
AI Code Scanning, Unified Data Controls, and Active APT Campaigns
Coverage: 06 Mar 2026 – 08 Mar 2026 (UTC)
< view all daily briefs >Preventive controls led the day. OpenAI introduced Codex Security, a research‑preview agent that scans codebases, validates findings in sandboxes, and proposes fixes, while Cloudflare expanded unified data protection from the endpoint to AI prompts through Cloudflare One. Alongside these platform moves, state‑aligned intrusion activity and fresh exploitation trends kept pressure on defenders, from persistent espionage operations to large‑scale data exposure.
Platform defenses converge on data and speed
OpenAI is positioning its research‑preview security agent to reduce noise in vulnerability discovery by building deep project context, validating issues against running systems, and generating targeted remediation proposals. In recent beta testing the tool analyzed over a million commits, flagging critical and high‑severity issues across well‑known open‑source projects. By pairing automated validation with model reasoning, the company reports a significant reduction in false positives—an emphasis on signal that teams often lack when scaling code review and secure‑by‑design practices.
Cloudflare advanced a data‑centric model that follows content wherever it moves. New capabilities in Cloudflare One include clipboard directionality controls for browser‑based RDP, endpoint DLP enforcement built into the client to protect clipboard operations, and API CASB visibility that now surfaces Microsoft 365 Copilot findings mapped to DLP profiles. Operation‑mapping now appears directly in logs, accelerating investigations and policy tuning. The intent is to close gaps “from the endpoint to the prompt,” unifying access, gateway DLP, CASB, and endpoint controls so sensitive information does not slip between tooling seams.
CrowdStrike focused on deployment speed. General availability of sensor‑native log collector onboarding in Falcon SIEM lets teams deliver and manage collectors via the existing Falcon sensor and a policy model—no separate distribution infrastructure required. Install status, artifacts, and service start events surface in Investigate, while Fleet Management centralizes health and configuration at scale. The company highlights both reduced rollout friction and governance consistency through existing RBAC and audit models. Why it matters: faster, policy‑driven onboarding brings telemetry online sooner, tightening detection loops as adversaries compress dwell time.
State‑backed intrusions span finance, telecom, and sensitive systems
Researchers tied to Broadcom reported that the Iran‑aligned cluster known as MuddyWater has maintained access in multiple corporate networks using a new Deno‑based backdoor, Dindoor, alongside a Python backdoor dubbed Fakeset. The campaign also attempted data exfiltration with Rclone to cloud storage and probed internet‑exposed cameras and intercom devices via known CVEs. The tooling overlap, certificate reuse, and disparate deployments point to a coordinated effort to persist and stage theft across targets. Details appear in MuddyWater.
In South America, a China‑linked cluster labeled UAT‑9244 targeted critical telecommunications infrastructure with three previously undocumented implants spanning Windows, Linux, and edge devices. The Windows backdoor TernDoor uses DLL side‑loading and process injection; PeerTime loads multi‑architecture payloads and can masquerade as benign processes while retrieving C2 data via BitTorrent; and BruteEntry builds an operational relay of compromised edge devices to brute‑force services and report successful logins. Cisco Talos associates the cluster with prior exploitation of outdated Windows Server and Exchange, enabling persistent access and lateral movement. Technical detail is summarized under UAT‑9244.
Separately, the FBI confirmed it is investigating a cybersecurity incident affecting systems used to manage surveillance and court‑authorized wiretap warrants, stating it identified and addressed suspicious activity but providing no further operational details. Reporting notes potential sensitivity if management systems were probed or compromised, and containment efforts are ongoing, per BleepingComputer. In the private sector, healthcare IT provider TriZetto disclosed a breach impacting 3,433,965 individuals, with exposed information varying by person and including identifiers such as SSNs and Medicare beneficiary IDs. The company is offering credit monitoring and says it strengthened cybersecurity controls following the incident; see TriZetto for specifics.
Exploitation trends and long‑haul espionage
Google’s Threat Intelligence Group counted 90 zero‑days exploited in the wild in 2025, with a record share targeting enterprise technology. Security and networking appliances featured prominently among enterprise‑focused flaws, while operating systems—particularly Windows—remained the most targeted end‑user products; mobile OS zero‑days also rose. Browser zero‑days, by contrast, dipped to a historical low, attributed to improved hardening and attacker operational security. Recommended countermeasures emphasize segmentation, least privilege, real‑time asset inventory, continuous monitoring, anomaly detection, and refined alerting to catch exploitation in progress, according to the GTIG analysis.
Palo Alto Networks’ Unit 42 detailed a multi‑year espionage cluster, CL‑UNK‑1068, targeting critical sectors across South, Southeast, and East Asia since at least 2020. The actors blend custom malware with modified open‑source tools and living‑off‑the‑land binaries, favor DLL side‑loading using legitimate Python binaries, and rely on tunneling for remote access. Collection focuses on credentials and high‑value configuration and database artifacts, with staging techniques that avoid direct uploads by printing encoded results through web shells. The report outlines behavioral detections—misuse of Python for side‑loading, unauthorized tunneling utilities, custom reconnaissance scripts—and suggests using analytics platforms and network defenses to detect and contain suspected compromises. Full technical appendices and IOCs appear in Unit 42.
Policy shifts and AI in adversary tradecraft
The administration’s new national cybersecurity strategy reframes cyberspace as a domain of national power and elevates offensive cyber operations to shape adversary behavior. It pairs a push for deregulation with calls to harden critical infrastructure, modernize federal networks, and deploy AI‑powered defenses, zero‑trust, and post‑quantum cryptography. Critics warn that rolling back mandatory standards could conflict with resilience goals, and implementation will hinge on forthcoming memoranda, sector guidance, and budgets, according to CSO Online.
On the threat side, Microsoft documents how adversaries now operationalize AI across reconnaissance, social engineering, infrastructure setup, malware development, and post‑compromise activity. Language models lower friction for persona fabrication, multilingual spear‑phishing, code generation and debugging, and rapid infrastructure provisioning; when safeguards block prompts, operators resort to jailbreaks. While most observed use remains decision support rather than fully autonomous operations, the report flags early experimentation with agentic workflows and AI‑enabled runtime adaptation, and it outlines governance and detection controls—identity vetting, anomaly monitoring, and AI‑aware protections—to blunt attacker scale and persistence. Guidance is consolidated in Microsoft TI.