Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:09)
It's not just something you made, it's
A (0:11)
the privilege that you get to work with your hands. It's building something that serves a purpose, proof that you have the grit to keep going. At Timberland, we understand you take your
B (0:21)
craft seriously, and we do too, which
A (0:23)
is why our products are built to the highest quality. We put in the work so you can perfect yours with purpose, in every
B (0:31)
detail and crafted with intention. Timberland built on Craft Visit timberland.com to shop. Trump tells diplomats to fight digital sovereignty Deepseek allegedly trains on banned Nvidia chips Google knocks out Gallium Hackers tamper with patient records in New Zealand Popular mental health apps leak data Wynn confirms a shiny hunter's breach Telecoms dodge New York cyber rules Russia targets Telegram's founder and a defense insider heads to prison for selling cyber weapons to Moscow Our guest is Andrew Dunbar, CISO of Shopify, discussing how identity and trust become the new perimeter and how commerce needs both and barking backlash brews beneath a big game BROADC. Foreign. It's Wednesday, February 25, 2026. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great as always to have you with us. The Trump administration has directed U.S. diplomats to oppose foreign efforts to regulate how American technology companies handle citizens data, according to a State department cable dated February 18 and signed by Secretary of State Marco Rubio. The cable argues that data sovereignty and localization laws could disrupt global data flows, increase costs and cybersecurity risks, and limit artificial intelligence and cloud services. It specifically criticizes the EU's GDPR, calling its cross border data transfer restrictions unnecessarily burdensome. The directive reflects a more confrontational US Stance as Europe and others push tighter controls on data storage and sharing. The cable instructs diplomats to counter such regulations and promote the Global Cross Border Privacy Rules Forum, a multilateral group supporting cross border data flows. It also links restrictive data policies, including those in China, to expanded government control and potential surveillance. US officials say Chinese AI startup DeepSeek trained its upcoming model on Nvidia's most advanced Blackwell chips, which are barred from export to China. A senior Trump administration official told Reuters the chips were likely clustered at Deepsea's data center in Inner Mongolia and suggested their use could violate U.S. export controls. The official added that Deepseek may remove technical indicators revealing the chip's origin. Nvidia Deepseek and the Commerce Department declined to comment. The confirmation intensifies debate in Washington over chip policy. Some argue limited exports discourage Chinese rivals like Huawei, while others warn advanced chips could bolster China's military. Officials also said the model likely used distillation, drawing on leading US AI systems. The case underscores concerns about enforcement gaps and China's continued reliance on American semiconductor technology. Google says it disrupted a Chinese linked hacking group that breached at least 53 organizations across 42 countries. The group, tracked as UNC 2814 or Gallium, has spent nearly a decade targeting government and telecommunications entities, according to Google's Threat Intelligence Group. Google and unnamed partners terminated the group's Google Cloud projects, dismantled its infrastructure and disabled accounts used to run operations through Google Sheets. Google said the attackers used Google Sheets to blend into normal network traffic, not by exploiting a flaw in Google products. In one case, the group deployed a backdoor called Grid Tide on a system holding sensitive personal data. Google said the activity reflects broad surveillance efforts. The Chinese embassy denied wrongdoing. Google noted the campaign is separate from the China linked Salt typhoon operation Metamap, a New Zealand medication management portal used across aged care, disability, hospice and community health settings, has been taken offline after a cyber breach on Sunday. Health New Zealand says the company is responsible for securing its systems and must manage the fallout while national cyber authorities and police have been notified. What makes this incident especially unusual is that patient data was not only accessed but altered. Some living patients were incorrectly marked as deceased and other details were changed. In healthcare systems, records are typically treated as immutable clinical histories. Altering course status data raises patient safety and data integrity concerns beyond a typical data theft. Facilities have reverted to manual paper based processes, in some cases doubling nursing staff for medication rounds, officials say. Care continues, but the outage has increased pressure on frontline teams. The breach follows a recent major health data incident, intensifying scrutiny on New Zealand's healthcare cybersecurity posture. Security researchers at oversecured found over 1500 vulnerabilities across 10 popular mental health apps on Google Play, with more than 14.7 million combined downloads. The flaws include 54 high severity issues that could expose therapy transcripts, login credentials, session tokens and other sensitive data. Some apps improperly validate user input, store data in ways accessible to other apps or or use insecure random number generation for tokens. Several also lack root detection, increasing risk on compromised devices. Researchers warn that mental health records are especially valuable on the dark Web app names were withheld while vulnerabilities are being disclosed, and it's unclear whether patches have been issued. Wynn Resorts confirmed that the data extortion group Shiny hunters stole roughly 800,000 employee records in September 20and demanded $1.5 million in Bitcoin to prevent a leak. The compromised data reportedly included names, Social Security numbers, email addresses, phone numbers and birth dates. Winn said. The unauthorized party claimed the stolen data has been deleted and the group removed its threat from its dark Web site. The company did not say whether a ransom was paid. Shiny Hunters told the Register it accessed Win's systems through an Oracle PeopleSoft vulnerability using an employee's credentials. Wynn says it activated incident response protocols and is offering credit monitoring to affected employees. A federal class action lawsuit filed in California alleges inadequate data protection, though Wynn maintains no customer information was accessed. New York's Public Service Commission has removed wireless providers and broadcast TV companies from proposed cybersecurity rules after heavy industry lobbying. The original June proposal would have required annual third party audits, three day incident reporting and regular vulnerability assessments. Verizon and Optimum argued the commission lacked statutory authority to regulate telecom cybersecurity and met repeatedly with regulators and the governor's office. Although commission staff said those legal arguments were considered and rejected, the companies were ultimately exempted, citing distinct differences between telecom firms and traditional utilities. Critics, including a Cornell cybersecurity expert and a state lawmaker, called the move concerning and questioned the rationale. The scaled back rules will now apply only to gas, water and electric utilities. While debate continues over whether federal or state authorities should regulate telecom cybersecurity standards, Russian authorities have opened a criminal investigation into Telegram founder Pavel Durov on suspicion of abetting terrorist activities, raising the prospect of a nationwide ban on the messaging app. State linked newspapers, citing federal security service materials, accused Telegram of enabling sabotage, extremism and foreign intelligence operations tied to Ukraine. Kremlin officials said the app has committed numerous violations and failed to cooperate with authorities. Lawmakers warned Telegram could be labeled an extremist organization if it does not comply within a month. Telegram has already faced traffic throttling in Russia, and officials claim more than 150,000 content removal requests were ignored. Durav denied the allegations, calling them an attack on privacy and free speech. The move comes as Russia pushes users toward its state backed messaging platform Max, amid broader restrictions on foreign apps. Peter Williams, age 39, has been sentenced to more than seven years in prison for stealing classified cyber tools from a US Defense contractor subsidiary and selling them to a Russian zero day exploit broker. The former senior trenchant employee admitted taking eight components described as national security software intended only for the US and its allies. He transferred the data over encrypted channels in exchange for up to $4 million in cryptocurrency. The Department of Justice said Williams must serve 87 months, followed by three years of supervised release and forfeit luxury assets purchased with the proceeds. Officials stated the stolen tools could have enabled foreign adversaries to access millions of devices, resulting in $35 million in losses and damage to US and Australian intelligence interests. Coming up after the break, Andrew Dunbar from Shopify discusses how identity and trust become the new perimeter and barking backlash brews beneath the big game broadcast. Stay with us. No, it's not your imagination. Risk and regulation really are ramping up and customers expect proof of security before they'll sign that deal. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk and customer trust together on one AI powered platform. Whether you're preparing for SoC2 or managing an enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals moving. Companies like Ramp and RYTR spend 82% less time on audits with Vanta. That's not just faster compliance, that's more time for growth. Take it from me, if you're thinking about compliance, take the time to check out Vanta. Get started@vanta.com cyber. Andrew Dunbar is chief information security officer at Shopify. I recently caught up with him for a discussion on how identity and trust become the new perimeter and how commerce needs both to be engineered into the platform.
