Infosec Scandal: Ex-L3Harris Exec's Zero-Day Exploit Sale to Russia (2026)

A Shocking Betrayal: Infosec Executive Sells Zero-Day Exploits to Russia, Sparking National Security Concerns

In a stunning revelation, the former General Manager of L3Harris’s cyber subsidiary, Trenchant, has been accused of selling eight zero-day exploit kits to Russia, according to a recent court filing. This case, which we initially reported in October 2025, took a dramatic turn last week when the US Department of Justice (DoJ) released a sentencing memorandum detailing the extent of Peter Williams’ alleged treachery. But here's where it gets even more alarming: the DoJ claims Williams’ actions not only betrayed his employer and the US government but also significantly compromised national security. And this is the part most people miss: the Russian broker Williams collaborated with reportedly supplied these exploits to the Russian government, potentially arming them with powerful tools to target anyone, anywhere in the world. This isn’t just a corporate scandal—it’s a geopolitical nightmare.

The DoJ’s memorandum paints a grim picture, stating that Williams’ conduct caused over $35 million in losses for L3Harris and Trenchant, further justifying the government’s push for the maximum sentence under federal guidelines. Williams faces up to 108 months (9 years) in prison, followed by three years of supervised release. As an Australian citizen, he’s agreed to deportation after serving his sentence. Additionally, the DoJ is seeking $35 million in restitution and the forfeiture of assets tied to his crimes. But here’s the controversial question: Did Williams act alone, or is this part of a larger pattern of insider threats in the cybersecurity industry? Let us know your thoughts in the comments.

Ransomware Gang Exposed as a Sham: Cybersecurity Researchers Unmask the Liars

In a bizarre twist, a ransomware group calling itself 0APT has been exposed as nothing more than a group of fraudsters. Cybersecurity researchers from GuidePoint Security have debunked their claims of attacking over 200 entities in late January, revealing that most alleged victims had absurd names like “Metropolis City Municipal.” As skepticism grew, 0APT’s data leak site briefly went offline before reappearing with a revised list of 15 high-profile targets. However, even these companies found no evidence of intrusion. And this is the part most people miss: GuidePoint suggests 0APT’s scam could be a double-edged sword—either to deceive cybercriminals into buying non-existent tools or to trick organizations into paying ransoms out of fear. So, if 0APT claims to have targeted your organization, chances are they’re lying. But it’s still worth reviewing your logs, just in case.

Ransomware Attack Disrupts Payments Nationwide, Leaving Residents in Limbo

A ransomware attack on BridgePay, a payment service provider for local governments and utilities, has left thousands of Americans scrambling to pay their bills. Since February 6, BridgePay has been offline, with restoration efforts expected to take another week. While the company claims no payment information was compromised, the full scope of the attack remains unclear. Cities like Frisco, Texas, have suspended late fees and shutoffs, but others, like Palm Bay, Florida, are advising residents to pay in person. But here’s where it gets controversial: Are payment service providers doing enough to safeguard their systems, or are they leaving the door open for cybercriminals? Share your opinions below.

Quick Hits in Infosec:
- Telcos Mum on China’s Salt Typhoon Attacks: Telecommunications companies remain tight-lipped about their response to China’s Salt Typhoon cyberattacks. What are they hiding?
- Open-Source AI: A Ticking Time Bomb? Researchers warn that open-source AI could become a global security threat. Is innovation worth the risk?
- Pwn2Own Automotive 2026 Uncovers 76 Zero-Days: The event paid out over $1 million for identifying critical vulnerabilities. But who’s really benefiting from these discoveries?
- Mandiant’s Credential Cracker Accelerates Protocol’s Demise: A new tool aims to kill off a flawed protocol. Is this the end of an era in cybersecurity?

Polish Police Arrest Hacker Targeting Critical Infrastructure

In a swift operation, Polish cyber police arrested a suspect accused of attacking a water and sewage infrastructure operator. The Central Bureau for Combatting Cybercrime (CBZC) revealed that the hacker gained unauthorized access, stole data, and posted it on the dark web. Authorities successfully deleted the stolen data and made the arrest in Poznań. But here’s the controversial question: As critical infrastructure becomes increasingly digitized, are we doing enough to protect it from cyber threats? Let us know your thoughts.

Google’s Wiz Acquisition Cleared by EU: A Game-Changer for Cloud Security?

Google’s $32 billion acquisition of cloud security firm Wiz has been given the green light by the EU, marking its most expensive deal to date. The European Commission argued that the acquisition wouldn’t stifle competition, given the presence of rivals like AWS and Azure. And this is the part most people miss: This deal could reshape the cloud security landscape, but at what cost to smaller players in the market? Is Google’s dominance a cause for concern? Share your views in the comments.

Infosec Scandal: Ex-L3Harris Exec's Zero-Day Exploit Sale to Russia (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 6114

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.