ClearSignal — Mar 10, 2026
Major cyber leadership and strategic shifts dominate today's landscape as the Senate advances a new dual-hat commander for Cyber Command and NSA while the White House releases its National Cyber Strategy emphasizing aggressive offensive operations and reduced private sector regulation. Operational tempo is accelerating across multiple fronts: military strikes on Iran intensify with coalition support, Russian state-sponsored groups persist in targeting secure communications platforms globally, and the government shutdown delays critical CISA cyber incident reporting rules that industry has been awaiting.
Top 3
- New White House cyber strategy pledges to ease regulations, ‘impose costs’ on bad actors — The White House’s new National Cyber Strategy represents a fundamental policy shift toward more aggressive offensive cyber operations while simultaneously reducing regulatory compliance burdens on the private sector. This dual approach signals the administration’s intent to take a harder line against adversaries while attempting to address industry complaints about regulatory overhead, creating both opportunities and risks for government contractors navigating the evolving compliance landscape. — the-record
- US Air Force seeks sources for Stand-in Attack Weapon compatible with F-47, B-21 — The Air Force’s sources sought notice for the Stand-in Attack Weapon marks the first public acknowledgment of the F-47 platform in official acquisition documents, revealing a previously classified aircraft program. This disclosure opens potential procurement opportunities in a new weapons integration domain and suggests the platform is maturing toward operational capability, with implications for prime contractors and specialized weapons system integrators. — defense-news
- U.S. organizations should prepare for cyber retaliation as conflict with Iran escalates — With U.S. military operations against Iran escalating rapidly, security experts warn that cyber retaliation against critical infrastructure and defense industrial base targets is inevitable rather than speculative. Government contractors supporting defense operations or managing sensitive networks should immediately validate incident response plans, ensure security operations center staffing, and coordinate with cleared defense channels on threat intelligence sharing. — federal-news-network
Procurement & Opportunities
- US Air Force seeks sources for Stand-in Attack Weapon compatible with F-47, B-21 — The US Air Force has issued a sources sought notice for the Stand-in Attack Weapon compatible with the F-47 and B-21, marking the first public acknowledgment of the F-47 platform in an acquisition document. — defense-news
Policy & Regulatory
- Sean Cairncross lays out what’s coming next for Trump’s cyber strategy — National Cyber Director Sean Cairncross outlined the Trump administration’s forthcoming cyber strategy, which integrates cyber operations with diplomacy, law enforcement, and increased pressure on CEOs to strengthen critical infrastructure security. — cyberscoop
- New White House cyber strategy pledges to ease regulations, ‘impose costs’ on bad actors — The White House released its National Cyber Strategy committing to more aggressive offensive cyber operations against threat actors while pledging to reduce regulatory burdens on private sector. — the-record
- CISA delays cyber incident reporting town halls due to shutdown — CISA has postponed cyber incident reporting town halls originally scheduled to begin Monday due to the government shutdown, which will also likely delay the issuance of the final cyber incident reporting rule. — federal-news-network
Agency & Mission Activity
- Australian submariners have a brush with Iran war — Australian submariners were present during a recent U.S. submarine torpedo engagement related to Iran operations, though analysts suggest they may not have been directly involved in control room operations during the strike. — defense-news
- US B-1B Lancers arrive at RAF Fairford as strikes on Iran intensify — US B-1B Lancer bombers have deployed to RAF Fairford in the UK for defensive operations as military strikes on Iran intensify, confirmed by the UK Ministry of Defence. — defense-news
- Trump nominee to lead Cyber Command, NSA clears key Senate hurdle — The Senate voted 68-28 to advance Army Lt. Gen. Joshua Rudd’s nomination to lead both US Cyber Command and the NSA in a dual-hat role. — the-record
Technology Trends
- CISA: Recently patched Ivanti EPM flaw now actively exploited — CISA has flagged a high-severity vulnerability in Ivanti Endpoint Manager (EPM) as actively exploited and ordered federal agencies to patch within three weeks. — bleeping-computer
- APT28 hackers deploy customized variant of Covenant open-source tool — Russian state-sponsored APT28 threat group is deploying a customized variant of the open-source Covenant post-exploitation framework for long-term espionage operations. — bleeping-computer
- Microsoft Teams phishing targets employees with A0Backdoor malware — Threat actors are using Microsoft Teams to conduct phishing attacks against financial and healthcare organizations, tricking employees into granting remote access via Quick Assist to deploy A0Backdoor malware. — bleeping-computer
- Google: Cloud attacks exploit flaws more than weak credentials — Google reports hackers are increasingly exploiting newly disclosed third-party software vulnerabilities for initial cloud access, with attack windows narrowing from weeks to days after disclosure. — bleeping-computer
- Dutch govt warns of Signal, WhatsApp account hijacking attacks — Russian state-sponsored hackers are conducting ongoing Signal and WhatsApp phishing campaigns targeting government officials, military personnel, and journalists to hijack accounts and access sensitive communications. — bleeping-computer
- ShinyHunters claims ongoing Salesforce Aura data theft attacks — Salesforce is warning customers about hackers exploiting misconfigured Experience Cloud platforms to access unauthorized data, while ShinyHunters extortion gang claims to be actively exploiting a new vulnerability to steal data from Salesforce instances. — bleeping-computer
- FBI warns of phishing attacks impersonating US city, county officials — The FBI is warning of phishing campaigns where criminals impersonate U.S. city and county officials to target businesses and individuals requesting planning and zoning permits. — bleeping-computer
- Why Password Audits Miss the Accounts Attackers Actually Want — Specops Software highlights that traditional password audits focusing on complexity rules fail to address the actual security gaps attackers exploit, including breached passwords, orphaned user accounts, and service accounts. — bleeping-computer
- Russian military hackers revive advanced malware to spy on Ukraine, researchers say — Russian state-sponsored hacking group APT28 has redeployed advanced cyber-espionage malware targeting Ukrainian military personnel and other entities, according to ESET researchers. — the-record
- Kremlin hackers attempting to compromise Signal, WhatsApp accounts globally — Dutch intelligence warns that Russian state hackers are conducting a global campaign targeting Signal and WhatsApp accounts of government officials and military personnel. — the-record
- ‘InstallFix’ Attacks Spread Fake Claude Code Sites — New ‘InstallFix’ cyberattack campaign combines malvertising with ClickFix-style techniques to spread fake Claude AI coding assistant sites, exploiting risks in AI tools and command-line interfaces. — dark-reading
- Are We Ready for Auto Remediation With Agentic AI? — Analysis explores security team readiness for leveraging agentic AI for automated threat and exposure management, addressing the emerging era of AI-powered risk remediation. — dark-reading
- Chinese Cyber Threat Lurks In Critical Asian Sectors for Years — Chinese-speaking threat actor has maintained multi-year espionage operations against critical Asian sectors using custom malware, open source tools, and living-off-the-land binaries targeting both Windows and Linux systems. — dark-reading
- U.S. organizations should prepare for cyber retaliation as conflict with Iran escalates — Security expert James Turgal warns U.S. organizations to prepare for inevitable cyber retaliation as conflict with Iran escalates, emphasizing readiness over whether attacks will occur. — federal-news-network
- Inside the House’s pragmatic approach to zero trust — The House of Representatives is strengthening its cybersecurity posture through a pragmatic zero trust implementation strategy that prioritizes reassessing existing tools, achieving quick wins, and balancing security protection with user experience and budget limitations. — federal-news-network