- Comparitech Stack Report
- Posts
- US strengthening cybersecurity cooperation with international partners
US strengthening cybersecurity cooperation with international partners

⚡ Weekend Threat Brief

We analyzed more than 100 popular Android dating apps to understand what data they request and how their privacy policies describe it. On average, each app asks for over 30 permissions, including high-risk access such as camera, microphone and precise location. Many policies lacked clear details on data use, retention periods or deletion processes, and 24 apps were flagged for potentially not meeting Google’s privacy standards. Tracking technologies were widespread, with most apps including multiple data trackers. The study highlights the privacy trade-offs users make when they swipe and match.
Takeaway:
Most dating apps request many permissions, including potentially sensitive ones.
Data retention and deletion details are often missing in policies.
Many apps include multiple third-party trackers.
A number of apps may not comply with Google Play’s privacy requirements.
There’s a reason mobile home parks are getting so much institutional love.
They remain one of the key affordable-housing sources nationally, have limited supply and high tenant retention (10-12Y). Investors can see tremendous upside with professionally-managed MHP portfolios such as Vintage Capital’s, which targets a 15-17% IRR and makes monthly distributions. Invest directly in individual deals or via a 10+ property fund. 1031s also available.
🎯 Tactical Playbook
Cybersecurity Partnership Between the U.S. and Allies
The United States is strengthening cybersecurity cooperation with international partners to counter rising threats from state-sponsored actors and organised cybercrime. This approach includes shared threat intelligence, joint incident response exercises, and harmonised policy frameworks. The goal is to enhance resilience against ransomware, supply chain attacks and critical infrastructure breaches by pooling expertise and resources. Collaborative efforts also help smaller nations boost their cyber defences and accelerate adoption of best practices.
Key Takeaway:
Cross-border partnerships improve collective response to complex cyberattacks.
Shared intelligence helps anticipate and mitigate threats faster.
Joint exercises support preparedness and coordination among nations.
🛡️ Research Watch
China’s Amended Cybersecurity Law Takes Effect
China’s updated Cybersecurity Law came into effect on January 1, 2026, marking the first major update since the law was first enacted. The amendments expand enforcement powers, raise penalties for cybersecurity violations and broaden the scope of liabilities for network operators. They introduce stronger oversight on the use of network products that affect national security and extend legal oversight beyond China’s borders for activities that threaten cybersecurity. Support mechanisms for AI research and infrastructure were also added. These changes reflect China’s push to reinforce its regulatory framework amid evolving technological risks.
🧩 Tool Tip of the Week
ManageEngine RecoveryManager Plus
For organizations protecting Microsoft Azure environments, ManageEngine RecoveryManager Plus is a strong backup and restore solution that simplifies data protection. It helps IT teams schedule consistent backups of key Azure workloads and restores data quickly when needed. The tool offers automated backup policies, granular recovery options and centralized reporting to reduce the burden on administrators.
Tips:
Automate backups across Azure resources to avoid manual gaps.
Use granular restores to recover specific files, folders or objects without full system rollback.
Central dashboards make it easy to monitor compliance and backup health.
🗣️ Community Signal
Real-time risk analysis and supply chain optimization are two examples of the strong capabilities that may be achieved through the combination of artificial intelligence, quantum computing, fifth-generation wireless networks, and the internet of things. However, this combination significantly expands the attack surface. Chuck Brooks, Cybersecurity Expert.
🗳️ Your Take - The Results

|
Until Monday’s edition - Let’s keep that zero-day count at zero!