Is this email difficult to read? View it in a web browser. ›

The Wall Street Journal ProThe Wall Street Journal Pro

CybersecurityCybersecurity

Sponsored by Zscaler logo.

China’s Cyber Spies Target Western Defense Industry, Dutch Intel Chief Says

By Kim S. Nash

 

Hello. China’s cyber-espionage capabilities are now as sophisticated as the U.S.’s and are increasingly targeting Western defense industries, said the head of Dutch military intelligence.

Dutch Vice Adm. Peter Reesink made the comments after his agency, known in Dutch as MIVD, released an annual report Tuesday that said Beijing is a growing threat to Europe alongside Russia and that the two countries’ cooperation compounds the danger. Read the full WSJ story.

More news: 

  • Navy tells sailors to lock down their smartphones amid Iran war
  • Lawmakers weigh labeling some cyberattacks 'terrorism'
  • Major Pizza Hut franchise hacked
  • Chasing down unknown AI agents
  • And more
 

‏‏‎ ‎

CONTENT FROM: ZSCALER
AI Breaches in Minutes? Eliminate Your Attack Surface

Frontier AI models like Anthropic’s Mythos can compress breach timelines to minutes. The best defense is to remove what attackers can see. Zscaler helps you take critical apps off the public internet, give access only to the right people, and reduce business risk thus limiting disruption and protecting uptime. Don't wait for the breach, eliminate your attack surface today.

Read the report

 

More Cyber News

PHOTO: U.S. NAVY

Adversaries are targeting U.S. sailors online with hacking attempts and psychological operations in response to the Iran war, Navy officials said. (Task and Purpose)

  • Sailors should turn off location tracking, cameras and microphones and set phones to the highest privacy levels, a Navy directive​ on threat awareness and cyber hygiene said.
  • The memo also recommended deleting personal information that surfaces in Google searches.

When is a cyberattack an act of terrorism? Ransomware and other hacks against hospitals should be viewed as terrorism and carry murder charges, if warranted, Cynthia Kaiser, head of Halcyon's ransomware research center, told a House hearing Tuesday. The hearing discussed ways to boost punishments for convicted hackers. (CyberScoop)

  • Related reading from WSJ Pro: The Treasury Department is taking public comments about updating the Terrorism Risk Insurance Program to include, “cyber-related losses arising from acts of terrorism,” among other revisions.
 
Alt text.

Cybersecurity Braces for AI ‘Bugmaggedon’

AI models like Anthropic's Mythos are finding software bugs at an unprecedented rate, kicking off a cybersecurity scramble to prevent what experts are calling “bugmageddon.”

Listen Now
 

The top U.S. cyber agency doesn't have access to Anthropic's Mythos... The Cybersecurity and Infrastructure Security Agency has received a briefing about the powerful AI model but hasn't been able to test it hands-on. (Axios)

...but unauthorized users do, Bloomberg reported, citing a person familiar with the matter associated with a third-party company doing business with Anthropic. A small group of people connected on Discord is using Mythos without permission, the person said.

  • Anthropic gave a preview version of Mythos to a limited number of companies, including Amazon, CrowdStrike, Microsoft and Palo Alto Networks, among others. (WSJ)

PHOTO: SCOTT OLSON

/GETTY IMAGES

Major Pizza Hut franchise operator Restaurant Management Company of Wichita is notifying 120,426 current and former employees of an October 2025 cyberattack that exposed personal data.

  • Bank account numbers, health insurance information, Social Security numbers and other details were breached, the company's law firm said.
82%

Percentage of 418 responses from tech and security professionals who said they found unknown AI agents in their infrastructure in the past year, according to research from the Cloud Security Alliance and Token Security.

 

About Us

The WSJ Pro Cybersecurity team is Deputy Bureau Chief Kim S. Nash and reporters Angus Loten and James Rundle. Follow us on X @WSJCyber. Reach the team by replying to any newsletter you receive or by emailing Kim at kim.nash@wsj.com.

 
Share this email with a friend.
Forward ›
Forwarded this email by a friend?
Sign Up Here ›
 
Desktop, tablet and mobile. Desktop, tablet and mobile.
Access WSJ‌.com and our mobile apps. Subscribe
Apple app store icon. Google app store icon.
Unsubscribe   |    Newsletters & Alerts   |    Contact Us   |    Privacy Notice   |    Cookie Notice
Dow Jones & Company, Inc. 4300 U.S. Ro‌ute 1 No‌rth Monm‌outh Junc‌tion, N‌J 088‌52
You are currently subscribed as [email address suppressed]. For further assistance, please contact Customer Service at pro‌newsletter@dowjones.com or 1-87‌7-975-6246.
Copyright 2026 Dow Jones & Company, Inc.   |   All Rights Reserved.
Unsubscribe