By the CyberWire staff
Top stories.
- White House meets with Republican lawmakers to discuss FISA Section 702 renewal.
- Pro-Russia hacktivists target the Winter Olympics.
- Singapore says China-linked hackers targeted all four of the country's telecoms.
- Google warns of nation-state abuse of AI tools.
- Patch Tuesday notes.
White House meets with Republican lawmakers to discuss FISA Section 702 renewal.
The Record reported on Tuesday that senior Trump administration officials were set to meet with key GOP lawmakers to discuss the renewal of Section 702 of the Foreign Intelligence Surveillance Act (FISA), which will expire in April without congressional reauthorization. FISA Section 702 allows the US government to surveil non-US citizens outside the United States, but the law has generated controversy because it allows incidental collection of Americans' data without a warrant.
The meeting reportedly included President Trump, White House Chief of Staff Susan Wiles, presidential aide Stephen Miller, DNI Tulsi Gabbard, CIA Director John Ratcliffe, Joint Chiefs Chairman Dan Caine, and Reps. Jim Jordan (Republican of Ohio) and Rick Crawford (Republican of Arkansas), the chairs of the House Judiciary and Intelligence panels. A senior White House official told Nextgov/FCW in an email on Tuesday, "The President, several of his top advisers, and lawmakers will be participating in a discussion at the White House today about FISA Section 702 renewal. As always, the President is the final decision-maker on policy matters."
CNN reported that a classified meeting last week between Republican and Democratic senators and intelligence agency officials grew heated as the lawmakers struggled to get answers from the officials about whether the administration would support renewal of Section 702.
Meter: the end-to-end, secure enterprise network
Fragmented networks create security blind spots that are hard to patch. Meter takes a different approach, with an integrated enterprise networking architecture designed for security at the core, the edge, and everywhere in between. Learn how Meter protects every site by default at meter.com/security
Pro-Russia hacktivists target the Winter Olympics.
Intel 471 has observed a surge in pro-Russia hacktivism since the opening of the Winter Olympics on February 6th. Russia was banned from competing in the games due to the ongoing war in Ukraine, and cyber retaliation was not unexpected: the country previously launched cyberattacks against the 2018 Winter Olympics after its athletes were banned for doping.
Intel 471 says the hacktivist group NoName057(16) launched DDoS attacks against Italian entities located in the Olympics’ host cities of Milan and Cortina. The group also claimed to have targeted "the Lithuanian, Polish and Spanish national Olympic committees, as well as a Cortina d’Ampezzo tourism website and Milan Malpensa Airport." Additionally, the BD Anonymous group allegedly targeted the websites of two Italian airports, while the Z-Pentest Alliance and Server Killers groups claimed to have targeted Italian critical infrastructure. Italian authorities acknowledged the incidents, but said the attacks were thwarted without any notable impacts.
While the cyberattacks against the 2018 Olympics were tied to Russian government threat actors, the 2026 attacks are attributed to low-level hacktivist groups. Intel 471 notes, "We cannot completely dismiss the possibility that Russian state-backed threat groups have conducted persistence attacks against entities involved in the 2026 Winter Olympics. However, this type of influence and the suggested need to defend Russia’s image on the world stage likely are secondary or tertiary intelligence objectives for the Kremlin at present."
Secure enterprise AI with Glean and Palo Alto Networks, live on Feb 26
Security leaders are under pressure to move fast on AI while keeping firm control over risk. On February 26 at 10:30 AM PT, join security leaders from Glean and Palo Alto Networks for a live fireside chat on securing enterprise AI. Learn what to secure across the AI lifecycle—from models and data to agents—and the practical guardrails Security should own to reduce risk without slowing the business.
Singapore says China-linked hackers targeted all four of the country's telecoms.
The Cyber Security Agency of Singapore (CSA) has shared details on China-linked cyberespionage attacks that targeted all four of Singapore's major telecommunications providers, the Straits Times reports. The attacks, attributed to the PRC-affiliated threat actor UNC3886, breached local telecom networks operated by Singtel, M1, StarHub, and Simba Telecom. The CSA says the hackers were not able to disrupt services and did not access personal data.
In response to the attacks, the agency says Singapore launched its "largest coordinated cyber incident response effort undertaken to date," involving the CSA, the Infocomm Media Development Authority, the Centre for Strategic Infocomm Technologies, the Digital and Intelligence Service, the Government Technology Agency of Singapore, and the Internal Security Department.
Experience the Power of Community at RSAC 2026 Conference
RSAC™ 2026 Conference returns to San Francisco March 23–26, bringing together the global cybersecurity community for four days of expert insights, hands-on learning, and breakthrough innovation. Join thousands of practitioners, executives, and innovators as they tackle today’s toughest challenges and explore solutions shaping tomorrow. From cutting-edge ideas to immersive programs and vibrant networking, this is where meaningful progress happens. Register today and be part of the conversations driving cybersecurity forward.
Google warns of nation-state abuse of AI tools.
Google's Threat Intelligence Group (GTIG) has published a report on malicious use of AI, finding that "[s]tate-sponsored actors continue to misuse Gemini to enhance all stages of their operations, from reconnaissance and phishing lure creation to command-and-control (C2 or C&C) development and data exfiltration." The researchers have also "observed activity demonstrating an interest in using agentic AI capabilities to support campaigns, such as prompting Gemini with an expert cybersecurity persona, or attempting to create an AI-integrated code auditing capability."
The researchers say threat actors from China, North Korea, Russia, and Iran used LLMs throughout 2025 for research, targeting, and rapid generation of spearphishing lures.
Patch Tuesday notes.
Microsoft on Tuesday issued fixes for 58 vulnerabilities, including six actively exploited zero-days, BleepingComputer reports. The zero-days affect Windows Shell, MSHTML, Microsoft Word, Windows Remote Desktop Services, the Desktop Window Manager, and the Windows Remote Access Connection Manager.
Adobe released patches for dozens of flaws across its product line, including Audition, After Effects, InDesign, Bridge, Lightroom Classic, Substance 3D apps, and the DNG SDK, according to BeyondMachines.
SecurityWeek notes that Intel and AMD have addressed more than 80 vulnerabilities across their products, including several serious flaws affecting Intel's Trust Domain Extensions (TDX).
SecurityWeek also has a summary of patches from industrial vendors, including Siemens, Schneider Electric, Aveva, and Phoenix Contact.