#CyberGovernance

2026-02-19

Citizen Lab identified indicators that Cellebrite forensic extraction tools were used on a Samsung device belonging to Kenyan activist Boniface Mwangi during police custody (July 2025).

Amnesty International separately confirmed a successful Predator spyware infection on an Angolan journalist’s iPhone running iOS 16.2.

Technical implications:
• Commercial forensic tools can enable full device extraction
• Predator supports modular deployment and anti-analysis techniques
• Infection attempts leveraged WhatsApp delivery vectors
• Restart disrupted active spyware persistence in one case
Operational questions:
– How should vendors enforce client compliance?
– What detection artifacts can defenders monitor?
– Are mobile EDR solutions sufficient against mercenary spyware?
– What governance frameworks are realistically enforceable?

Share your technical assessment below.

Source: citizenlab.ca/research/cellebr

Follow TechNadu for continued surveillance-tech and threat intelligence coverage.

#IncidentResponse #MobileSecurity #ThreatResearch #SpywareAnalysis #Forensics #EDR #CyberGovernance #InfosecCommunity #ThreatIntel #DigitalRights

Not Safe for Politics
Cellebrite Used on Kenyan Activist and Politician Boniface Mwangi
2026-02-18

Switzerland Operationalizes 24-Hour Critical Infrastructure Cyber Reporting

The National Cyber Security Centre (NCSC) processed ~65,000 incident reports in 2025, including 222 under the newly mandated 24-hour reporting requirement under the ISG/CSV framework.

Operational enhancements included:
• Expanded Cyber Security Hub (1,600 members)
• 4,615 incident artifacts exchanged via MISP
• Increased bug bounty deployment across federal IT
• Open-source vulnerability testing (TYPO3, QGIS)
• CHF 18.4M total expenditure, including CHF 3.8M IT investment
This represents a mature shift toward structured national cyber governance: centralized intake, intelligence enrichment, proactive vulnerability reduction, and enforceable compliance.

From an operational standpoint, rapid disclosure requirements tighten detection cycles and strengthen cross-sector signal correlation.

Is mandatory reporting the future baseline for critical infrastructure defense?

Source: industrialcyber.co/reports/swi

Follow @technadu for global cyber governance and threat intelligence analysis.

#Infosec #NCSC #MISP #CyberGovernance #CriticalInfrastructure #BugBounty #OpenSourceSecurity #ThreatIntelligence

Switzerland’s NCSC boosts operational capabilities, mandates cyberattack reporting on critical infrastructure
2026-01-29

During the Trump administration, sensitive but unclassified CISA contracting documents were uploaded into a public AI platform by the agency’s acting director, triggering security alerts and a DHS-level assessment.

While no classified data was involved, the case highlights governance risks tied to AI exceptions, access controls, and data handling in high-security environments.

Source: technadu.com/cisa-acting-direc

What practical guardrails should govern AI usage in public-sector security roles?

Share insights and follow @technadu

#InfoSec #TrumpAdministration #AIUsage #DataHandling #CyberGovernance #CISA #PublicSectorSecurity

Trump’s acting cyber chief uploaded sensitive files into a public version of ChatGPT
2026-01-24

A U.S. court has temporarily restricted access to materials seized from a journalist during a federal investigation, pending judicial review.

Beyond press freedom implications, the case also underscores how digital evidence handling, access controls, and legal oversight intersect when sensitive information is involved.

From a security and governance standpoint, what best practices should guide investigations that touch journalistic sources?

Share your thoughts and follow @technadu for measured reporting at the intersection of cybersecurity, law, and policy.

Source: reuters.com/business/media-tel

#InfoSec #CyberGovernance #DigitalForensics #PressFreedom #CyberLaw #TechNadu

US judge temporarily blocks review of material seized from Washington Post reporter
2026-01-16

Anchorage Police Department shut down specific servers and disabled vendor access after being notified that a third-party service provider was targeted in a cyber incident.

The department reports:
• No evidence of compromise to internal systems
• Proactive isolation and data removal measures
• Ongoing third-party investigation

This incident reinforces the importance of third-party risk visibility, contractual security controls, and rapid containment - even when direct impact is not confirmed.

How do you approach precautionary response when vendor exposure is suspected but unverified?

Source: dysruptionhub.com/anchorage-po

Share insights and follow @technadu for measured, fact-based security reporting.

#InfoSec #ThirdPartyRisk #IncidentResponse #PublicSectorSecurity #CyberGovernance #TechNadu

Anchorage police shut down servers after cyber incident, Alaska
2026-01-07

The UK government has admitted systemic weaknesses in its cyber resilience framework and unveiled a new Government Cyber Action Plan.

The strategy moves toward mandatory cybersecurity requirements, centralized accountability, and direct action on legacy IT and supply chain risk - signaling a fundamental shift in public sector cyber governance.

Details:
technadu.com/uk-government-adm

#UKCyber #CyberResilience #PublicSectorSecurity #Infosec #CyberGovernance

UK Government Admits Flaws in Cyber Resilience Strategy, Overhauls Cyber Policy with New Action Plan
Negative PID Inc.negativepid
2025-11-04

How is cybersecurity law applied across European countries? How do its state members fit into the global picture? What's discretionary, and how can they ensure compliance?

negativepid.blog/cybersecurity
negativepid.blog/cybersecurity

Strathclyde Cyber SecurityStrathCyber@mastodon.acm.org
2023-06-14

@UniStrathclyde (including our @cyber4humans)is hosting the Workshop on Cyber-Securing Democratic Elections on 27th June. Attendance is free and open to industry/practitioners, interested citizens, and academics: eventbrite.co.uk/e/workshop-on #Glasgow #Scotland #Cyber #Democracy #Resilience #CyberGovernance #Elections #Voting

Francesca Boscofrancibosco@mas.to
2022-12-07

#thankful for the invite from TechSec Initiative @GVAGrad@twitter.com to discuss #cybersecurity #cyberpolicy #cybergovernance #internationalsecurity #digitaltechnologies #policymaking It was a pleasure to talk about career paths #futureofwork #cybersecurityworkforce #cybereducation

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst