InfoComm

Week ending February 27, 2026

UAE says it foiled organized cyberattacks targeting “vital sectors”

What happened (Feb 21): The UAE reported it thwarted organized cyberattacks aimed at the country’s digital infrastructure and vital sectors.

Impacts:

What people can do (where you are):

  • If you run any org (city, school, hospital, SMB): assume “pre-attack” posture—offline backups + MFA everywhere + incident runbooks and vendor access reviews.

Google disrupted a China-linked campaign that hit 53 groups globally

What happened (Feb 25): Reuters reported Google disrupted a set of Chinese-linked hackers that attacked 53 groups worldwide. (
Impacts:

What people can do:

  • High-risk groups (journalists, NGOs, activists, local officials): adopt phishing-resistant MFA (passkeys/security keys), lock down recovery channels, and separate personal from org accounts.

AI-augmented actor compromised 600+ FortiGate devices across 55 countries

What happened (Feb 20–23 reporting; still active in this window): AWS described an AI-augmented actor exploiting weak credentials/exposed management interfaces to access 600+ FortiGate devices in 55 countries—a classic edge-device “foothold” pattern, but accelerated by AI tooling.

Impacts:

What people can do:

  • If you manage networks: disable internet-exposed admin, enforce MFA for management, rotate credentials, restrict by IP/VPN, and monitor for unusual logins.
  • If you’re in critical infrastructure / manufacturing: segment IT/OT, and treat firewall/VPN logs as tier-1 telemetry.

EU cybersecurity governance “upgrade”: new package + tightening supply-chain security

What happened (EU-level, ongoing): The European Commission published a new cybersecurity package (often described as Cybersecurity Act 2 / CSA2 plus targeted NIS2 amendments) to strengthen resilience and reduce fragmentation—explicitly addressing ICT supply-chain risk and compliance clarity.

Impacts:

What people can do: