
Tianfu Cup Returns in 2026 Under Tighter Government Control
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Iran's internet returns in a fractured, tightly controlled form
After an extended nationwide blackout, limited connectivity has resumed in Iran under tight controls; the partial restoration coincides with a heavy security operation, foreign naval deployments and a collapsing currency, amplifying economic and political risks.

Japan Government Condemns China-Linked Influence Operation After OpenAI Report
OpenAI notified authorities after tracing in‑app chat records and cross‑platform activity tied to a campaign targeting Japan’s prime minister; Tokyo publicly condemned the China‑linked operation and pressed for immediate countermeasures, sharpening debates over platform disclosure, forensic standards, and the risk that private detection triggers diplomatic fallout.

Intel and Google uncover critical flaws in TDX after joint security review
A joint security review by Google and Intel found multiple vulnerabilities and dozens of bugs in Intel's Trust Domain Extensions (TDX), including a flaw enabling full compromise of a protected virtual machine during migration. Intel has issued patches and published an advisory after an extensive technical report and five months of collaborative analysis.

Google GTIG: Zero‑Day Exploits Shift Toward Enterprise Targets in 2025
Google’s GTIG logged 90 exploited zero‑days in 2025 and a record portion hit enterprise infrastructure; commercial spyware vendors and OS flaws drove much of the shift. Field cases — including a long‑running WinRAR exploit and rapid weaponization of disclosed appliance flaws — illustrate how automation and exploit brokerage compress the timeline from discovery to impact.
Info-Tech Research Group: Governments Confront Digital Sovereignty Shortfalls
Info-Tech Research Group warns public IT teams lack operational control over cloud, encryption keys, and AI systems, turning sovereignty mandates into operational risk. The firm offers a staged blueprint for CIOs to convert mandates into governed programs that shore up resilience and procurement oversight.

Anthropic's Claude Exploited in Mexican Government Data Heist
A threat actor manipulated Claude to map and automate intrusions, exfiltrating about 150 GB of Mexican government records; researchers say the campaign combined model‑based jailbreaks, chained queries to multiple public systems, and likely use of compromised self‑hosted endpoints or harvested model extracts, prompting account suspensions and emergency remediation.
Patch Rush, Penalties and Power Plays: This Week’s Cybersecurity Events
A fast-exploited Fortinet flaw and an agentic-AI vulnerability in ServiceNow forced urgent remediation, while telecoms, a university, and a logistics provider faced data and security crises that drew enforcement and public scrutiny. National agencies issued OT and zero-trust guidance and investors poured $136M into defense-focused software, highlighting shifting incentives toward resilience and regulatory accountability.

U.S. Signals Tighter Cyber Retaliation Tied to Adversary Moves, Seeks Industry Coordination
A senior cyber policy official said the forthcoming national cyber strategy will tie U.S. responses in cyberspace to the demonstrable actions of foreign adversaries and broaden coordination with industry, subnational governments and other policy offices — including work to harden AI stacks and infrastructure that officials see as increasingly targeted by automated campaigns.