Risk and Resilience Podcast: This weeks new episode is out and go and watch and like and subscribe.

Executive Update: Critical Alert: OpenClaw AI Agent Poses Major Security Risk to Global Organizations

China's National Computer Network Emergency Response Technical Team (CNCERT) issued a second warning on March 10-11, 2026, about critical security risks in OpenClaw, an AI agent software that automates business tasks like email management, report writing, and presentation creation. Despite known vulnerabilities, organizations globally are rapidly deploying OpenClaw without adequate security controls, with Chinese government agencies and cloud service providers leading the adoption frenzy. CNCERT's escalating warnings signal that improper deployment is creating severe security exposure across organizations unprepared to manage the software's elevated system permissions and autonomous execution capabilities.

The primary risks stem from OpenClaw's need for high-level permissions to function autonomously, creating multiple attack vectors: attackers can inject malicious code through webpages to steal system credentials and keys, the agent may misinterpret commands and unintentionally delete critical business data, and widespread misconfiguration by cloud providers deploying the software without security hardening. For organizations currently using or evaluating OpenClaw, immediate security assessment and implementation of strict access controls is critical—or deferral of deployment until the vendor addresses known vulnerabilities.

Risks identified

  • Prompt injection attacks can trick OpenClaw into leaking system credentials and keys to attackers

  • Compromised system credentials enable lateral movement and access to broader IT infrastructure

  • Autonomous execution permissions expand the attack surface beyond typical software deployments

  • Potential for large-scale data exfiltration once system is compromised

  • Misinterpreted commands cause unintended deletion of critical business emails and files

  • Accidental data loss creates business continuity disruption requiring extensive recovery efforts

💻 Malware and Vulnerabilities

Google Fixed Two New Actively Exploited Flaws in Chrome Browser: Google released emergency patches for two high-severity zero-day vulnerabilities in Chrome—CVE-2026-3909 affecting the Skia graphics library and CVE-2026-3910 in the V8 JavaScript engine—both confirmed as being actively exploited by threat actors in real-world attacks. https://securityaffairs.com/189373/hacking/google-fixed-two-new-actively-exploited-flaws-in-the-chrome-browser.html

'CrackArmor' Vulnerability in AppArmor Impacts 12.6M Linux Systems: Security researchers identified a critical vulnerability in AppArmor Linux security framework that potentially affects millions of systems, allowing privilege escalation and unauthorized access. https://www.linux-related-security-advisory

SQL Injection Vulnerability in Ally WordPress Plugin Exposes 200K+ Sites: A dangerous SQL injection flaw discovered in the popular Ally WordPress plugin put over 200,000 websites at risk of data theft and code execution until patches were released. https://www.wordpress-security-advisory

📈 Breaches and Incidents

DOGE Employee Allegedly Stole Social Security Data on Thumb Drive: A whistleblower complaint alleges that a former Department of Government Efficiency employee accessed two highly sensitive Social Security Administration databases containing information on over 500 million Americans and stored data on a personal thumb drive, with the agency's inspector general investigating the claims. https://techcrunch.com/2026/03/doge-employee-stole-social-security-data-and-put-it-on-a-thumb-drive-report-says/

FBI Investigates Hack of Its Own Surveillance Network: Federal authorities revealed that hackers breached the FBI's Digital Collection System Network, a sensitive platform used to manage wiretaps and intelligence surveillance warrants, with investigators suspecting Chinese government involvement and a vendor's internet service provider as the entry point. https://www.reuters.com/

Loblaw Investigating Data Breach After Detecting Suspicious Activity: Canada's largest food and pharmacy retailer discovered unauthorized access to a contained, non-critical portion of its IT network with attackers obtaining basic customer information including names, phone numbers, and email addresses, though passwords and financial data remained secure. https://www.cp24.com/news/canada/2026/03/10/loblaw-investigates-data-breach/

Starbucks Data Breach Impacts 889 Employees: Starbucks disclosed that phishing attacks targeting fake Partner Central employee portal websites compromised 889 employee accounts between January and February, exposing personal information including Social Security numbers and financial account details. https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/

🚨 Threat Intel & Info Sharing

UK Financial Sector Identifies 29 Significant Threats to Operational Resilience: The Cross Market Operational Resilience Group's 2025 survey of 25 UK financial firms revealed that nation-state cyber-attacks, disruptions to third parties, and technological failures represent the highest short-term threats, with AI amplifying existing attack types through increased scale and precision. https://www.cmorg.org.uk/sites/default/files/2026-03/CMORG%20-%20Threat%20Monitoring%20-%20Report%20Highlights%20-%20FEBRUARY%202026%20-%20.pdf

Iran-Backed Hackers Launch Devastating Wiper Attack on Medical Device Giant Stryker: The Iran-linked Handala group claimed responsibility for wiping over 200,000 systems across 79 countries at Stryker, apparently accessing the company's Microsoft Intune management console and executing remote wipe commands in what officials describe as retaliation for a U.S. missile strike. https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/

Poland Investigates Iran Links Behind Attempted Nuclear Facility Cyberattack: Polish authorities foiled a cyberattack targeting the National Centre for Nuclear Research with preliminary evidence suggesting Iranian origin, though officials cautioned that indicators could be deliberate misdirection. https://www.politico.com/article

Email Fraud Scams South Carolina County Out of $1.5M: Laurens County fell victim to a sophisticated business email compromise attack when cyber criminals impersonated a contractor and sent fraudulent payment instructions, resulting in four wire transfers totaling $1,558,288 before discovery. https://www.postandcourier.com/greenville/news/laurens-county-scam-cyberattack-fake-contractor/article_e40d1c87-910b-4c31-9522-fd42b797c0e4.html

Real-Time Banking Trojan PixRevolution Hijacks Brazil's Pix Payments: Researchers identified PixRevolution, an Android trojan that uses human or AI operators to watch victim screens in real-time, intercepting Pix payment confirmations and redirecting funds by replacing the intended recipient's key moments before transfer completion. https://www.darkreading.com/application-security/real-time-banking-trojan-strikes-brazil's-pix-users

Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026: The social media giant announced plans to discontinue encrypted messaging on Instagram, citing the need for stronger content moderation against illegal activities and child exploitation. https://meta.com/instagram-e2e-encrypted-chat-shutdown

Fake Government and Starlink Apps Used in Malware Campaign Targeting Brazil: Cyber criminals created convincing counterfeit applications impersonating official government and Starlink services to distribute malware across Brazil. https://therecord.media/fake-government-starlink-apps-malware-brazil

Feds Say DigitalMint Negotiator Ran Ransomware Attacks, Extorted $75 Million: Federal authorities revealed that another DigitalMint facilitator participated in running ransomware operations that extracted $75 million from victims as part of a broader investigation into cryptocurrency exchange involvement in cybercrime. https://www.cyberscoop.io/digitalmint-ransomware-extortion

ShinyHunters Hackers Threaten 400 Firms Over Stolen Salesforce Data: The ShinyHunters group announced plans to sell confidential data from approximately 400 companies obtained through compromised Salesforce instances, demanding payment or threatening public release. https://www.bleepingcomputer.com/news/shinyhunters-400-firms-stolen-salesforce-data

Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos: Security researchers noted that misleading proof-of-concept exploits for critical Cisco Catalyst SD-WAN vulnerabilities have created confusion in the threat landscape, with some fake PoCs circulating alongside genuine exploitation of the flaws being leveraged by threat actors since 2023. https://www.darkreading.com/vulnerabilities-threats/fake-pocs-risks-cisco-sd-wan

⚖️ Laws, Policies and Regulations

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime Operation: International law enforcement disrupted a significant cybercriminal network, taking down tens of thousands of malicious IP addresses and arresting 94 individuals involved in distributed denial-of-service attacks and other cyber operations. https://www.interpol.int/

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed: The U.S. Cybersecurity and Infrastructure Security Agency warned of a critical remote code execution vulnerability in the n8n automation platform with thousands of exposed instances still vulnerable to attack. https://www.cisa.gov/

Taiwan Indicts 62 Linked to Alleged Scam Center in Cambodia: Taiwanese authorities charged 62 individuals suspected of operating a sophisticated online fraud center in Cambodia that targeted victims across Asia with investment and romance scams coordinated through encrypted messaging platforms. https://www.taiwan-justice-ministry

Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy: A Russian national pleaded guilty in Maryland federal court to operating ransomware infrastructure that extorted millions from victims, marking another enforcement success in the ongoing campaign against transnational cybercriminals. https://www.justice.gov/usao-md/

China Issues Second Warning on OpenClaw Risks Amid Adoption Frenzy: Chinese authorities issued a second advisory about security risks associated with OpenClaw, an AI agent framework that enterprises are rapidly adopting without fully understanding potential vulnerabilities and data exposure implications. https://www.scmp.com/

Cyber National Mission Force to Get New Commander Amid Leadership Turnover: U.S. military's offensive cyber warfare command announced a change in leadership as part of broader organizational restructuring within the Cyber National Mission Force. https://therecord.media/

FBI Searches of Americans' Data Increased Significantly Last Year: A new analysis revealed that the FBI significantly expanded its domestic surveillance activities, with searches of Americans' digital communications increasing substantially year-over-year as the bureau continues its counterintelligence operations. https://therecord.media/exclusive-new-data-shows-increase-in-fbi-searches-of-americans-data-last-year/

💾 The Privacy Posts

Click to Opt Out: Regulators Are Now Auditing “Choice Integrity”

  • California is signaling that compliance is not just having an opt-out link, it is whether choices actually work, account-wide, with minimal friction.

  • France just reinforced that adtech consent and transparency failures can still carry headline-level consequences years later.

  • The FTC is keeping subscription cancellation mechanics in the spotlight, and the spillover effect is higher expectations for low-friction consent and preference controls.

California privacy enforcement continues to mature from “notice-and-opt-out” into execution quality, meaning how easy, consistent, and account-wide your choices are, not just whether a link exists. A recent reference point that is still shaping conversations this week is the California AG’s Disney settlement, which paired a monetary penalty with injunctive relief aimed at making opt-outs consumer-friendly and actually honored across Disney streaming services tied to the same account. The compliance subtext is blunt: fragmented preference handling across products, devices, or logged-in states is increasingly treated as a failure to respect user choice. That matters for personal data because “do not sell or share” is not a preference you can safely implement as a single front-end button; it is an identity and data-flow problem that has to propagate through adtech, sharing partners, and internal systems.

In France, the Conseil d’État decision upholding the CNIL’s 40 million euro fine against Criteo keeps pressure on adtech to prove that consent, transparency, and rights handling are real, not rhetorical. The takeaway is less about any single company and more about the standard being enforced: if people cannot understand what is happening with their data or exercise rights cleanly, regulators are willing to call it a core compliance issue. And in the US, even when the FTC is not speaking “privacy,” its recent move seeking public comment on negative option marketing signals a continued focus on choice journeys that are easy to enter and hard to exit, a pattern that maps directly onto consent UX debates. In practice, this is dark-patterns-adjacent pressure that raises the bar for consent, preference centers, and cancellation-style flows: fewer steps, clearer language, and less opportunity to stall or fragment user intent.

Over the past few years, these developments are strongly aligned with a broader regulatory shift: moving from “disclose it somewhere” toward “make the choice real, durable, and easy to execute.” The consistent direction of travel is that friction and inconsistency are no longer treated as mere UX quirks; they are increasingly treated as evidence that consumer choice is not being respected in practice.

Sources (APA style)

Federal Trade Commission. (2026, March 11). Press releases (Negative option marketing-related update). https://www.ftc.gov/news-events/news/press-releases

Federal Trade Commission. (n.d.). Negative option rule. https://www.ftc.gov/legal-library/browse/rules/negative-option-rule

Conseil d’État. (2026, March 4). Décision n° 482872 (upholding CNIL sanction regarding Criteo). https://www.conseil-etat.fr/fr/arianeweb/CE/decision/2026-03-04/482872

WilmerHale. (2026, March 9). California Attorney General announces largest CCPA settlement (discussion of Disney settlement). https://www.wilmerhale.com/en/insights/blogs/wilmerhale-privacy-and-cybersecurity-law/20260309-california-attorney-general-announces-largest-ccpa-settlement

France's National Agency for Information Systems Security (ANSSI) released its 2025 Cyber Threat Panorama, revealing that France continues to face relentless cyberattacks from both state-sponsored actors and cybercriminals. The report documents 3,586 security events processed by ANSSI during 2025, representing an 18% decrease from 2024 - largely attributable to a spike in incidents during the Paris Olympics and Paralympics (May-August 2024). Within the 3,586 events, 2,209 were classified as reports and 1,366 as confirmed incidents.

Key threat sectors targeted: Education and research (34%), government ministries and local authorities (24%), healthcare (10%), and telecommunications (9%).

Key highlights of the report:

  • 3,586 security events handled by ANSSI in 2025 (18% decrease from 2024, largely due to Olympics-related spike in 2024)

  • Russia and China remain the primary state-sponsored threat actors targeting France for espionage and infrastructure sabotage

  • 18% rise in cybercriminal activity, with significant increases in data exfiltration incidents

  • Critical finding: Growing convergence between state-sponsored actors and cybercriminals, making attribution increasingly difficult

  • Top targeted sectors: Education/Research (34%), Government/Local Authorities (24%), Healthcare (10%), Telecommunications (9%)

  • Regulatory progress: NIS 2 Directive and Cyber Resilience Act implementation underway to strengthen European cybersecurity posture

  • Warning: Director warns of potential escalation to "hybrid attacks" (combining cyber + physical sabotage) by 2030, citing Polish electrical grid attacks as a warning signal

Link to Report

📅 Upcoming Events

We are looking for sponsors for our 2026 events.

If you would like to sponsor any of our future in person or virtual events then please email us on [email protected]

We hope you enjoyed our email briefing! ☕🥮If you want to sponsor our next edition or advertise on our site, drop us an email [email protected].

Thank you for being a part of our newsletter community and you can be part of the community by joining our LinkedIn Group.

Keep Reading