains to be seen if this tragedy will change the government&#8217;s course. The Carney government and AI Minister Solomon have sent major signals that they did not intend to be restrictive or will focus on regulations, particularly to distinguish themselves from the Trudeau government and to lean into the economics of AI. </p></li><li><p><a href="https://www.politico.com/news/2026/02/26/canada-openai-chatgpt-shooting-00802746">The perpetrator had a second ChatGPT account after their first was banned</a> and OpenAI has </p></li><li><p><a href="https://thelogic.co/news/exclusive/federal-government-reconsider-online-harms-panel-ai/">Feds reconvene Trudeau-era online harms panel amid chatbot fears</a></p></li></ul></li></ul></li><li><p><a href="https://www.newswire.ca/news-releases/bell-and-hypertec-partner-to-strengthen-canada-s-sovereign-ai-ecosystem-868073613.html">Bell and Hypertec partner to strengthen Canada&#8217;s sovereign AI ecosystem</a></p><ul><li><p>I have said that the best short term pathway for Canada to quickly develop a capacity to compete domestically is for Canada&#8217;s big telecoms, such as Bell, to get into the game. This is potentially one step in that direction. </p></li><li><p>The problem with US corporations is geographic and legal. If a corporation operates in the United States, it is exposing itself to the US Cloud Act. This is why we need a Canadian corporation that either does not operate or minimal liability in the United States.</p></li></ul></li><li><p><a href="https://telconews.ca/story/videotron-taps-samsung-to-modernise-canadian-5g-core">Videotron taps Samsung to modernise Canadian 5G core</a></p><ul><li><p>An example of when I talk about Canada does not have the ability to compete with hyperscalers and often must partner with non-Canadians. Time and again they have to partner with others, usually for infrastructure needs.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/02/minister-anand-and-minister-mcguinty-welcomed-republic-of-korea-counterparts-to-ottawa.html">Minister Anand and Minister McGuinty welcomed Republic of Korea counterparts to Ottawa</a></p><ul><li><p>Includes major cyber component. North Korea is one of the most prolific state cyber threat actors, and the Republic of Korea is often a target for this. Increasing cyber relations and cooperation is good and cyber is a major component to Canada&#8217;s Indo-Pacific strategy.</p></li></ul></li><li><p><a href="https://www.ctvnews.ca/video/deception-decoded/2026/02/25/canadas-critical-infrastructure-is-being-targeted-in-cyber-attacks-deception-decoded/">Canada&#8217;s critical infrastructure is being targeted in cyber attacks | Deception Decoded</a></p><ul><li><p>Short interview with the Head of the Canadian Centre for Cyber Security Rajiv Gupta</p></li></ul></li><li><p><a href="https://www.bce.ca/news-and-media/newsroom?article=bell-invests-1-million-in-mckenna-institute-to-strengthen-canadas-cybersecurity-talent-pipeline">Bell invests $1 million in McKenna Institute to strengthen Canada&#8217;s cybersecurity talent pipeline</a></p><ul><li><p>This investment will help establish the &#8220;McKenna Institute Cyber Talent Program powered by Bell Canada. This 12-to-16 week, full-time, industry-led intensive program is designed to complement existing academic pathways by providing applied, real-world experience that reflects the rapidly evolving needs of the cybersecurity sector.&#8221; Sounds like this is setting up a co-op program.</p></li></ul></li><li><p><a href="https://haveibeenpwned.com/Breach/CanadianTire">Canadian Tire Data Breach</a></p><ul><li><p>HaveIBeenPwned confirms Canadian Tire data breach.</p></li></ul></li><li><p><a href="https://securitybrief.ca/story/quantum-cloud-and-cyber-take-shape-in-canadian-defence-plan">Quantum, cloud and cyber take shape in Canadian defence plan</a></p><ul><li><p>I was interviewed for this news story on the role of quantum, cloud, and cyber in the Defence Industrial Strategy.</p></li></ul></li><li><p><a href="https://www.cyber.gc.ca/en/news-events/cse-calls-canadian-organizations-critical-infrastructure-providers-strengthen-defences-fourth-anniversary-russias-invasion-ukraine">CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on fourth anniversary of Russia&#8217;s invasion of Ukraine</a></p><ul><li><p>Canada remains a favorite target for Russian cyber threat actors.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/radio-television-telecommunications/news/2026/02/crtc-takes-action-to-connect-canadians-through-technology-and-culture.html">CRTC Releases Updated Strategic Plan: CRTC takes action to connect Canadians through technology and culture</a></p><ul><li><p>Focus appears to be on connectivity and competition.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/prairies-economic-development/news/2026/02/minister-olszewski-to-announce-federal-support-to-help-an-alberta-business-adopt-artificial-intelligence-technologies-and-compete-in-global-markets.html">Federal support to help an Alberta business adopt artificial intelligence technologies and compete in global markets</a></p></li><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/02/canada-and-india-deepen-education-collaboration-with-new-talent-and-innovation-strategy.html">Canada and India deepen education collaboration with new talent and innovation strategy</a></p><ul><li><p><a href="https://www.canada.ca/en/global-affairs/news/2026/02/backgrounder--canada-and-india-welcomed-13-new-partnerships-between-canadian-and-indian-universities.html">Includes 13 MOUs between Canadian and Indian universities</a> of tech/research organizations. A few of these include AI, computer science/engineering, and other cyber-related.</p></li></ul></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-004-critical-vulnerability-affecting-cisco-catalyst-sd-wan-cve-2026-20127">Alert - AL26-004 - Critical vulnerability affecting Cisco Catalyst SD-WAN - CVE-2026-20127</a></p></li><li><p><a href="https://www.cyber.gc.ca/en/news-events/joint-guidance-malicious-cyber-threats-sd-wan-networks">CCCS Joint guidance on malicious cyber threats to SD-WAN networks</a></p></li><li><p><a href="https://ir.crowdstrike.com/news-releases/news-release-details/2026-crowdstrike-global-threat-report-ai-accelerates-adversaries">2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface</a></p><ul><li><p>A crazy figure: Breakout time for initial access to network compromise went from 98 minutes in 2021 to 29 minutes in 2025.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VC9C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VC9C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VC9C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg" width="371" height="340.3440134907251" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:544,&quot;width&quot;:593,&quot;resizeWidth&quot;:371,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VC9C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VC9C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75b61d94-c32a-4b78-b97d-096d7b90e179_593x544.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ul></li><li><p><a href="https://bytevanguard.com/2026/02/18/critical-zero-day-ransomware-surge-feb-2026/">ByteVanguard Threat Brief Notes Canada as a Top Ransomware Victim</a></p></li><li><p><a href="https://assets.revolut.com/pdf/Revolut_Consumer_Security_and_FinCrime_Report_compressed.pdf">Revolut says Telegram now Rivals Facebook as Top Fraud Source</a></p><ul><li><p>Woohoo! Go Telegram and Facebook/Meta! You two are really knocking it out of the park for making the world a worse place.</p></li></ul></li><li><p><a href="https://canada.newsroom.ibm.com/2026-02-25-IBM-Threat-Index-Report-AI-is-Speeding-Up-Cyberattacks,-IBM-Cautions-Canadian-Organizations">IBM Threat Index Report: AI is Speeding Up Cyberattacks, IBM Cautions Canadian Organizations</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-payment-rate-drops-to-record-low-as-attacks-surge/">Ransomware payment rate drops to record low as attacks surge</a></p><ul><li><p>Ransomware victims only pay approximately 28% of the time</p></li></ul></li><li><p><a href="https://www.dataminr.com/resources/intel-brief/slh-recruiting-women-for-vishing/">Scattered Lapsus$ Hunters (SLH) Kicks Off Campaign to Recruit Women</a></p><ul><li><p>With the prevelance of AI voice tools, it is interesting they are focusing on cruiting real women.</p></li></ul></li><li><p><a href="https://www.forbes.com/sites/daveywinder/2026/03/01/check-your-gmail-account-security-now-ongoing-attacks-reported/">New Gmail Account Attack Warning&#8212;Hackers Abuse Critical Security Check</a></p></li><li><p><a href="https://www.cybersecurity-insiders.com/when-copilot-can-see-too-much-why-ai-security-starts-with-data-governance/">When Copilot Can See Too Much: Why AI Security Starts with Data Governance</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d0b7cb2a-e67f-44d6-b278-2bef0f8c3460&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cyber Dimensions to the Defence Industrial Strategy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-18T17:25:56.808Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a0b6015-0fff-4ff1-a9f6-5e8f304977fc_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188287976,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Read my cyber review of the Defence Industrial Strategy. TL;DR: It will help a lot of Canada&#8217;s cyber industry, but there are gaps to overcome major hurdles regarding infrastructure and hyperscalers.</p><ul><li><p><a href="https://financialpost.com/technology/tech-news/the-cybersecurity-market-is-not-consolidating-it-is-rewiring-itself">The cybersecurity market is not consolidating. It is rewiring itself</a></p><ul><li><p>Article by Francois Guay, creator of the Canadian Cybersecurity Network. It&#8217;s an interesting article. I especially like his emphasis on the importance of leadership, which is exactly the thing that I have been saying the Government of Canada is lacking on cybersecurity.</p></li></ul></li></ul><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/">North Korean Lazarus group linked to Medusa ransomware attacks</a></p><ul><li><p>Medusa ransomware is a ransomware-as-a-service, which has been in operation for a few years now. North Korea is widely known to be heavily investing in ransomware operations to fund its regime, so this is continues to show it will use whatever tools are out there to get this done. Further, the fact that they appear to specifically be targeting healthcare is concerning for geopolitical reasons and because healthcare tends to be very cyber insecure.</p></li></ul></li><li><p>US <a href="https://techcrunch.com/2026/02/24/treasury-sanctions-russian-zero-day-broker-accused-of-buying-exploits-stolen-from-u-s-defense-contractor/">Treasury sanctions Russian zero-day broker accused of buying exploits stolen from US defense contractor</a></p><ul><li><p>They sanctioned OperationZero, which is the broker that purchased the exploits from the former L3Harris executive who was recently jailed:</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/24/former-l3harris-trenchant-boss-jailed-for-selling-hacking-tools-to-russian-broker/">Former L3Harris Trenchant boss jailed for selling hacking tools to Russian broker</a></p><ul><li><p>Sentenced to 7 years for selling 0day exploits to Russian buyer OperationZero.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/24/marquis-sonicwall-lawsuit-ransomware-firewall-breach/">Marquis sues firewall provider SonicWall, alleges security failings with its firewall backup led to ransomware attack</a></p><ul><li><p>Ouch. Cybersecurity companies, regardless of their services or products, should ensure their contracts are sound.</p></li></ul></li><li><p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/us-orders-diplomats-fight-data-sovereignty-initiatives-2026-02-25/">Exclusive: US orders diplomats to fight data sovereignty initiatives</a></p><ul><li><p>The United States does not want Canada to have digital sovereignty. For Canada to control what happens within its laws with data is apparently a concern for the United States. This should be a wake up call.</p></li></ul></li><li><p><a href="https://www.anthropic.com/news/statement-department-of-war">Anthrophic Refuses to Remove Safeguards Preventing Autonomous Killing</a></p><ul><li><p>Pentagon wanted no safeguards. Anthrophic reasonably understand why that&#8217;s a problem. Then Hegseth and the Trump Admin has proceeded to throw a temper tantrum <a href="https://www.politico.com/news/2026/02/27/trump-orders-all-federal-agencies-to-stop-using-anthropic-00804517">and ban all federal agencies to cease using Anthrophic</a>.</p></li><li><p><a href="https://archive.ph/MShGP">According to the New York Times: &#8220;the Pentagon wanted the company to allow for the collection and analysis of unclassified, commercial bulk data on Americans, such as geolocation and web browsing data&#8221;</a></p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/27/cisa-replaces-acting-director-gottumukkala-after-a-bumbling-year-on-the-job/">CISA replaces acting director after a bumbling year on the job</a></p><ul><li><p>CISA has been gutted by the Trump admin and is stumbling at every step.</p></li><li><p><a href="https://www.politico.com/news/2026/02/28/cisa-cyber-leadership-madhu-gottumukkala-00804515">Canceled contracts, a failed polygraph and personal disputes: Inside the turbulent tenure of Noem&#8217;s former cyber czar</a></p></li></ul></li><li><p><a href="https://www.peacecorps.gov/tech/">Peace Corps Announces the Tech Corps</a></p><ul><li><p>Using the Peace Corps to help people use&#8230; AI</p></li><li><p>This would be a good idea if it wasn&#8217;t focused on AI.</p></li></ul></li><li><p><a href="https://www.defenseone.com/threats/2026/02/strikes-iran-will-test-us-cyber-strategy-abroad-and-defenses-home/411782/">Strikes on Iran will test US cyber strategy abroad, and defenses at home</a></p><ul><li><p>There is a lot we still do not know about the use of cyber operations in the war against Iran, but we do know that Iran was innundated with attacks before Internet was cut.</p></li></ul></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/shinyhunters-extortion-gang-claims-odido-breach-affecting-millions/">ShinyHunters extortion gang claims Odido breach affecting millions</a></p><ul><li><p>Obido is the Dutch telecom that I included last week. ShinyHunters is one of the top extortion gangs working right now.</p></li></ul></li><li><p><a href="https://therecord.media/netherlands-arrest-confidential-files-police">Dutch police arrest man who refused to delete confidential files shared by mistake</a></p><ul><li><p>Dutch police accidentaly gave a man access to confidential police documents and refused to give them back unless he receceived something in return. <a href="https://www.politie.nl/nieuws/2026/februari/13/07-man-aangehouden-voor-computervredebreuk-na-vergissing-politie.html">Police proceeded to arrest him for computer hacking</a>. &#8220;Computer hacking&#8221; is an absolute major stretch here as the police accidentally sent a download instead of an upload link. The man (allegedly) willingly downloaded the files and tried to extort the police, so there is some level of wrongdoing here.</p></li></ul></li><li><p><a href="https://therecord.media/ransomware-gangs-advancing-moscow-geopolitical-interests-warns-romania">Ransomware gangs advancing Moscow&#8217;s geopolitical aims, Romanian cyber chief warns</a></p><ul><li><p>It&#8217;s long been known in the information security community that there is cooperation, or at least some level of communication, between Russia&#8217;s intelligence organizations and Russian cyber criminals. There has been some research to show that there are direct connections between the government and intelligence organizations and criminal groups. It&#8217;s why it is always noteworthy when Russia arrests any cyber criminals. </p></li></ul></li><li><p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/us-orders-diplomats-fight-data-sovereignty-initiatives-2026-02-25/">US Orders diplomats to fight data sovereignty initiatives</a></p><ul><li><p>This is not a surprise and the natural escalation of activities from a country who doesn&#8217;t want your business but your subjugation, but will punish you for not wanting their business. The best solution is to stop using US products. The United States does not want Canada to have digital sovereignty.</p></li></ul></li><li><p><a href="https://cltc.berkeley.edu/2026/02/19/new-cltc-report-analyzes-cybersecurity-policy-across-state-legislatures/">New CLTC Report Analyzes Cybersecurity Policy Across State Legislatures</a></p><ul><li><p>&#8220;lawmakers across 37 states passed 99 cybersecurity-related bills in 2025, establishing 393 new cybersecurity rules cumulatively.&#8221;</p></li></ul></li><li><p><a href="https://united24media.com/latest-news/ukraine-turns-hackers-and-ai-loose-on-its-own-weapons-marketplace-to-hunt-cyber-threats-16157">Ukraine Turns Hackers and AI Loose on Its Own Weapons Marketplace to Hunt Cyber Threats</a></p><ul><li><p>AIs and LLMs are increasingly being used for bug and vulnerability hunting, so it&#8217;s not a surprise that Ukraine is one of the first to scale this.</p></li></ul></li><li><p><a href="https://edition.cnn.com/2022/03/30/politics/ukraine-hack-russian-ransomware-gang">&#8216;I can fight with a keyboard&#8217;: How one Ukrainian IT specialist exposed a notorious Russian ransomware gang</a></p><ul><li><p>Ukraine has some of the best cyber operators in the world.</p></li></ul></li><li><p><a href="https://www.by.cpartisans.org/post/kiberataka-kiberpartizan-na-himvolokno">Belarusian Cyber Partisans hacked Industrial Plant</a></p><ul><li><p>Cyber Partisans hacked a plant belonging to Khimvolokno, which produces nylon uses for Russian military body armour.</p></li></ul></li><li><p><a href="https://www.acm.nl/nl/publicaties/acm-zorgen-rondom-overname-solvinity-zien-niet-op-concurrentie">Netherlands Approves Sale of Solvinity</a> to Kyndryl</p><ul><li><p>Despite the Netherlands often being on the forefront of ensuring digital sovereignty, this means that a US company now owns most of the government&#8217;s cloud networks are now run by a US corportion. </p></li><li><p>As a Canadian I say welcome to the club!</p></li></ul></li><li><p><a href="https://www.techdirt.com/2026/02/27/palantir-sues-swiss-magazine-for-accurately-reporting-that-the-swiss-government-didnt-want-palantir/">Palantir Sues Swiss Magazine For Accurately Reporting That The Swiss Government Didn&#8217;t Want Palantir</a></p><ul><li><p>I am increasing hearing that Palatir is overrated anyways. Being overly litigious to protect your reptutation is increasing evidence maybe your product just sucks and the issue is the company just has no ethics and was the first in the game.</p></li></ul></li><li><p><a href="https://www.gov.uk/government/news/government-cuts-cyber-attack-fix-times-by-84-and-launches-new-profession-to-protect-public-services">UK Government cuts cyber-attack fix times by 84% and launches new profession to protect public services</a></p><ul><li><p>A very cool initiative that I wish the Canadian federal government would also adopt.</p></li></ul></li><li><p><a href="https://www.thelondoneconomic.com/business-economics/the-cyber-attack-that-accidentally-fixed-ms-402848/">The cyber attack that accidentally fixed M&amp;S</a></p><ul><li><p>An interesting story that suggest M&amp;S took time during their recovery from a cyber attack to rework its business that seems to have been a success.</p></li></ul></li><li><p><a href="https://openai.com/index/our-agreement-with-the-department-of-war/">OpenAI agreement with the Department of War</a></p><ul><li><p>OpenAI to allow Department of Defense to conduct domestic surveillance using Executive Order 12333, which allows the NSA to hide its domestic surveillance by tapping into infrastructure outside of the United States. This means OpenAI will be used by the NSA to conduct domestic surveillance against Americans.</p></li><li><p>Stop using OpenAI. Sam Altman is either a liar or is too stupid for his own good. This is a stepping stone to autonomous killing. This is Sam Altman and OpenAI helping the United States develop a means to avoid blame in war crimes by allowing them to blame AI.</p></li></ul></li><li><p><a href="https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes">Ukraine says cyberattacks on energy grid now used to guide missile strikes</a></p><ul><li><p>Cyberattacks on energy grid are used to collect intellligence to guide missiles strikes.</p></li></ul></li><li><p><a href="https://datamatters.sidley.com/2026/02/27/geopolitics-and-cybersecurity-japan-and-the-uk-announce-strategic-cyber-partnership-among-growing-global-focus-on-privacy-and-cyber-risks-posed-by-foreign-actors/">Japan and the UK Announce Strategic Cyber Partnership Among Growing Global Focus on Privacy and Cyber Risks Posed by Foreign Actors</a></p><ul><li><p>Canada has also signed a cyber-agreement with Japan and I believe Canada and Japan are already conducting defensive cyber ops together as well.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p><a href="https://therecord.media/uae-claims-it-stopped-terrorist-ransomware-attack">UAE claims it stopped &#8216;terrorist&#8217; ransomware attack</a></p><ul><li><p>Not sure I would say terrorist, but it&#8217;s not out of the question for a terrorist group to try ransomware as a source of funding.</p></li></ul></li><li><p><a href="https://edition.cnn.com/2026/02/25/politics/chatgpt-china-intimidation-operation">A Chinese official&#8217;s use of ChatGPT accidentally revealed a global intimidation operation</a></p><ul><li><p>Chinese information operations are slowly picking up intensity..</p></li></ul></li><li><p><a href="https://www.upguard.com/news/air-c-te-d-ivoire-data-breach-2026-02-24">Air C&#244;te d&#8217;Ivoire Data Breach</a></p><ul><li><p>Cote d&#8217;Ivoire airline hit by INC Ransomware.</p></li></ul></li><li><p><a href="https://archive.ph/VztRd#selection-1247.0-1247.58">Hacker Used Anthropic&#8217;s Claude to Steal Mexican Data Trove</a></p><ul><li><p>&#8220;They don&#8217;t believe the attack is tied to a Foreign government.&#8221; The limited details about this attack are quite interesting. Does not sound like a normal cyber threat actor, but potentially domestic actor or espionage. This is a lot of data they stole.</p></li></ul></li><li><p><a href="https://www.dpmc.govt.nz/our-programmes/national-security/cyber-security-strategy">New Zealand Releases new Cyber Security Strategy</a></p></li><li><p><a href="https://www.datacenterdynamics.com/en/news/aws-uae-outage-after-objects-struck-the-data-center-cause-fire-amid-iran-attacks/">AWS UAE suffers AZ outage after &#8220;objects strike data center&#8221; and cause fire, amid Iran attacks</a></p><ul><li><p>Physical attack affecting infrastructure, but nothing major on cyber front yet.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 21/02/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending February 21]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226</guid><pubDate>Mon, 23 Feb 2026 15:19:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ab1c0012-e33c-41f1-91fd-4da1b0a8d041_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this past week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>I have completed the first rough draft of my dissertation (yay!). I will be entering a big editing phase over the next few weeks, so my availability may fluctuate over the coming weeks.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-210226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://www.ctvnews.ca/sci-tech/article/canadian-researchers-develop-ai-tool-to-fight-online-disinformation/">Canadian researchers develop AI tool to fight online disinformation</a></p><ul><li><p>Feels like a drop in the bucket of the overwhelming amount of AI contributing to disinformation, but the people behind this are good people, so I hope it succeeds.</p></li></ul></li><li><p><a href="https://www.404media.co/leaked-email-suggests-ring-plans-to-expand-search-party-surveillance-beyond-dogs/">Leaked Email Suggests Ring Plans to Expand &#8216;Search Party&#8217; Surveillance Beyond Dogs</a></p><ul><li><p>&#8220;Search party&#8221; is an AI application that uses Ring Cameras to scan for lost pets. Emails now suggest that Ring has long term plans to not keep this to just pets. Ring cameras are growing in use in Canada, just as they are in the United States, and are essentially becoming private surveillance companies, not for households, but for themselves to eventually leverage for profit. </p></li></ul></li><li><p><a href="https://haveibeenpwned.com/Breach/CanadaGoose">HaveIBeenPwned Verifies Canada Goose Data Breach</a></p><ul><li><p>Canada Goose customer data stolen from a third party (supply chain!). Compromised data includes partial credit card, IP, physical address, names, phone numbers, email addresses. Lots of data stolen here.</p></li></ul></li><li><p><a href="https://cybernews.com/security/canada-goose-data-breach-claims/">Hackers claim Canada Goose breach but researchers reveal data is &#8220;several years old&#8221;</a></p><ul><li><p>Sounds like a third-party was attacked, but still an attack and Canada Goose is gauging the impact.</p></li></ul></li><li><p><a href="https://www.cbc.ca/news/canada/nova-scotia/some-nova-scotia-power-customers-arent-paying-because-they-dont-trust-their-bills-9.7079819">Some Nova Scotia Power customers aren&#8217;t paying because they don&#8217;t trust their bills</a></p><ul><li><p>Nova Scotia Power&#8217;s customer base has lost a lot of trust in them following the cyberattack.</p></li></ul></li><li><p><a href="https://archive.ph/62YHY#selection-2419.0-2419.71">Organized crime groups targeting police data across Canada, report says</a></p><ul><li><p>One reason it is so difficult to govern cyberspace is that the state lacks a monopoly on violence, and private actors have the same capacity to infiltrate or access databases the state does not want them to access. Many cyber threat actors readily sell their services to organized crime, so law enforcement must respond and protect their systems accordingly.</p></li></ul></li><li><p><a href="https://betakit.com/quebec-has-a-new-digital-sovereignty-plan-will-it-work/">Qu&#233;bec has a new digital sovereignty plan. Will it work?</a></p><ul><li><p><a href="https://ici.radio-canada.ca/nouvelle/2228456/projet-numerique-gouvernement-quebec">Quebec has committed $1.4 billion for digital projects</a> to be developed in the province. Long story short, everyone loves to commit to digital sovereignty until it actually means making the tough decisions to cut out those that would put Canada&#8217;s digital sovereignty at risk. Current Quebec contracts with US corporations raise doubts on their actual commitment. Part of the trouble comes down to definitions of digital soverignty, which US corporations and governments use to ignore the actual issue and to continue business as usual with clear word play and legal definitions of what qualifies as &#8220;Canadian.&#8221; Hint: Being built in Canada is no longer enough because United States law dictates that it can force corporations in the United States to hand over data regardless of where it is in the world.</p></li></ul></li><li><p><a href="https://cybernews.com/security/global-data-leak-exposes-billion-records/">IDMerit data breach: 1 billion records of personal data exposed in KYC data leak</a></p><ul><li><p>Pretty massive supply chain attack. Unsure of the degree to which this affects Canada, but the degree to which IDMerit is used likely means Canadians are caught up with this.</p></li></ul></li><li><p><a href="https://ici.radio-canada.ca/nouvelle/2229291/choc-fm-cyberattaque-radio-station">A cyberattack paralyzes the CHOC FM radio station in Portneuf</a></p><ul><li><p>No matter how big or small, you are a target for ransomware. </p></li></ul></li><li><p><a href="https://secure.viewer.zmags.com/publication/6300b26c#/6300b26c/80">Canadian Defence Review has a nice survery of some of the top Canadian AI defence companies</a></p><ul><li><p>These articles are often little more than free marketing, but take this as an introduction to the topic.</p></li></ul></li><li><p><a href="https://defensescoop.com/2026/02/19/cryptocurrency-ai-cybercriminals-dod-cyber-crime-center/">DOD leaders warn AI, cryptocurrency &#8216;lowers the bar&#8217; for cybercriminals</a></p><ul><li><p>This is talking about the United States, but this is very much true globally. The barrier to entry was already relatively low, but AI/LLMs and cryptocurrency have made the barrier to entry simply getting around the weak controls of an LLM to tell you what to do.</p></li></ul></li><li><p><a href="https://archive.ph/VNtu8#selection-2493.0-2493.101">Ottawa plans major investment in non-profit launched by AI pioneer to build safe, trustworthy systems</a></p><ul><li><p>I&#8217;m a heavy critic of Evan Solomon as AI Minister, butr this is a good move. I don&#8217;t know much about LawZero, but it has a big focus on security and trust, so I am a big proponent of this.</p></li></ul></li><li><p><a href="https://rcmp.ca/en/news/2026/02/4350451">Youth involved in terrorist activities of the 764 Network/The Com placed on Peace Bond by RCMP</a></p><ul><li><p>The Com is one of the more heinous groups operating.</p></li></ul></li><li><p><a href="https://mda.space/article/mda-space-launches-49north-a-canadian-defence-business-delivering-multi-domain-and-mission-critical-capabilities">MDA Space Launches 49North, a Canadian defence business delivering multi-domain and mission-critical capabilities</a></p><ul><li><p>MDA Space is one of Canada&#8217;s top space capabilities firm, so this move is no surprise and I anticipate that they will have a lot of success.</p></li></ul></li><li><p><a href="https://archive.ph/WD8PQ">Tumbler Ridge shooter&#8217;s ChatGPT messages were flagged months before attack</a></p><ul><li><p>&#8220;The Wall Street Journal reported Friday that employees at ChatGPT wanted law enforcement to be warned after the shooter&#8217;s posts about gun violence last June were flagged by OpenAI&#8217;s automatic review systems. Their concerns were rebuffed, the WSJ reported, quoting unnamed sources familiar with the matter.&#8221;</p></li></ul></li><li><p><a href="https://www.newswire.ca/news-releases/bell-cyber-and-radware-expand-ai-driven-cloud-delivered-security-services-to-address-evolving-cyber-threats-869526559.html">Bell Cyber and Radware expand AI-driven, cloud-delivered security services to address evolving cyber threats</a></p><ul><li><p>What&#8217;s the solution to more vulnerabilities and threats because of AI? Add more AI to the mix for the defenders.</p></li></ul></li><li><p><a href="https://www.newswire.ca/news-releases/micrologic-partners-with-cohesity-to-become-the-leading-sovereign-cloud-data-protection-solution-in-canada-880032567.html">Micrologic Partners with Cohesity to Become the Leading Sovereign Cloud Data Protection Solution in Canada</a></p><ul><li><p>Digital sovereignty is the it product to sell right now, so if you can develop and sell a capability that promotes digital sovereignty you&#8217;re in for a smooth ride.</p></li></ul></li><li><p><a href="https://www.anthropic.com/news/claude-code-security">Anthropic announces Clause Code Security</a></p><ul><li><p>Anthropic&#8217;s Claude LLM was already popular for programming and being used for code review for vulnerabilities and Claude has now developed a model specifically for this.</p></li></ul></li><li><p><a href="https://www.pcgamer.com/hardware/as-many-seek-a-discord-alternative-teamspeak-claims-an-incredible-surge-of-new-users-has-maxed-out-its-hosting-capacity-in-multiple-regions/">TeamSpeak claims an &#8216;incredible surge of new users&#8217; has maxed out its hosting capacity in multiple regions as many would-be voice chatters seek a Discord alternative</a></p><ul><li><p>Feeling like the 2000s again! Can&#8217;t blame everyone for avoiding Discord following its announcement that it would require ID scans. Discord had a data leak last year, so raises doubts about their security.</p></li></ul></li><li><p><a href="https://www150.statcan.gc.ca/n1/daily-quotidien/260218/dq260218d-eng.htm">2024 Canadian Defence, Aerospace, Marine and Cybersecurity Industries Survey Released</a></p><ul><li><p>You have to actually request them, but I think I may request them and see if I can pull any interesting information from it.</p></li></ul></li><li><p><a href="https://news.gov.bc.ca/releases/2026JEG0015-000167">BC Invests in Quantum Computing Research</a></p><ul><li><p>Functional quantum computing is still quite a way out, but the stepping stones to it will have major impacts.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/government/system/laws/developing-improving-federal-regulations/red-tape-reduction-office/horizontal-red-tape-reviews.html">Horizontal Red Tape Reviews</a></p><ul><li><p>The federal government wants to hear from you about regulations which may impede business activities.</p></li></ul></li><li><p><a href="https://www.ourcommons.ca/DocumentViewer/en/45-1/SECU/meeting-25/notice?">The House of Commons Public Safety and National Security committee will be doing a clause-by-clause consideration of Bill C-8</a></p><ul><li><p>I largely haven&#8217;t covered Bill C-8 because of burnout from its predecessor, but this is one to keep an eye on. While it&#8217;s a good step forward, it does have its issues.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/department-national-defence/news/2026/02/government-of-canada-launches-call-for-proposals-to-establish-defence-innovations-secure-hubs-for-quantum-and-uncrewed-system-technologies.html">Government of Canada launches CFP to establish Defence Innovations Secure Hubs for quantum and uncrewed system technologies</a></p><ul><li><p>The Bureau of Research, Engineering, and Advanced Leadership in Innovation and Science (BOREALIS) is launching a CFP to establish secure hubs for quantum. A great difficulty in quantum is being able to interact with defence officials and the military, so this should be a big help in contributing to cross-sector discussion, innovation, and advancement.</p></li></ul></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://www.cyber.gc.ca/en/alerts-advisories/al26-003-vulnerability-affecting-beyondtrust-cve-2026-1731">Alert - AL26-003 - Vulnerability affecting BeyondTrust - CVE-2026-1731</a></p></li><li><p><a href="https://www.dexpose.io/play-ransomware-targets-canadian-organization-makivik/">Play Ransomware Targets Canadian Organization Makivik</a></p><ul><li><p>Play ransomware claims to have targeted <a href="https://www.makivvik.ca/">Makivvik</a>, a Quebec Inuit organization.</p></li></ul></li><li><p><a href="https://hackread.com/china-hackers-dell-recoverpoint-flaw-grimbolt-malware/">China-Linked Hackers Use Dell RecoverPoint Flaw to Drop GrimBolt Malware</a></p><ul><li><p>The federal government uses a lot of Dell equipment. I do not think RecoverPoint is used, or at least not common, but I would not be surprised if there is some limited exposure to this.</p></li></ul></li><li><p><a href="https://securelist.com/keenadu-android-backdoor/118913/">Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets</a></p><ul><li><p>A really interesting botnet to watch out for on Android devices: &#8220;[deploys] components that click on ads inside a hidden container, hijack browser search settings, or deploy unwanted apps in pay-per-install schemes.&#8221;</p></li></ul></li><li><p><a href="https://www.cyderes.com/howler-cell/0apt-bluff-campaign-evolves-into-potential-threat">0APT Bluff Campaign Evolves Into Potential Threat</a></p><ul><li><p>Despite a lot of 0APT fake intrusions, they are in fact deploying an encryptor.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/ai-platforms-can-be-abused-for-stealthy-malware-communication/">AI platforms can be abused for stealthy malware communication</a></p><ul><li><p>Not surprised at all. If you can get something to point anywhere, it will be used for C2.</p></li></ul></li><li><p><a href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AI-augmented threat actor accesses FortiGate devices at scale</a></p><ul><li><p>A closer look at how a threat actor used commercial AI to compromise 600 FortiGate devices in more than 55 countries.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/">CISA: BeyondTrust RCE flaw now exploited in ransomware attacks</a></p></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d0b7cb2a-e67f-44d6-b278-2bef0f8c3460&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cyber Dimensions to the Defence Industrial Strategy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-18T17:25:56.808Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a0b6015-0fff-4ff1-a9f6-5e8f304977fc_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188287976,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Read my cyber review of the Defence Industrial Strategy. TL;DR: It will help a lot of Canada&#8217;s cyber industry, but there are gaps to overcome major hurdles regarding infrastructure and hyperscalers.</p><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.nextgov.com/cybersecurity/2026/02/cisa-threat-hunting-leader-depart-private-sector-role/411457/">CISA threat-hunting leader to depart for private sector role</a></p><ul><li><p>CISA used to be one of the most respected cyber security organizations in the world. Now it&#8217;s a hollow shell.</p></li></ul></li><li><p><a href="https://www.federalregister.gov/documents/2026/02/13/2026-02948/cyber-incident-reporting-for-critical-infrastructure-act-circia-rulemaking-town-hall-meetings">CISA and DHS Conducting Town Hall Meetings Regarding Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Rulemaking</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/">Data breach at fintech firm Figure affects nearly 1 million accounts</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/">Mississippi Medical Center closes all clinics after ransomware attack</a></p><ul><li><p>Hospitals often fight cybersecurity regulations, yet are some of the favourite targets for threat actors. They have closed all clinics and rescheduled many appointments, including surgeries.</p></li></ul></li><li><p><a href="https://www.nextgov.com/cybersecurity/2026/02/us-cyber-responses-will-be-linked-adversary-actions-and-involve-industry-coordination-official-says/411525/">US cyber responses will be &#8216;linked to adversary actions&#8217; and involve industry coordination, official says</a></p><ul><li><p><a href="https://therecord.media/usa-cyber-actors-consequences">US needs to impose &#8216;real costs&#8217; on bad actors, State Department cyber official says</a></p></li><li><p>A lot of statements from US government about imposing costs on cyber threat actors and including industry in this response. Remains to be seen how or what this response will be or if it&#8217;s a lot of hot air.</p></li></ul></li><li><p><a href="https://www.ic3.gov/CSA/2026/260219.pdf">Increase in Malware Enabled ATM Jackpotting Incidents Across United States</a></p><ul><li><p>FBI Flash report on the increase in ATM jackpotting malware.</p></li></ul></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://thehackernews.com/2026/02/safe-and-inclusive-esociety-how.html">Safe and Inclusive E&#8209;Society: How Lithuania Is Bracing for AI&#8209;Driven Cyber Fraud</a></p><ul><li><p>The Baltic states tend to be on the forefront of addressing deception-based attacks in part due to being undering constant attack from Russian through information confrontation.</p></li></ul></li><li><p><a href="https://cyberhub.am/en/blog/2026/02/16/massive-wave-of-whatsapp-takeover-attacks-targeting-armenian-users-what-happened/">Massive Wave of WhatsApp Takeover Attacks Targeting Armenian Users &#8212; What Happened</a></p></li><li><p><a href="https://www.haaretz.com/israel-news/security-aviation/2026-02-16/ty-article-magazine/.premium/your-car-is-spying-on-you-and-israeli-firms-are-leading-the-surveillance-race/0000019c-6651-d2f0-a19c-7fdd81920000">Your Car Is Spying on You &#8211; and Israeli Firms Are Leading the Surveillance Race</a></p></li><li><p><a href="https://cyberinsider.com/dutch-telco-odido-suffers-data-breach-exposing-data-of-6-2-million-customers/">Dutch telco Odido suffers data breach exposing data of 6.2 million customers</a></p><ul><li><p>Pretty significant breach.</p></li></ul></li><li><p><a href="https://meduza.io/news/2026/02/17/gosduma-prinyala-zakon-pozvolyayuschiy-blokirovat-svyaz-po-trebovaniyu-fsb-dazhe-esli-net-ugrozy-bezopasnosti">The State Duma passed a law allowing communications to be blocked at the request of the FSB, even if there is no security threat</a></p><ul><li><p>Bureaucratic efficiency in Russia is passing laws that mean that your security services no longer have to lie to do what they were already doing.</p></li></ul></li><li><p><a href="https://www.politico.eu/article/eu-parliament-blocks-ai-features-over-cyber-privacy-fears/">EU Parliament blocks AI tools over cyber, privacy fears</a></p><ul><li><p>Blocked in large part because that such tools sent data to servers outside the control of the EU. This is what taking digital sovereignty seriously looks like.</p></li></ul></li><li><p><a href="https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-opens-investigation-x-xiuc">Ireland&#8217;s Data Protection Commission opens investigation into X (XIUC)</a></p><ul><li><p>Ireland joining many other ethical countries by iniating an investigation into Twitter/X due to the profiting of of Grok&#8217;s use of deepfakes for nonconsensual sexual material and child sexual abuse material.</p></li></ul></li><li><p><a href="https://www.theregister.com/2026/02/18/adidas_investigates_thirdparty_data_breach/">Adidas investigates third-party data breach after criminals claim they pwned the sportswear giant</a></p><ul><li><p>Allegedly includes technical data.</p></li></ul></li><li><p><a href="https://decode39.com/13552/hack-exposes-data-of-5000-italian-counterterrorism-officers/">A Chinese hack exposes data of 5,000 Italian counterterrorism officers</a></p><ul><li><p>A pretty major attack and intelligence win for China.</p></li></ul></li><li><p><a href="https://www.dw.com/en/deutsche-bahn-says-cyberattack-hit-ticket-and-info-systems/a-76024130">Deutsche Bahn says cyberattack hit ticket and info systems</a></p><ul><li><p>German rail operator is being hit with a significant DDoS attack that is described as coming in waves.</p></li></ul></li><li><p><a href="https://digital-strategy.ec.europa.eu/en/news/eu-cyber-census-2025">EU Cyber Census 2025</a></p><ul><li><p>EU Cyber Census tracks the implementation of the <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:52022JC0049">EU Policy on Cyber Defence</a>. Full report is classified, but executive summary indicates EU members are all slowly developing their own cyber commands and cyber forces.</p></li></ul></li><li><p><a href="https://therecord.media/attackers-breach-france-national-bank-account-database">Attackers breach France&#8217;s national bank account database</a></p><ul><li><p>This is a pretty major attack, the first of its kind on a target of this type, as far as I know, in terms of accessing the country&#8217;s National Bank Accounts File (FICOBA), recording all bank accounts in the country. Depending on how much information the attacker accessed, this could be leveraged for all sorts of fraud and phishing.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p><a href="https://therecord.media/hackers-target-iran-protest-supporters-cyber-campaign">Hackers target supporters of Iran protests in new espionage campaign</a></p></li><li><p><a href="https://www.abc.net.au/news/2026-02-17/transcripts-federal-court-viq-solutions-e24-technologies-india/106349338">Highly sensitive Australian court data accessed by foreign entity based in India</a></p><ul><li><p>An Indian subcontractor that was hired by an Australian firm in breach of a contract accessed Australian court data.</p></li></ul></li><li><p><a href="https://archive.ph/tb5qF#selection-693.0-693.53">A Wave of Unexplained Bot Traffic Is Sweeping the Web</a></p><ul><li><p>Traffic is linked to Lanzhou, China</p></li></ul></li><li><p><a href="https://archive.ph/BkzSX#selection-1199.0-1199.66">How Private Equity Debt Left a Leading VPN Open to Chinese Hackers</a></p><ul><li><p>Chinese hackers breached Ivanti&#8217;s internal networks back in 2021.</p></li></ul></li><li><p><a href="https://therecord.media/leading-japanese-semiconductor-supplier-ransomware">Advantest Responds to Cybersecurity Incident</a></p><ul><li><p>Advantest makes semiconductor test equipment and is responding to ransomware attack.</p></li></ul></li><li><p><a href="https://www.nationalcrimeagency.gov.uk/news/fraudsters-arrested-in-nigeria-following-nca-intelligence-sharing">Fraudsters arrested in Nigeria following NCA intelligence sharing</a></p><ul><li><p>Cambodia isn&#8217;t the only one with scam compounds. Nigeria is historically known for fraud (who remembers the Nigerian prince scams?), so it&#8217;s not a surprise the &#8220;compound&#8221; organizational concept is being globalized.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cyber Dimensions to the Defence Industrial Strategy]]></title><description><![CDATA[I breakdown where cyber and cyber security play a role in Canada's Defence Industrial Strategy]]></description><link>https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial</guid><dc:creator><![CDATA[Alexander Rudolph]]></dc:creator><pubDate>Wed, 18 Feb 2026 17:25:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3a0b6015-0fff-4ff1-a9f6-5e8f304977fc_875x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><strong>Canadian Cyber in Context is sponsored by</strong></h4><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.123cyber.ca/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png" width="442" height="170.30357142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:561,&quot;width&quot;:1456,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:26108,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.123cyber.ca/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UW2t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 424w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 848w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1272w, https://substackcdn.com/image/fetch/$s_!UW2t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12c6c345-0ca8-489e-bbfd-f783dbd5c2ba_1888x727.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">123 Cyber Inc.</figcaption></figure></div><h6><strong>All views expressed belong to Canadian Cyber in Context and do not reflect the position of any sponsor.</strong></h6><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><p></p><div><hr></div><p>On February 17th, the Government of Canada finally released its long-awaited <a href="https://www.canada.ca/en/department-national-defence/corporate/reports-publications/industrial-strategy.html">Security, Sovereignty and Prosperity: Canada&#8217;s Defence Industrial Strategy</a>. As authoritarian states rise and seek to dismantle the rules-based international order established since the end of World War 2, Canada cannot rely on its allies and must increase its own defence investments to counter decades of inattention. The Defence Industrial Strategy is meant to accomplish this and I will breakdown and highlight where cyber and broader ICT plays a role in the strategy.</p><p>The vision of the Defence Industrial Strategy is to build "A robust Canadian defence industry that provides technological and operational advantage to the Canadian Armed Forces and its security partners in their mission to defend Canada, and maximizes growth, job creation and economic benefits for all Canadians."</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>The Strategy has five pillars:</p><ol><li><p>Renewing the government&#8217;s relationship with industry</p></li><li><p>Procuring strategically through the new Defence Investment Agency and a new Build-Partner-Buy framework</p></li><li><p>Investing purposefully to strengthen an innovative Canadian defence sector</p></li><li><p>Securing supply chains for key inputs and goods</p></li><li><p>Working with domestic partners, including in Canada&#8217;s North and Arctic</p></li></ol><p>The Strategy identifies seven key areas where Canada already has strengths: space, <strong>artificial intelligence</strong>, <strong>cyber</strong>, <strong>quantum technologies</strong>, medical countermeasures, robotics, and drones. These are key areas that area repeated throughout the strategy and where we will see some of the largest and most focused investments.</p><p>Many of the key 10-year goals of the strategy will impact including build world-leading Canadian firms in key sovereign capability areas; increase the share of defence acquisitions awarded to Canadian firms to 70%; accelerate procurement of successful Canadian R&amp;D innovations; boost government investment in defence-related reseach and development by 85%; increase total Canadian defence industry revenues by more than 240%; grow defence revenues for Canadian SMEs by more than $5.1 billion annually; increase Canada&#8217;s defence exports by 50%; create 125,000 new jobs.</p><p>All of these goals tie directly into Canada&#8217;s cybersecurity industry, which is as dual-use of a technology as you can get.</p><div><hr></div><h3>Cyber as a Key Sovereign Capability</h3><p>The federal government&#8217;s increased focus on defence matters has also coincided with a greater emphasis on cyber as a key capability, yet it is often overlooked because many capabilities are not considered intrinsically required for national security. In the Defence Industrial Strategy, the government actually lays out the Canada&#8217;s key sovereign capabilities. While there is no specific &#8220;cyber&#8221; capability, the closest is Digital Systems, with some overlap with other key capabilities areas.</p><p>Key Area 3: Digital Systems</p><ul><li><p>Secure Cloud; Artificial Intelligence; Quantum Computing and Communications; Integrated Command, Control and Communications; High-Assurance Communications Equipment</p></li></ul><p>You can also say cyber touches on:</p><p>Key Area 1: Aerospace:</p><ul><li><p>Aerospace Platforms; Avionics; and Aircraft Communications.</p></li></ul><p>Key Area 6: Sensors</p><ul><li><p>Marine Sensors; Quantum Sensors; Electronic Warfare.</p></li></ul><p>Key Area 7: Space</p><ul><li><p>Space-based intelligence; Surveillance and Reconnaissance; Space Domain Awareness; Satellite Communications; Space Launch.</p></li></ul><p>Cyber and digital capabilities touch nearly everything. Although the areas above are most directly connected to cyber, it can be argued that everything relies on cyber in some capacity; the question is how large or small that role is. The future of warfare is data and connectivity, which means cyber is at the heart of everything.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bIr6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bIr6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 424w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 848w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 1272w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bIr6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png" width="694" height="436" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:436,&quot;width&quot;:694,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:102578,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bIr6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 424w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 848w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 1272w, https://substackcdn.com/image/fetch/$s_!bIr6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92ebb246-8c0d-4b8e-bc0e-493be0dceb5a_694x436.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Canadian Cyber Security Industry Quick Facts</h3><ul><li><p>Canada is the 4th largest hub for cybersecurity in the world</p></li><li><p>The broader cyber security industry and value chain contribute more than $3.2 billion to Canada&#8217;s annual GDP, representing more than 30,000 jobs.</p></li><li><p>In 2020, Canadian cyber security services produced over $1.15 billion in exports, with nearly 80% going to Five Eyes partners.</p></li><li><p>94% of Canada&#8217;s cyber firms are SMEs and 99.7% of Canadian AI firms are SMEs</p></li><li><p>The research and development intensity in the cyber security industry was close to 2.5 times the Canadian ICT average in 2020.</p></li><li><p>Growth in cyber security revenues is nearly double that of the broader ICT sector</p></li></ul><p>In other words, Canada&#8217;s cyber security is a major economic force in the country and was already growing quickly without the additional support and investments via the defence industrial strategy. Many of these figures are old, but the stats remain the same or are even higher in 2025/26. </p><p>The strategy estimates that more than <strong>half a trillion</strong> <strong>dollars</strong> of downstream economic activity and overall investment will occur. This is a massive opportunity for Canada&#8217;s cyber industry that must take advantage, but it will take some adjusting to understand the nuances of the defence sector compared to the general market. </p><div><hr></div><h3>Pillar 1: Renewing Relationship with Industry</h3><p>While no one will dispute that there is an inefficient and unproductive relationship between the federal government and defence industry, the cyber security industry wishes it had the relationship with the government that the defence industry does.</p><p>In Canada&#8217;s National Cyber Security Strategy, forging whole-of-society partnerships was the first objective that centred on a Canadian Cyber Defence Collective. <a href="https://www.cyberincontext.ca/p/whats-happening-with-the-canadian">However, the government&#8217;s efforts to do this are not off to a great start</a>. The cyber industry should not expect any cyber-specific gains or advantages from Pillar 1 efforts, but there is still room for cyber to benefit from this, as with all other sectors. </p><p>This pillar focuses on how the government will improve its engagement with industry, including through procurement and partnerships. This includes the already launched <a href="https://www.canada.ca/en/defence-investment-agency.html">Defence Investment Agency</a>, as well as two other key actions of interest to the cyber industry in security clearance and ISED support.</p><p>The government will invest to speed up the security clearance process. This is something that everyone, including cyber folk, is hit with. Many people must go through the process to work in a field that many complain is overly classified, which can bottleneck operations due to security clearance requirements. This is good news for everyone.</p><p>The Government will also be investing in &#8220;dedicated ISED &#8216;concierge&#8217; service for companies working on defence and dual-use technologies.&#8221; This includes cyber and is likely to be of a massive benefit once implemented. Given the niche, small areas cyber firms can cover, this concierge service and the many opportunities listed are likely to be a significant advantage for the cyber industry and the broader defence industry in integrating Canadian cyber.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xpYQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xpYQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 424w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 848w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 1272w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png" width="324" height="306" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:306,&quot;width&quot;:324,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50923,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xpYQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 424w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 848w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 1272w, https://substackcdn.com/image/fetch/$s_!xpYQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a72a5fa-0ee3-470a-9d69-080ef793a001_324x306.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Pillar 2: Procuring Strategically/Build-Partner-Buy Framework</h3><p>This pillar centers on Canada&#8217;s need to develop strategic capabilities domestically, supported by the Build-Partner-Buy framework to guide this process. A significant focus here is on developing and securing Canadian intellectual property (IP) to ensure Canada maintains strategic capability and that the economic benefits of that IP remain in Canada.</p><p>The Build-Partner-Buy framework will be an approach led by the Defence Investment Agency to integrate the separate defence, industry, and procurement authorities and inputs to enable faster, coordinated decisions on capability acquisition. The framework seeks to prioritize purchasing from Canadian suppliers, investing in Canadian capabilities, including frontier areas such as AI and cyber, and partnering to build and maintain sovereign control. The <a href="https://www.canada.ca/en/defence-investment-agency/programs/projects-partnerships.html">Defence Investment Agency has already taken on multiple projects</a>, including the Enhanced Satellite Communications Project &#8211; Polar, Airborne Early Warning and Control, Operational Training Infrastructure Enterprise Modernization, and others that are cyber or overlap with cyber. </p><p>Part of this pillar that has already been making headlines is that the Government will enter into partnerships with &#8220;champions&#8221; to help &#8220;[secure] domestic ownership and control over critical intellectual property and capacities - while also supporting Canada&#8217;s larger geopolitical objectives&#8230;&#8221; The government has already been doing this to a degree If you have been following the <a href="https://www.canada.ca/en/innovation-science-economic-development/news/2025/08/canada-partners-with-cohere-to-accelerate-world-leading-artificial-intelligence.html">government&#8217;s approach to AI at all and their support of Cohere</a>. This is a good approach and something that could be good with championing certain cyber firms, but it comes down to their process.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Tdmj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Tdmj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 424w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 848w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 1272w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png" width="554" height="390" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:390,&quot;width&quot;:554,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:148550,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Tdmj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 424w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 848w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 1272w, https://substackcdn.com/image/fetch/$s_!Tdmj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe62324fb-64d4-4146-a57c-39d02c32ebf9_554x390.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It is important to note that this approach is intended to protect IP and the economic benefits thereof <strong>AND</strong> to safeguard strategic capabilities and knowledge for Canada&#8217;s security. The framework&#8217;s emphasis on domestic reinvestment and sovereign control has a major impact on cyber capabilities. As the top cloud and AI hyperscalers are all American, there are no Canadian firms occupying the same space and competing at the same level as AWS, Microsoft, or Google. This means that there will need to be a middle ground between investment and purchasing of Canada products balanced with non-Canadian products and services that the Government of Canada will need to find ways to invest in while avoiding risks to Canada&#8217;s digital sovereignty. However, the Government of Canada has yet to demonstrate a full understanding of how to maintain digital sovereignty, <a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">as current policies still risk it by using cloud and AI data centres owned by American corporations</a>. Despite these troubles, the partner dimension of the framework opens major opportunities with European enterprises, many of which are in a similar position as Canada, to leverage mutual efforts to build American-free cloud and AI infrastructure.</p><p>It appears the government will use the Industrial and Technical Benefits (ITB) Policy as a key lever to achieve many of these objectives. I have long advised any company or individual in the Canadian cyber space dealing with defence that ITBs are your key.  ITBs are massive math equations for businesses that quantify how a government contract with said business will benefit the Canadian economy. The government&#8217;s intent to reform this system could benefit Canada's cyber sector by enhancing the benefits of hiring Canadian cyber firms. I have long said the ITB is the lever to actually build a coherent and strong Canadian defence ecosystem, not just defence industry. This is likely to be of incredible importance and benefit as the <a href="https://www.canada.ca/en/public-services-procurement/services/industrial-security/security-requirements-contracting/cyber-security-certification-defence-suppliers-canada.html">Canadian Program for Cyber Security Certification</a> slowly enters into force over the next few years and increases cyber security compliance demands for Canada&#8217;s defence industrial base. </p><p>The proposed changes include: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CLxI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CLxI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 424w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 848w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 1272w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CLxI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png" width="551" height="654" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2692540-294f-4c38-bd91-aa6689e1f804_551x654.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:654,&quot;width&quot;:551,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:196323,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CLxI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 424w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 848w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 1272w, https://substackcdn.com/image/fetch/$s_!CLxI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2692540-294f-4c38-bd91-aa6689e1f804_551x654.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4ygY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4ygY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 424w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 848w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 1272w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4ygY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png" width="577" height="378" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:378,&quot;width&quot;:577,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:71509,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4ygY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 424w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 848w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 1272w, https://substackcdn.com/image/fetch/$s_!4ygY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38e87207-e936-40d7-aa44-89e798ae5ff8_577x378.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Pillar 3: Investing to Strengthen Canadian Defence Innovation</h3><p>This pillar focuses on broad mechanisms that support defence innovation, including government initiatives and broader economic conditions that encourage investment. Many of the listed mechanisms are applicable to cyber, but it depends on finding the right program and CFP. It can be difficult for cyber capabilities to fit into many of these programs due to the niche nature of their work or product, so I at least hope they are developing these new programs with this in mind and recognizing that cyber is a frontier and key sovereign capability that needs to be recognized and included.</p><p>Where cyber is likely to see the biggest benefit is the additional capital for investment and support for defence exports. There is significant competition right now, but if you have a key sovereign capability, you should engage with all of these instruments. As noted above, Canada already is a major player in cyber security and support from the government can help to maintain and grow Canada&#8217;s cyber industry. The strategy also touches on growing the defence workforce, which should include cyber security professionals, but unfortunately, this is unlikely to be the case.</p><div><hr></div><h3>Pillar 4: Securing Supply Chains</h3><p>This section discusses securing supply chains in a way that differs from how we do in cyber. A very loose definition of the supply chain in cyber refers to the components and applications that make up an individual piece of software or business suite. A compromise of a single supplier in a cyber supply chain can compromise the entire product or service. This is increasingly a common vector for cyber attacks. However, this section focuses on securing capacity or access to physical supply chains such as critical minerals or steel. As a result, these initiatives are unlikely to have a major impact on cyber.</p><p>One area which could impact cyber is the government&#8217;s commitment to looking at &#8220;legislative and policy tools to safeguard its most sensitive technologies, research, and know-how from malign actors.&#8221; Two potential dimensions to this instantly come to mind. First, as cyber operations are a common mode for intellectual property theft, the government may be seeking ways to punish cyber threat actors. Second, the government could be looking at levers to punish actors which try to export intellectual property illicitly. The section is quite unclear about this, but both raise interesting questions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2apF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2apF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 424w, https://substackcdn.com/image/fetch/$s_!2apF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 848w, https://substackcdn.com/image/fetch/$s_!2apF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 1272w, https://substackcdn.com/image/fetch/$s_!2apF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2apF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png" width="340" height="336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:336,&quot;width&quot;:340,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:56116,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.cyberincontext.ca/i/188287976?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2apF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 424w, https://substackcdn.com/image/fetch/$s_!2apF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 848w, https://substackcdn.com/image/fetch/$s_!2apF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 1272w, https://substackcdn.com/image/fetch/$s_!2apF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F427734b8-4dcd-4fa4-8473-8f5d5f6ae0d8_340x336.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div><hr></div><h3>Pillar 5: Working with Domestic Partners, including in Canada&#8217;s North and Arctic</h3><p>Of the categories, Pillar 5 is likely the least directly connected to cyber issues, but that does not make it any less important. Pillar 5 includes collaborating with provinces and territories, indigenous groups, and Northern and Arctic partners. Much of this section discusses partnering with local communities to ensure the critical infrastructure and capacity needed to secure Canadian sovereignty. </p><p>The most direct connections to cyber here are that in the North and Arctic there is very little digital infrastructure. The government is currently investing in satellites to improve connectivity in the North and Arctic, but relying solely on satellites is risky; you will also need on-the-ground infrastructure. Satellites are prime real estate for cyber threat actors, especially during an invasion or active conflict. Nevertheless, to accomplish anything the government wants, cyber or otherwise, you need people, which is much easier said than done. Cyber security and cyber overall are often known for their labour shortages, while it is debatable about how much of a shortage there actually is, this is something that should be really addressed in the workforce of the future and in the North and Arctic. </p><p>There is a significant opportunity among people in the North and Arctic, and cyber is a powerful vehicle and sector to support this enable further growth.</p><p></p><div><hr></div><h3>Takeaways - So What?</h3><p>There is much to commend in the Defence Industrial Strategy overall, and it is well received in part because it is well constructed. Over the past few years, Canada has been bad at developing strategies. As Phil Lagasse says, Canada doesn&#8217;t do strategy. So, it is good to see them actually hit it out of the park on this one.</p><p>That said, from a cyber and digital perspective, this strategy is likely to benefit Canada&#8217;s cyber industries overall but is unlikely to affect capabilities that require a hyperscaler-level corporation. Ultimately, many of these efforts will help support and grow Canada&#8217;s defence and cyber industries, but current investment plans do not provide the means to counter the major risks to Canada&#8217;s digital sovereignty posed by hyperscalers. The reason I included stats about Canada&#8217;s cyber industry at the start is to highlight just how many are SMEs, which struggle to engage with DND/CAF. They often rely on attaching themselves to a large, prime contractor to contribute to a larger contract or do task-based contracts. Defence traditionally has a very difficult time engaging with start ups and small businesses, which is where most of the advanced, emerging cyber innovation is done. There is a lot of room for improvement in how DND/CAF engaged with Canada&#8217;s cyber industry and ecosystem, which this strategy is certain to help, we must be realistic about its limitations in affecting the broader economic realities of cyber and broader ICT industry.</p><p>Cyber and ICT are among the most dual-use technologies you can get. Individuals, businesses, and government agencies largely use the same software, run on the same operating systems, use the same protocols, and employ similar network technologies (for the most part). The difference between civilian and security or defence software or ICT, in most cases, is often about scale, uptime, use case, and additional security and protection. You can find many Canadian SMEs that develop niche software or hardware applications, but in certain major hyperscaler capabilities, you are unable to find a major Canadian corporation that can readily fill this spot anytime soon. </p><p>Secure Cloud/Secret Cloud is a perfect example of this and why I have been talking about it non-stop for 5 years. Secret Cloud refers to the military capability of a cloud networking environment that supports the use of secret-level data, including operational data. There is no single &#8220;Secure Cloud&#8221; or &#8220;Secret Cloud&#8221; project for DND/CAF; however,&nbsp;<a href="https://apps.forces.gc.ca/en/defence-capabilities-blueprint/project-details.asp?id=1546">Information Technology Infrastructure in Support of Command and Control</a>&nbsp;(ITI in SP of C2) is the primary one discussed when we talk about military secret cloud. The $250 to $499 million funding range is very small. To get a secret cloud in the way DND/CAF wants/needs will likely be more expensive than this. This is part of why the project has been taking so long: the cost expectations and the lack of a sole-source Canadian option. </p><p>ITI in SP of C2 is software- and hardware-intensive, with a large infrastructure footprint that likely requires a hyperscaler to support. That means either Amazon Web Services, Microsoft, Google Cloud, or potentially Oracle (All American). <a href="https://www.cyberincontext.ca/p/microsoft-admits-us-law-supersedes">As I have discussed, there are significant sovereignty concerns with using any American cloud option</a>. The only potential Canadian option that I am aware of is ThinkOn, but the scale and depth of security and control required may be beyond what ThinkOn can provide at this time, given its relatively new position in the government cloud space compared to its American competitors. However, investment in ThinkOn or another sovereign Canadian option could position it as one of the &#8220;Canadian champions&#8221; competing with American hyperscalers for security- and defence-related cloud capabilities, but this will take time, which is not on our side.</p><p>The problem with these options is that, strategically, DND/CAF needed a secret cloud a couple of years ago. The ITI in SP of C2 has been stuck in the definition phase for many years. The implementation is (currently) scheduled to begin in 2025/2026, with initial delivery in 2028/29 and final delivery in 2030/31. Although the project is delayed and has encountered difficulties, the timeline can still be met, but it would require an American hyperscaler. Digital transformation and broader military modernization increasingly require cloud networking to enable seamless data transfer and support capabilities, including NORAD's cloud-based command and control and the many electronic and information capability suites of the F-35. As these capabilities are currently being acquired, there cannot be any further delay in DND/CAF acquiring its own secret cloud.</p><p>To compete with hyperscalers, the Government of Canada needs to think about sovereign Canadian cloud in terms of major government projects and understand the limits of the current economies of scale which make cloud, AI and other infrastructure-dependent capabilities difficult to overcome with the present Canadian business landscape. Canada&#8217;s cyber industry is world-leading and its SMEs are some of the best in the industry, but they usually cannot compete with hyperscaler capabilities in data centre and data infrastructure. If we fail to recognize the overreliance on last-mile technologies, we overlook that it is the first-mile technologies and infrastructure, like data centres, that the first-mile relies upon and determine if Canada maintains digital sovereignty.</p><div><hr></div><h6><strong>Feature your business in Canadian Cyber in Context through <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/cyber-dimensions-to-the-defence-industrial?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Canadian Cyber News Rewire - 14/02/26]]></title><description><![CDATA[Wiring you into the cyber news relevant to Canada the week ending February 14]]></description><link>https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226</link><guid isPermaLink="false">https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226</guid><pubDate>Tue, 17 Feb 2026 12:03:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xNeN!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Weekly New Rewire is a survey of cyber or adjacent news stories that I read this week (or recently). Please leave a comment if you think I missed anything. </p><p>Editor Notes: </p><ul><li><p>Rewire is out on Tuesday due to the holiday, regular will be released on Monday next week.</p></li><li><p>I have begun receiving large batches of completed ATIPS that I requested, which are available to subscribers <a href="https://www.cyberincontext.ca/p/atip-archive-dndcaf-digital-and-cyber">here</a>.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Canadian News</h3><ul><li><p><a href="https://www.cbc.ca/news/canada/saskatchewan/crypto-mining-hacking-cyber-crime-us-extradition-james-roach-9.7074161">U.S. seeks to extradite Saskatoon man accused of hacking educational systems to mine crypto</a></p><ul><li><p>Hacking a supercomputer just to mine crypto. That&#8217;s just sad.</p></li></ul></li><li><p><a href="https://globalnews.ca/news/11659160/nova-scotia-power-inquiry-cyberattack/">Regulator plans two-part inquiry into last year&#8217;s cyberattack at N.S. utility</a></p><ul><li><p>I think that Nova Scotia has handled this incident tremendously by studying it in depth and being quite open about the process.</p></li></ul></li><li><p><a href="https://medium.com/@pjhillier/architect-of-canadas-early-military-cyber-capability-f95b12ed8b2a">Architect of Canada&#8217;s Early Military Cyber Capability</a></p><ul><li><p>A great article from my friend Pete Hillier, who is a pillar of Canada&#8217;s cyber defence community. Pete goes into some of the beginning of the Canadian Armed Forces&#8217; cyber capabilities, particularly focusing on the important work of Lieutenant-Commander (Ret&#8217;d) Robert Garigue.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/security/volvo-group-north-america-customer-data-exposed-in-conduent-hack/">Volvo Group North America customer data exposed in Conduent hack</a></p><ul><li><p>Supply chain attack: The compromise of Conduent led to the data breach of Volvo Group North America, which includes Canadian operations.</p></li></ul></li><li><p><a href="https://betakit.com/canadas-new-ai-strategy-is-off-to-a-bad-start/">Canada&#8217;s new AI strategy is off to a bad start</a></p><ul><li><p>The AI Minister wants to build trust in AI, but keeps using AI terribly. This is why you need more social scientists in government to develop better methodology for you.</p></li></ul></li><li><p><a href="https://www.dal.ca/news/2026/02/10/dal-solutions-data-mapping-national-security.html">Mapping the data that quietly threatens Canada&#8217;s national security</a></p><ul><li><p>An article on the partnership between Calian and Dalhousie University. A bit of a puff piece and not too much details, but an interesting look into the partnership nonetheless.</p></li><li><p><a href="https://www.calian.com/news-media/calian-invests-in-groundbreaking-data-exhaust-research-through-partnership-with-dalhousie-university-cyber-labs/">Write up from Calian about the partnership from 2022</a></p></li></ul></li><li><p><a href="https://www.securityweek.com/hacktivists-state-actors-cybercriminals-target-global-defense-industry-google-warns/">Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns</a></p><ul><li><p>While already a common target, the major boom in the defence industry means that defense companies are increasingly a prime target. With how much everyone is focused on profits, actual security often gets overlooked.</p></li></ul></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a></p><ul><li><p>Google Threat Intelligence Group is basically saying that many APTs are making heavy use of AI in some capacity.</p></li></ul></li><li><p><a href="https://www.vimyforge.ca/cohorts">Vimy Forge announces its first cohort</a></p><ul><li><p><a href="https://www.vimyforge.ca/about">Vimy Forge is a national defence accelerator</a> based in Fredericton, NB that aims to support Canadian innovation in defence. The first cohort includes a few cyber-related firms including <a href="https://www.123cyber.ca/">123 Cyber</a> (our sponsor, woohoo!), <a href="https://prodigyintel.com/">Prodigy Intelligence</a>, <a href="https://seafarerai.ca/">SeafarerAI</a>, and <a href="https://tehama.io/">Tehama</a>.</p></li><li><p><a href="https://canadiandefencereview.com/atlantic-canada-invests-997000-in-vimy-forge-accelerator-program-for-canadian-defence-smes/">Atlantic Canada invested almost $1million in Vimy Forge</a></p></li></ul></li><li><p><a href="https://www.ctvnews.ca/ottawa/article/ottawa-gatineau-launch-task-force-to-create-defence-innovation-hub-bid-for-proposed-bank/">Ottawa-Gatineau launch task force to create defence innovation hub, bid for proposed bank</a></p><ul><li><p>What is often lost in the discussion of defence is that cyber security is always part of the discussion. Cyber security is one of the most universal dual-use technologies that we can talk about. This is why I am glad that Invest Ottawa specifically mentions cyber security as one of the key areas for investment and and growth.</p></li></ul></li><li><p><a href="https://distribution-a617274656661637473.pbo-dpb.ca/839ef4e9ba07cd16145c52538876e2180bb0e74c53418835590dcf3172d90603">Fiscal Implications of Meeting NATO&#8217;s 5% Commitment</a></p><ul><li><p>NATO&#8217;s 5% defence commitments break down to 3.5% on core defence spending and 1.5% on &#8220;ancillary defence and security-related spending.&#8221; The Office of the Parliamentary Budget Officer released a report on the fiscal implications of these defence commitments, but I&#8217;m most interested in that 1.5% because it specifically impacts networks and information infrastructure. Approximately $60 billion must be spent to reach the 1.5% commitments. A great way to spend this money would be on secret cloud and actually developing a sovereign cloud beyond the control of US corporations.</p></li></ul></li><li><p><a href="https://www.canada.ca/en/innovation-science-economic-development/news/2026/02/canada-and-germany-sign-ai-joint-declaration-and-launch-sovereign-technology-alliance.html">Canada and Germany sign AI joint declaration and launch Sovereign Technology Alliance</a></p><ul><li><p>Maybe under the previous Trudeau government, Canada could say it was focused on &#8220;secure," but current AI Minister Evan Solomon and the government have made it clear they don&#8217;t care about security in digital issues. I would not be surprised if they simply do not understand it and accuse those wanting security as holding back economic investments. Evan Solomon is neither a serious person nor a serious minister. This government only cares about security as long as you can invest in it.</p></li></ul></li><li><p><a href="https://theijf.org/article/rcmp-firearms-program-hack">Hack linked to gun licensing program was biggest federal data breach in last 5 years: documents</a></p><ul><li><p>Great piece from Matt Malone. The federal government has has multiple breaches the past few years, but they have provided very little information about any of them.</p></li></ul></li><li><p><a href="https://opencanada.org/canadas-sovereign-ai-compute-gap-why-were-still-treating-a-strategic-asset-as-a-service/">Canada&#8217;s Sovereign AI Compute Gap: Why We&#8217;re Still Treating a Strategic Assets as a Service</a></p><ul><li><p>Despite many claims by the Government of Canada, nothing has changed about current policies and approaches, and Canada is just as exposed to United States infringement on Canadian digital sovereignty.</p></li></ul></li><li><p><a href="https://vancouver.ctvnews.ca/ottawa/article/ottawa-gatineau-to-host-international-cybersecurity-summit-in-december/">Ottawa-Gatineau to host international cybersecurity summit in December</a></p><ul><li><p>INCYBER Forum was a pretty big deal last year, so I am sure having the event in the capital will continue this.</p></li></ul></li><li><p><a href="https://www.alberta.ca/personal-information-protection-act-engagement">Alberta Begins Personal Information Protection Act engagement</a></p><ul><li><p>I don&#8217;t normally cover provincial-level activities, but this crossed my feed. Canada still does not have modern privacy legislation, which puts additional onus on provinces to try to fill in the gaps that the federal government is failing to address.</p></li></ul></li><li><p><a href="https://thewatch-journal.com/2026/02/03/canadas-norad-commander-outlines-defense-upgrades/">Canada&#8217;s NORAD commander outlines defense upgrades</a></p><ul><li><p>We always think about radars and F-35s as NORAD modernization upgrades, but the core to NORAD modernization are digital upgrades. Radars also happen to be one of the most targeted military assets for cyber attacks, so cybersecurity is imperative for them and NORAD modernization.</p></li></ul></li><li><p><a href="https://arstechnica.com/tech-policy/2026/02/discord-faces-backlash-over-age-checks-after-data-breach-exposed-70000-ids/">Discord faces backlash over age checks after data breach exposed 70,000 IDs</a></p><ul><li><p>Everyone is turning to ID and facial checks for age verification, but everyone is ignoring the calls from security researchers and advocates about how dangerous this is without instituting sufficient levels of controls to protect users privacy.</p></li></ul></li><li><p><a href="https://cyberscoop.com/0apt-ransomware-group-hoax-technical-capabilities/">0APT ransomware group rises swiftly with bluster, along with genuine threat of attack</a></p><ul><li><p>A new ransomware group called oAPT has popped up claiming approximately 200 victims, including Canadian victims like Global News. However, majority of these claims appear to be hoaxes with only a few genuine attacks. </p></li><li><p>This is why you should always be suspicious of ransomware groups. They will always claim something is worse than it actually is, even outright lying that they have access or locked down anything. This is why in any circumstance where you are attacked or a ransomware actor reaches out to you, lock down your network and contact a professional.</p></li></ul></li><li><p>C4ISR and Beyond is a one-day conference in Ottawa focused on the defence ecosystem around C4ISR (including cyber!). Canadian Cyber in Context subscribers don&#8217;t have to worry about missing the event:</p><p></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d51d24d7-f1be-4b4f-b949-86b4cb285ecd&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Missed C4ISR and Beyond? Don't Worry&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:127347897,&quot;name&quot;:&quot;Alexander Rudolph&quot;,&quot;bio&quot;:&quot;Canadian Doctoral Candidate studying the role of doctrine in cyber conflict. In my real life, I research and publish on Canadian cyber defence policy and own Canadian Cyber in Context.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8b40a2-9c3a-4255-8938-ce5d2f684b72_1080x1080.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-02T13:53:17.681Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40d53ce5-71bc-4122-ae7f-edfe4c828f23_875x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.cyberincontext.ca/p/missed-c4isr-and-beyond-dont-worry&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:186610655,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1431708,&quot;publication_name&quot;:&quot;Canadian Cyber in Context&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!xNeN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F022e597a-4e96-4f0f-885a-3489924dd07e_500x500.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div></li></ul><div><hr></div><h3>Canada Cyber Threat Watch</h3><p>While not all attacks are reported or receive media attention, any notable or open-source cyber attacks on Canadian organizations and any relevant cyber threat intelligence to Canada will be posted here. I only list the Canadian Centre for Cyber Security&#8217;s (CCCS) alerts here, not all advisories; follow the <a href="https://www.cyber.gc.ca/en/alerts-advisories">full feed here</a>. </p><ul><li><p><a href="https://cyberpress.org/fake-ticket-portals-harvest-data/">Cybercriminals Exploit Fake Traffic Ticket Portals To Harvest Sensitive Information</a></p></li><li><p><a href="https://www.koi.ai/blog/agreetosteal-the-first-malicious-outlook-add-in-leads-to-4-000-stolen-credentials#heading-5">AgreeToSteal: The First Malicious Outlook Add-In Leads to 4,000 Stolen Credentials</a></p><ul><li><p>Be careful about the in-office tools you use; they could be malware.</p></li></ul></li><li><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws/">Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws</a></p><ul><li><p>I&#8217;m not usually one to cover patch Tuesday, but the fact that 6 zero-days were addressed I think it indicative of just how active the cyber threat environment is right now. (For those unfamiliar, Tuesday tends to be the day Microsoft and others release a lot of patches, hence Patch Tuesday)</p></li></ul></li><li><p><a href="https://www.theregister.com/2026/02/12/apple_ios_263/">Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware</a></p><ul><li><p>Another step in Apple&#8217;s long battle against commercial spyware.</p></li></ul></li><li><p><a href="https://haveibeenpwned.com/Breach/Substack">Substack breach affected approximately 663K accounts.</a></p></li><li><p><a href="https://stairwell.com/resources/stairwell-detects-widespread-exposure-to-critical-winrar-vulnerability-across-customer-environments/">Stairwell detects widespread exposure to critical WinRAR vulnerability across customer environments</a></p><ul><li><p>Et tu, Winrar?</p></li></ul></li><li><p><a href="https://age-verifier.kibty.town/">Social media and other platforms are increasingly require age verification. Unfortunately it seems easy to bypass.</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/">Crazy ransomware gang abuses employee monitoring tool in attacks</a></p><ul><li><p>Alternative headline: Ransomware gang uses abusive employee monitoring tools in attack</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><h3>Research and Op-Eds</h3><ul><li><p><a href="https://assets.recordedfuture.com/insikt-report-pdfs/2026/cta-2026-0212.pdf">Recorded Future&#8217;s 2026 State of Security: How Global Fragmentation is Redfining Conflict Across Cyber, crime and Influence</a></p><ul><li><p>Recorded Future is a favourite cybersecurity firm of mine, so their 2026 state of security report is a must-read in my opinion. </p></li></ul></li><li><p><a href="https://www.secureworld.io/industry-news/first-forecast-cves-surpass-50k">FIRST Forecast: CVEs Expected to Surpass 50,000 in 2026 for First Time</a></p><ul><li><p>CVE stands for Common Vulnerabilities and Exposures, which is a type of classification for a known vulnerability in software, which are verified and catalogued to inform defenders about them and to take appropriate action. CVEs are what is exploited by threat actors, so the active CVE expecting to pass 50,000 in 2026 is very noteworthy about the cyber threat environment.</p></li></ul></li><li><p><a href="https://archive.ph/cyOLI">AI will disrupt millions of jobs, so what is Ottawa&#8217;s plan?</a></p><ul><li><p>There is such an overwhelming focus on securing Canada&#8217;s role in AI as an economic force, but little attention is being paid to how AI will seriously impact society.</p></li></ul></li><li><p><a href="https://www.lesaffaires.com/opinions/filiere-defense-sans-trajectoire-pas-de-souverainete/">Fili&#232;re d&#233;fense: sans trajectoire, pas de souverainet&#233;( Defense sector: without a trajectory, there is no sovereignty)</a></p><ul><li><p>We talk a big game on sovereignty, but we continue to let doors open which only provide a performative show of sovereignty and digital sovereignty issues are a top one.</p></li></ul></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:179329206,&quot;url&quot;:&quot;https://netaskari.substack.com/p/train-to-kill-chinas-secret-training&quot;,&quot;publication_id&quot;:3812955,&quot;publication_name&quot;:&quot;NetAskari&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!BsZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;title&quot;:&quot;Critical strike: China's hacking training grounds (PART 1)&quot;,&quot;truncated_body_text&quot;:&quot;China&#8217;s state-backed hackers have intensified their attacks on the critical infrastructure of other nations in recent years&#8212;often with notable success. Their techniques are highly sophisticated, but just as significant is the support ecosystem that enables them to develop and refine those attacks. Hidden &#8220;digital shooting ranges&#8221; allow operatives to pra&#8230;&quot;,&quot;date&quot;:&quot;2025-11-19T14:19:23.796Z&quot;,&quot;like_count&quot;:21,&quot;comment_count&quot;:5,&quot;bylines&quot;:[{&quot;id&quot;:43092822,&quot;name&quot;:&quot;NetAskari&quot;,&quot;handle&quot;:&quot;netaskari&quot;,&quot;previous_name&quot;:&quot;Marc Hofer&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png&quot;,&quot;bio&quot;:&quot;Over 16 years of all sorts of journalism: wars, troubles and where the wild things are. If you have data or info to leak, use: deaddrop.netaskari.online.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-08-04T07:37:41.859Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-08-04T07:39:13.534Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:3887885,&quot;user_id&quot;:43092822,&quot;publication_id&quot;:3812955,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:3812955,&quot;name&quot;:&quot;NetAskari&quot;,&quot;subdomain&quot;:&quot;netaskari&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Over 16 years of visual journalism from around the globe. I have always questions. &quot;,&quot;logo_url&quot;:null,&quot;author_id&quot;:43092822,&quot;primary_user_id&quot;:43092822,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-01-20T07:22:21.937Z&quot;,&quot;email_from_name&quot;:&quot;NetAskari &quot;,&quot;copyright&quot;:&quot;NetAskari&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;profile&quot;,&quot;is_personal_mode&quot;:true}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://netaskari.substack.com/p/train-to-kill-chinas-secret-training?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!BsZQ!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda139f3d-df22-454a-b176-0da7a3c2cc34_1328x1328.png" loading="lazy"><span class="embedded-post-publication-name">NetAskari</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Critical strike: China's hacking training grounds (PART 1)</div></div><div class="embedded-post-body">China&#8217;s state-backed hackers have intensified their attacks on the critical infrastructure of other nations in recent years&#8212;often with notable success. Their techniques are highly sophisticated, but just as significant is the support ecosystem that enables them to develop and refine those attacks. Hidden &#8220;digital shooting ranges&#8221; allow operatives to pra&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">6 months ago &#183; 21 likes &#183; 5 comments &#183; NetAskari</div></a></div><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:187441784,&quot;url&quot;:&quot;https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps&quot;,&quot;publication_id&quot;:835088,&quot;publication_name&quot;:&quot;Natto Thoughts&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!lq1x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48fca4-3380-43d1-99d9-bf438e0b295d_182x182.png&quot;,&quot;title&quot;:&quot;The Tianfu Cup Returns Under MPS Leadership as AI Takes Center Stage&quot;,&quot;truncated_body_text&quot;:&quot;The Tianfu Cup (&#22825;&#24220;&#26479;), China&#8217;s premier exploit hacking competition, has returned to Chengdu, Sichuan Province, for its sixth edition, held from January 29 to 30, 2026. This time, under the organizational lead of China&#8217;s Ministry of Public Security (MPS), China&#8217;s domestic law-enforcement authority. Launched in 2018 after Chinese authorities&quot;,&quot;date&quot;:&quot;2026-02-11T14:02:47.161Z&quot;,&quot;like_count&quot;:4,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:5401290,&quot;name&quot;:&quot;Eugenio Benincasa&quot;,&quot;handle&quot;:&quot;eubenincasa&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09a1f79e-07d1-4938-9147-e0df8440802f_800x800.jpeg&quot;,&quot;bio&quot;:&quot;Eugenio Benincasa is a Senior Cyberdefense Researcher at the Center for Security Studies (CSS) at ETH Zurich.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-07-24T18:51:25.154Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-07-25T11:56:25.954Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:2863377,&quot;user_id&quot;:5401290,&quot;publication_id&quot;:835088,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:835088,&quot;name&quot;:&quot;Natto Thoughts&quot;,&quot;subdomain&quot;:&quot;nattothoughts&quot;,&quot;custom_domain&quot;:&quot;www.nattothoughts.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Stories, analysis and insights from the intersection of culture, technology, and security.\n&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c48fca4-3380-43d1-99d9-bf438e0b295d_182x182.png&quot;,&quot;author_id&quot;:86550903,&quot;primary_user_id&quot;:86550903,&quot;theme_var_background_pop&quot;:&quot;#EA410B&quot;,&quot;created_at&quot;:&quot;2022-04-07T01:41:45.349Z&quot;,&quot;email_from_name&quot;:&quot;Natto Thoughts&quot;,&quot;copyright&quot;:&quot;Natto Thoughts&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.nattothoughts.com/p/the-tianfu-cup-returns-under-mps?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!lq1x!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c48fca4-3380-43d1-99d9-bf438e0b295d_182x182.png" loading="lazy"><span class="embedded-post-publication-name">Natto Thoughts</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The Tianfu Cup Returns Under MPS Leadership as AI Takes Center Stage</div></div><div class="embedded-post-body">The Tianfu Cup (&#22825;&#24220;&#26479;), China&#8217;s premier exploit hacking competition, has returned to Chengdu, Sichuan Province, for its sixth edition, held from January 29 to 30, 2026. This time, under the organizational lead of China&#8217;s Ministry of Public Security (MPS), China&#8217;s domestic law-enforcement authority. Launched in 2018 after Chinese authorities&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">3 months ago &#183; 4 likes &#183; Eugenio Benincasa</div></a></div><div><hr></div><h3>United States News</h3><ul><li><p><a href="https://www.reuters.com/business/media-telecom/us-china-trade-detente-fuels-mothballing-key-china-tech-curbs-2026-02-12/">Exclusive: Trump pauses China tech bans ahead of Xi summit</a></p><ul><li><p>Everyone is claiming this is a negotiating tactic, but the United States&#8217; lack of consistency and bold facing lying about everything means that we can only assume the most selfish and short sighted ambitions and purposes for any action that the United States undertakes. We especially cannot assume any action taken is the result of intelligent action, but is just as likely to be an emotional, shallow action with no strategy behind them.</p></li></ul></li><li><p><a href="https://techcrunch.com/2026/02/11/doj-says-trenchant-boss-sold-exploits-to-russian-broker-capable-of-accessing-millions-of-computers-and-devices/">DOJ says Trenchant boss sold exploits to Russian broker capable of accessing &#8216;millions of computers and devices&#8217;</a></p><ul><li><p>The market for zero-days and hacking exploits is still very unregulated and there are private actors that make a killing in this space, but usually they aren&#8217;t the ones leaving companies and selling their data. Usually it&#8217;s neutral, third parties that do the best on the open market, although if you&#8217;re in a Western country, Russia, or China usually you only have one option on who to sell your wares.</p></li></ul></li><li><p><a href="https://therecord.media/usa-cyber-actors-consequences">US needs to impose &#8216;real costs&#8217; on bad actors, State Department cyber official says</a></p><ul><li><p>If cyber threat actors operate without concern for consequences, then they will continue to act as if there are no consequences. </p></li></ul></li><li><p><a href="https://www.ftc.gov/news-events/news/press-releases/2026/02/ftc-issues-second-report-congress-its-work-fight-ransomware-other-cyberattacks">FTC Issues Second Report to Congress on its Work to Fight Ransomware and other Cyberattacks</a></p></li><li><p><a href="https://www.texasattorneygeneral.gov/news/releases/attorney-general-ken-paxton-demands-information-blue-cross-blue-shield-texas-and-conduent-part">Attor&#173;ney Gen&#173;er&#173;al Ken Pax&#173;ton Demands Infor&#173;ma&#173;tion from Blue Cross Blue Shield of Texas and Con&#173;duent as Part of Inves&#173;ti&#173;ga&#173;tion into Largest Data Breach in U.S. History</a></p></li><li><p><a href="https://defensescoop.com/2026/02/10/cia-military-special-operations-forces-capability-assessment/">CIA, SOCOM gearing up for rapid capability assessment with an eye toward &#8216;field-forward&#8217; ops</a></p><ul><li><p>The future of warfare and conflict lies in leveraging data. Access to greater amounts of accurate data with quick and intricate data analysis will give actors a major decision-making advantage.</p><ul><li><p>This is at the foundation of CJADC2 and the Canadian version of Pan-Domain Command and Control (PDC2). <a href="https://www.cgai.ca/digital_transformation_and_pan_domain_the_cafs_quiet_revolution_in_military_affairs">I have written an introduction to Canada&#8217;s approach to multi-domain operations and pan-domain for CGAI here</a>. The core capabilities to this are cloud networking, big data analytics and processing, and AI.</p></li></ul></li></ul></li></ul><div><hr></div><h3>European Union &amp; United Kingdom News</h3><ul><li><p><a href="https://therecord.media/eu-dutch-government-announce-hacks-ivanti-zero-days">EU, Dutch government announce hacks following Ivanti zero-days</a></p><ul><li><p>Ivanti is having major success in targeting European countries and organizations.</p></li></ul></li><li><p><a href="https://www.theguardian.com/world/2026/feb/09/russia-scrambles-starlink-access-deactivated-elon-musk-space-x">Russian military scrambles to find Starlink alternative after access blocked</a></p><ul><li><p>I gave big props to SpaceX for moving quickly on this, and this highlights just how important infrastructure is for modern capabilities. Secure and reliable data connectivity is paramount to modern military operations that Canada and other militaries are increasingly reliant upon. This is why fiber optic drones are increasingly common as the lack of infrastructure and secure data connectivity amid degraded electro-magnetic environment makes this very difficult to achieve.</p></li></ul></li><li><p><a href="https://archive.ph/n4AFy#selection-1059.0-1059.45">Russia&#8217;s sabotage campaign is becoming bolder</a></p><ul><li><p>Russia is increasingly using cyber operations to continue its sabotage campaign targeting Europe and Ukraine-allied countries.</p></li></ul></li><li><p><a href="https://nltimes.nl/2026/02/11/parliament-tells-dutch-govt-prevent-digid-ending-american-hands">Parliament again tells Dutch gov&#8217;t to prevent DigiD from ending up in American hands</a></p><ul><li><p>Canada, unfortunately, is not in a position to do the same unless the government take a dramatically more risk-prone approach than they have been. </p></li></ul></li><li><p><a href="https://www.kommersant.ru/doc/8421763">WhatsApp domain disappeared from Roskomnadzor&#8217;s DNS server.</a></p><ul><li><p>Russia blocks Whatsapp, YouTube, and many other services.</p></li></ul></li><li><p><a href="https://nationalsecuritynews.com/2026/02/the-grid-is-the-battlefield-what-the-munich-security-report-reveals-about-cyber-warfare-and-the-fight-for-europes-energy-infrastructure/">The grid is the battlefield: what the Munich Security Report reveals about cyber warfare and the fight for Europe&#8217;s energy infrastructure</a></p><ul><li><p>Cyber attacks are a top discussion at the Munich Security Conference this year and for good reason. Europe has been getting hit particularly</p></li></ul></li><li><p><a href="https://fortune.com/2026/02/13/binance-investigators-fired-iran-sanctions-potential-violations/">Exclusive: Binance fires top investigators who claim to have uncovered evidence of Iranian sanctions violations</a></p><ul><li><p>You remember Binance. The ones who were convicted of violating sanctions and anti-money laundering laws in 2023, but were able to avoid a lot of the punishments after providing bribes to the Trump administration.</p></li></ul></li></ul><div><hr></div><h3>Other International News</h3><ul><li><p><a href="https://therecord.media/leaked-china-documents-show-testing-cyber-neighbors">Leaked technical documents show China rehearsing cyberattacks on neighbors&#8217; critical infrastructure</a></p><ul><li><p>First reported by NetAskari (linked above), this news article is based on that report. This shouldn&#8217;t be a surprise to anyone. This technology is readily available given how common large cloud infrastructures are, so it makes sense that China would be looking for gaps and practicing penetration testing against them daily. We should expect our cyber forces to do the same.</p></li></ul></li><li><p><a href="https://www.techpolicy.press/x-tried-to-sidestep-brazils-inquiry-on-ai-deepfakes-the-government-just-pushed-back/">X Tried to Sidestep Brazil&#8217;s Inquiry on AI Deepfakes. The Government Just Pushed Back.</a></p></li><li><p><a href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/">Largest Multi-Agency Cyber Operation Mounted to Counter Threat Posed by Advanced Persistent Threat (APT) Actor UNC3886 to Singapore&#8217;s Telecommunications Sector</a></p><ul><li><p>Chinese APTs have penetrated all of Singapore&#8217;s major telecoms. This is not a surprise. Most telecoms have been penetrated by Chinese APTs at this point due to salt/volt typhoon.</p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/chinese-cyberspies-breach-singapores-four-largest-telcos/">News article about this.</a></p></li></ul></li><li><p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/south-korea-says-coupang-must-address-security-loopholes-probe-data-breach-2026-02-10/">South Korea blames Coupang data breach on management failure, not sophisticated attack</a></p><ul><li><p>Sometimes it isn&#8217;t external threat actors, but your own management that cause incidents. This is why CPCSC and CMMC are quite important for the defence industry, because they are meant to ensure internal compliance is sound so that we can focus on external threats.</p></li></ul></li><li><p><a href="https://www.timesofisrael.com/liveblog_entry/security-bodies-say-they-foiled-hundreds-of-iranian-cyberattacks-against-senior-israelis-in-past-months/">Security bodies say they foiled hundreds of Iranian cyberattacks against senior Israelis in past months</a></p><ul><li><p>Iran has a comparatively large and prolific cyber operations capabilities. Two of the countries targeted the earliest with cyber operations also happen to be the ones that now have major cyber forces: Iran and North Korea.</p></li></ul></li><li><p><a href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</a></p><ul><li><p>This is the type of stuff that should absolutely kill a cyber threat intelligence business. If you&#8217;re not here to be truthful about threats, then you&#8217;re actively helping the state. Congrats, Palo Alto Networks, you now support the Chinese Communist Party.</p></li></ul></li><li><p><a href="https://www.information.gov.kh/articles/183676">His Excellency General Sar Thet is highly determined and orders the National Police Force to eradicate online scams from Cambodia</a></p><ul><li><p>Cambodia is doing a big crackdown on scam compounds.</p></li></ul></li></ul><div><hr></div><h6><strong>Have your business and logo featured in Canadian Cyber in Context with a <a href="https://www.cyberincontext.ca/p/sponsors">sponsorship</a>.</strong></h6><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Canadian Cyber in Context is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cyberincontext.ca/p/canadian-cyber-news-rewire-140226?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item></channel></rss>