Daily Cyber & AI Briefing with Michael Housch. This episode was published automatically and includes the assembled audio plus full transcript. TranscriptWelcome to today’s deep dive into the evolving world of cyber and AI risk. I’m Michael Housch, and over the next several minutes, we’re going to break down the latest threats, innovations, and strategic shifts shaping how organizations defend their assets, manage compliance, and adapt to a landscape that’s moving faster than ever. Let’s start by setting the stage. The cyber risk environment right now is defined by convergence—advanced threats, regulatory momentum, and rapid technological change are all colliding. Artificial intelligence is at the heart of this transformation, powering both new security tools and, unfortunately, new attack methods. On one side, we have defenders leveraging AI to spot and stop threats faster. On the other, attackers are using automation and machine learning to find vulnerabilities and scale their operations. It’s a high-stakes arms race, and the implications for businesses are profound. Today, we’ll cover a dozen of the most important developments, from mobile exploits and supply chain attacks to the rise of zero trust and sovereign AI frameworks. Along the way, I’ll share context and practical takeaways to help you navigate the shifting terrain. Let’s get started with the first headline. A new campaign by the threat actor TA446 is making waves in the mobile security world. They’re using what’s called the DarkSword exploit kit to target iPhone users. Now, exploit kits aren’t new, but what’s notable here is the focus on iOS—an ecosystem often considered more secure than most, but far from invulnerable. The DarkSword kit enables attackers to exploit vulnerabilities in iOS, potentially giving them full control over the device. That means attackers can exfiltrate data, install malicious apps, or use the device as a launchpad for further attacks inside an organization. For security leaders, this is a wake-up call. Mobile endpoints are everywhere—often less protected than laptops or servers, but just as connected to sensitive data and systems. If you’re responsible for enterprise security, it’s time to take a hard look at your mobile device management policies. Are your iOS devices being patched promptly? Is monitoring in place to catch unusual behavior? And does your incident response plan cover mobile-specific scenarios? The lesson here is clear: don’t let mobile become your weakest link. Staying on the theme of persistent threats, let’s talk about supply chain risk—specifically, open-source software dependencies. This week, a malicious version of the Telnyx Python SDK was discovered on PyPI, the Python Package Index. This backdoored package was designed to steal cloud credentials from anyone who installed it. For developers and organizations relying on open-source, this is a classic supply chain attack. The attacker doesn’t need to break into your systems directly—they just wait for you to invite them in by installing compromised software. The practical risk here is huge. Once cloud credentials are exfiltrated, attackers can access sensitive data, spin up resources, or even pivot to other targets in your environment. What can you do? First, reinforce your software supply chain controls. That means automated dependency scanning, verifying the provenance of code, and making sure credentials aren’t unnecessarily exposed in development environments. Credential hygiene is more important than ever—use secrets management tools, rotate keys regularly, and audit access to cloud services. Speaking of credentials, the problem of secrets sprawl continues to grow. A new report on the state of secrets sprawl in 2026 highlights just how pervasive this issue has become. Secrets sprawl refers to the unintentional exposure of credentials, API keys, and other sensitive information across codebases,