Category: 3. Business

  • Stocks Climb on Solid Data as Global Tensions Cool: Markets Wrap

    Stocks Climb on Solid Data as Global Tensions Cool: Markets Wrap

    (Bloomberg) — The cooling of geopolitical tensions, a rally in big tech and solid economic data fueled gains in stocks, with the market remaining higher after an in-line inflation report. Short-dated bonds fell.

    Equities rose around the world, with the S&P 500 up almost 1%. Tech megacaps rallied as comments by Nvidia Corp.’s chief Jensen Huang bolstered the artificial-intelligence trade. Small caps beat the US equity benchmark for a 14th straight session. JPMorgan Chase & Co. pared gains as President Donald Trump sued the lender and its head Jamie Dimon over alleged debanking.

    Treasury two-year yields headed toward their highest since early December as strong economic data reinforced the argument for the Federal Reserve to keep rates on hold.

    The US economy expanded in the third quarter by slightly more than initially reported, supported by stronger exports and smaller drag from inventories. Initial jobless claims steadied at 200,000 last week. And personal spending rose at a solid pace in November, underscoring consumer resilience.

    “US consumers continue to underpin the economy,” said Lale Akoner at eToro. “Resilient spending lowers near-term recession risk and supports corporate revenues, particularly in consumer-facing sectors. However, steady demand also means interest rates are likely to stay higher for longer.”

    Meantime, European Union lawmakers are expected to vote on ratifying the bloc’s trade deal with the US, restarting the process after Trump walked back his latest threat to impose tariffs on European allies that opposed his plans to annex Greenland. The island’s prime minister says he’s willing to go further in increasing defense, including agreeing on a permanent NATO mission.

    “This episode once again highlights how headline-driven the market remains, and how quickly sentiment can flip when geopolitical risk is dialed back,” said Fawad Razaqzada at Forex.com.

    The S&P 500 rose 0.8%. A gauge of the “Magnificent Seven” shares climbed 2.3%. The Russell 2000 index of small firms hit a fresh record. A key measure of stock volatility — the VIX — tumbled to around 15.

    The yield on 10-year Treasuries was little changed at 4.25%. The dollar lost 0.3%. Oil sank as Ukrainian President Volodymyr Zelenskiy discussed plans for trilateral meetings with the US and Russia. Gold rose to all-time highs.

    The latest data should reassure the Fed that the economy remains on a solid footing, despite a cooler labor market, said James McCann at Edward Jones.

    “There looks to be little urgency to cut rates at next week’s meeting, and the central bank could stay on hold for longer should growth remain robust into 2026 and inflation continue to run at above target rates,” he added.

    Inflation-adjusted gross domestic product increased at a revised 4.4% annualized rate, the fastest in two years. The Fed’s preferred measure of underlying inflation rose 0.2% in November from the prior month and 2.8% from a year earlier. The core personal consumption expenditure’s price index picked up slightly from October on an annual basis.

    “This is likely going to keep the Fed on pause for a few a months, at least until we get a new Fed Chair who will likely push for renewed cuts,” said Sonu Varghese at Carson Group.

    This set of new data reinforces the view that the US is experiencing stronger — not hotter — growth, according to Marco Casiraghi at Evercore.

    “If macro conditions continue to evolve in this favorable manner, we think the Fed will keep rates on hold before delivering a cut in June – when the new Fed chair will take over,” and then cut two more times in the second half of 2026, he said.

    Recent data support the Fed adopting a cautious approach to policy changes in the near term, according to Oscar Munoz and Gennadiy Goldberg at TD Securities.

    “There is now a higher burden on the data to justify further easing,” they said.

    The TD strategists expect policymakers to keep rates on hold at 3.50%-3.75%. While Fed Chair Jerome Powell is likely to sound noncommittal around near-term rate cuts, they expect him to remind markets that the median Fed official still looks for easing this year.

    “Fundamentals are good and the Fed is likely to cut two or three times this year,” said Scott Helfstein at Global X. “That continues to set up a favorable backdrop even if the calm is occasionally disrupted by geopolitical volatility.”

    Speculation that Europe could leverage US assets to retaliate against Trump’s bid for Greenland has been the chatter on trading floors and at the Davos gathering this week. Greenland’s pension fund is mulling whether it should continue investing in US stocks, in what its chief executive says would be a symbolic stand against the push to seize control of the island.

    Trump vowed “big retaliation” if European countries sell US assets in response to his tariff threats related to Greenland, adding pressure on them to stick with an emerging deal over the future of the island.

    “If they do, they do. But you know, if that would happen, there would be a big retaliation on our part,” Trump said during a Fox Business interview at the World Economic Forum in Davos. “And we have all the cards.”

    Meantime, the dollar retained its supremacy in global trade despite the persistent uncertainty associated with Trump’s policies.

    The greenback’s portion of international transactions rose to 50.5% in December, up from 46.8% a month earlier, according to the latest data compiled by global financial messaging service Swift, or the Society for Worldwide Interbank Financial Telecommunication. That’s the highest share since 2023 when the Belgium-headquartered consortium revised how it collects the transaction data.

    There’s little sign of foreign investors shunning US equities and bonds amid tensions surrounding the Trump administration’s stance toward Greenland, according to JPMorgan strategists including Nikolaos Panigirtzoglou.

    “Greenland is likely to stay in the headlines in the near term, and markets remain susceptible to fresh political or geopolitical developments,” said Ulrike Hoffmann-Burchardi at UBS Global Wealth Management. “But the latest stock rebound serves as a reminder that favorable fundamentals remain in the driver’s seat.”

    She maintains the view that staying invested via a diversified portfolio remains the most effective way to manage market uncertainty.

    Geopolitics only truly affect stock prices when they have direct effects on the factors that truly influence equity valuations, according to Steve Sosnick at Interactive Brokers.

    “Unless one can draw a straight line between the global event and the revenues, earnings, or cash flows of a particular company or sector – the items that directly affect the value of a company – then geopolitics can be considered ‘background noise’ from a market viewpoint, no matter how newsworthy the events,” he said.

    Companies from around the world remain focused on American markets, driven by the money they’re getting out of the US, Nasdaq Inc. Chief Executive Officer Adena Friedman said.

    “The investment firms are obligated to find the best returns,” Friedman told Bloomberg Television in Davos. There’s been a $3 trillion increase in equity flows into the US from foreign investors in the past year, she said. “We just have to continue to drive those outsize returns within our economy to continue the flows coming in.”

    BlackRock Inc. Chief Executive Officer Larry Fink said there is no bubble in artificial intelligence, emphasizing the volume of investment needed to develop the technology.

    “I don’t think there is any uncertainty about AI,” Fink said in a Bloomberg Television interview on the sidelines of the World Economic Forum. “I sincerely believe there is no bubble in the AI space.”

    With small-caps are outperforming large-caps yet again, there is a clear shift in leadership underway, noted Jonathan Krinsky at BTIG.

    “While there will be pullbacks, we want to stick on the side of this new trend which is still in its early days, in our view,” he said.

    Retail investors shelled out an “impressive” $12.9 billion on equities this week, according to JPMorgan strategist Arun Jain. On Tuesday, retail investors had responded to geopolitical developments by purchasing stocks, marking the third-largest single-day buying event in a year, he noted.

    Meantime, trend-following funds are starting 2026 with fresh momentum, outperforming stocks and bonds after a year of false starts.

    A Societe Generale index tracking major trend-following funds has climbed almost 4% in the opening weeks of the year, the second-strongest start on record in data going back to 2000. The performance follows a rally in metals, a weakening yen and resilient global equities, just the kind of sustained price moves these strategies need to deliver returns.

    Despite the fact that growth stocks are negative year-to-date, momentum names are doing well, noted Louis Navellier at Navellier & Associates.

    “The broadening of returns is a positive development, and the strength of smaller companies is a major vote of confidence in broad economic growth and reflects the expectation of lower interest rates, which is more meaningful for smaller companies,” he concluded.

    Corporate Highlights:

    Tesla Inc. will probably sell its Optimus robots to the public by the end of next year, according to Chief Executive Officer Elon Musk, who’s said the carmaker’s fortunes will be increasingly dependent on humanoid machines. SpaceX has lined up four banks to lead its initial public offering, according to people familiar with the matter, as Musk’s rocket and satellite firm moves forward with plans for the biggest-ever listing. Apple Inc. has expanded the job of hardware chief John Ternus to include design work, solidifying his status as a leading contender to eventually succeed Chief Executive Officer Tim Cook. Alphabet Inc.’s Google is rolling out a new option to personalize search results by tapping user data from the tech giant’s other applications, its latest bid to keep ahead of competition from the likes of OpenAI. Alibaba Group Holding Ltd. is preparing to list its chipmaking arm, tapping strong investor interest in the small circle of companies aspiring to compete with Nvidia Corp. in the hot AI accelerator business. Netflix Inc. co-Chief Executive Officer Ted Sarandos is planning to testify in February at a US Senate committee hearing looking into his company’s proposed $82.7 billion purchase of the streaming and studio operations of Warner Bros. Discovery Inc. Paramount Skydance Corp. again extended its tender offer for Warner Bros. Discovery Inc. shares and said it would ask investors to vote against a proposed sale to Netflix Inc. at a special meeting of Warner Bros. shareholders. Bank of America Corp. and Citigroup Inc. are exploring options they could offer up as an olive branch to satisfy President Trump’s demand to cap credit card interest rates at 10% for one year. US airlines are already announcing backup plans for passengers ahead of an expected winter storm this weekend that could be the biggest of the season and cause massive disruptions to air traffic nationwide. General Motors Co. plans to move production of its next-generation Buick Envision compact SUV, which is currently built in China, to a plant in Kansas in 2028, a sign of the pressure automakers are under to reshore output of vehicles sold in the US. Procter & Gamble Co.’s executives signaled sales are rebounding in the US and expressed confidence the company will meet its full-year guidance. General Electric Co.’s full-year outlook underwhelmed investors, a sign of high expectations on the jet-engine maker after a steep rise in the stock last year. Abbott Laboratories forecast a first-quarter profit that was lower than Wall Street expected and missed fourth-quarter sales estimates after its nutrition unit fell short of expectations, sending shares lower. Moderna Inc.’s chief executive officer said the company doesn’t plan to invest in new late-stage vaccine trials because of growing opposition to immunizations from US officials. Waymo will start offering its robotaxi service in Miami to the public Thursday, the first of around a dozen cities where the Alphabet Inc. company plans to launch this year. Freeport-McMoRan Inc. is making progress on a restart of its sprawling Indonesian copper mine, it said Thursday, after a deadly mudslide shuttered the operation that’s critical to global supply. Target Corp. is adding two retail veterans to its board as the beleaguered retailer seeks to reverse a sales slump under incoming Chief Executive Officer Michael Fiddelke. Lululemon Athletica Inc.’s “Get Low” leggings, derided for being see-through, are available for sale again online. Shoppers just have to make sure to read the disclaimers first. PayPal Holdings Inc. agreed to acquire Cymbio, a platform designed to help merchants sell products across AI chatbots. Terms weren’t disclosed. General Fusion Inc. has agreed to a merger with a blank-check company in a deal that’s expected to create one of the first publicly traded nuclear fusion technology developers. Some of the main moves in markets:

    Stocks

    The S&P 500 rose 0.8% as of 2:36 p.m. New York time The Nasdaq 100 rose 1% The Dow Jones Industrial Average rose 0.9% The MSCI World Index rose 0.9% Bloomberg Magnificent 7 Total Return Index rose 2.3% Philadelphia Stock Exchange Semiconductor Index rose 0.4% The Russell 2000 Index rose 1% KBW Bank Index rose 0.9% Currencies

    The Bloomberg Dollar Spot Index fell 0.3% The euro rose 0.5% to $1.1743 The British pound rose 0.4% to $1.3489 The Japanese yen was little changed at 158.43 per dollar Cryptocurrencies

    Bitcoin fell 0.9% to $89,413.96 Ether fell 2.8% to $2,944.25 Bonds

    The yield on 10-year Treasuries was little changed at 4.25% Germany’s 10-year yield was little changed at 2.89% Britain’s 10-year yield advanced two basis points to 4.47% The yield on 2-year Treasuries advanced three basis points to 3.61% The yield on 30-year Treasuries declined two basis points to 4.85% Commodities

    West Texas Intermediate crude fell 2.1% to $59.36 a barrel Spot gold rose 1.7% to $4,912.33 an ounce ©2026 Bloomberg L.P.

    Continue Reading

  • FTC shares insight into its children’s privacy priorities

    FTC shares insight into its children’s privacy priorities

    Between new children’s online safety regulations soon entering into force and a handful of recent enforcement actions brought by the U.S. Federal Trade Commission, privacy professionals and other stakeholders are gaining insight into how the agency will conduct children’s privacy enforcement activities under FTC Chair Andrew Ferguson. 

    Speaking virtually in an IAPP KnowledgeNet meeting 21 Jan., FTC Division of Privacy and Identity Protection Associate Director Ben Wiseman discussed recent developments at the agency with respect to promoting children’s online safety. He said his division’s focus is “privacy and data security all the time.”

    COPPA Rule

    Wiseman said a major point of emphasis for the FTC in the year ahead will be enforcing the updated Children’s Online Privacy Act Rule, which was amended in 2024 and represented the first major modification of the law since 2013. 

    The amended rule includes provisions for requiring opt-in consent on the part of parents for the sale of their children’s personal data to third parties to engage in targeted advertising and limit the retention of children’s personal data. Covered entities have until 22 April to comply with the updates. 

    Wiseman said stakeholders should “stay tuned” for new guidance on the amended COPPA Rule taking effect. 

    “This is an area of priority for the FTC right now,” Wiseman said. “A significant amendment is the requirement to obtain separate, verifiable consent for third-party disclosures. (The amendment) is giving parents the right, or the option, to say no to operators who want to share personal information with third parties.”

    TAKE IT DOWN Act

    Another new area of focus for the FTC, Wiseman said, is enforcing the recently passed TAKE IT DOWN Act. The law, signed in May 2025, criminalizes nonconsensual intimate deepfakes and requires platforms to remove such content. Platforms were advised to begin removal prior to the practice becoming mandatory this May.

    According to Wiseman, the FTC will ensure compliance with the civil provisions of the law while the Department of Justice will handle the criminal provisions. The FTC’s oversight will include ensuring covered platforms establish mechanisms for individuals to request removal of nonconsensual, deepfake intimate content and that platforms provide timely responses to qualified complaints.

    “DPIP is going to be involved with these enforcement efforts,” Wiseman said. “This is an issue the Commission takes very seriously and we are going to be prepared to enforce this statute on day one.”

    Age verification

    Wiseman’s remarks also feature a preview of the upcoming FTC workshop 28 Jan. that will convene researchers, academics, industry representatives, consumer advocates and government regulators to discuss the importance of age verification.

    The workshop will delve into the pros and cons of certain age verification and age estimation tools, the regulatory environment around verification technologies and how COPPA is applied to existing tools. 

    “Age verification technology is really emerging,” Wiseman said. “We’re looking forward to hearing from a number of stakeholders in this space.”

    Wiseman also touched on several recent enforcement actions the FTC has undertaken, such as a joint lawsuit brought by the agency and the Utah Division of Consumer Protection against operators of adult websites that is still pending, as well as the USD20 million settlement with video game maker Cognosphere, in which the company agreed to block children under age 16 from making in-game purchases without parental consent. 

    While each of the cases was brought under a different set of facts, Wiseman indicated each enforcement action is reflective of larger trends FTC commissioners are seeing throughout the economy. He recommended companies subject to COPPA stay abreast of forthcoming agency enforcement decisions and settlements as a proactive measure to ensure their operations do not incur scrutiny for potential unlawful behavior.  

    “Keep your eye on recent complaints and orders that are coming out of the commission, because they really do signal the commissioners’ priorities at the time and the marketplace issues they are seeing,” Wiseman said. “If you’re collecting personal information from children, pay particular attention to your obligations under COPPA and the amended COPPA Rule.”

    Alex LaCasse is a staff writer for the IAPP.

    Continue Reading

  • Kirkland Advises GBL on €2 Billion Portfolio Sale Anchored by Carlyle AlpInvest | News

    Kirkland & Ellis advised Groupe Bruxelles Lambert (GBL) on its approximately €2 billion portfolio sale anchored by Carlyle AlpInvest. This transaction represents Europe’s largest LP secondary sale in 2025 and one of the largest in secondary market history.

    The portfolio comprised of more than 45 funds, primarily European buyout exposure.

    The Kirkland team included investment funds lawyers Ted Cardos, Arie Scharf and Samuel Gibson; and tax lawyers Gal Shemer, Beatriz Capeloa Gil, Andrew Zhang and Lauren Lin.

    Continue Reading

  • Novel Endocrine Therapy, Giredestrant, Improves Invasive Disease–Free Survival in Estrogen Receptor–Positive, HER2-Negative Early Breast Cancer

    Novel Endocrine Therapy, Giredestrant, Improves Invasive Disease–Free Survival in Estrogen Receptor–Positive, HER2-Negative Early Breast Cancer

    Giredestrant, a next-generation oral selective estrogen receptor degrader (SERD) and full antagonist, significantly improved invasive disease–free survival as adjuvant treatment for patients with estrogen receptor–positive, HER2-negative early breast cancer compared with standard-of-care endocrine therapy, according to data presented at the 2025 San Antonio Breast Cancer Symposium (SABCS).1

    Results from the global, randomized lidERA Breast Cancer trial position giredestrant as a potential new standard of care, marking the first phase III trial to demonstrate a benefit with an oral SERD in this setting.

    The study met its primary endpoint of invasive disease–free survival, with a 30% reduction in the risk of invasive recurrence or death; this benefit appeared to be consistent across various subgroups. A favorable safety profile was reported, with a notably lower rate of treatment discontinuation compared with standard endocrine therapy.

    “lidERA is a pivotal study…as we talk about these results in the adjuvant setting,” said Aditya Bardia, MD, MPH, FASCO, Program Director, Breast Medical Oncology, University of California at Los Angeles (UCLA) Jonsson Comprehensive Cancer Center.

    Aditya Bardia, MD, MPH, FASCO

    As Dr. Bardia explained, estrogen receptor–positive breast cancer accounts for most breast cancers, with endocrine therapy being the mainstay of adjuvant management. Despite its efficacy, up to one-third of patients eventually experience recurrence, he stated.

    Although advancements such as aromatase inhibitors in the early 2000s and, more recently, CDK4/6 inhibitors have improved outcomes, said Dr. Bardia, they have also introduced associated toxicities that lead many patients to early treatment discontinuation and increase their risk of recurrence. These limitations underscore the ongoing need for more effective and better tolerated adjuvant endocrine therapies.

    Giredestrant is designed to induce full estrogen receptor antagonism and degradation, resulting in deep and sustained inhibition of estrogen receptor signaling across both ligand-dependent and ligand-independent pathways, which may offer a mechanistic advantage over aromatase inhibitors. Preclinical data and preliminary clinical trials (coopERA Breast Cancer, EMPRESS) have indicated that giredestrant exhibits increased potency and superior antiproliferative activity compared with other SERDs and standard endocrine therapies.

    Study Design

    The lidERA Breast Cancer study was a global, randomized phase III trial that enrolled 4,170 patients with stage I to III estrogen receptor–positive, HER2-negative early breast cancer. They were randomly assigned in a 1:1 ratio to receive either giredestrant (30 mg orally once daily, with concomitant luteinizing hormone-releasing hormone [LHRH] agonist therapy for pre- and perimenopausal women and for men) or standard-of-care endocrine therapy (tamoxifen or an aromatase inhibitor [ie, exemestane, letrozole, or anastrozole, with concomitant LHRH agonist therapy for pre- and perimenopausal women and for men]) for 5 years.

    The primary endpoint was invasive disease–free survival, assessed in an intention-to-treat fashion. A prespecified efficacy interim analysis of invasive disease–free survival was performed after 336 events, at which time the first interim overall survival analysis also occurred per the hierarchical design.

    The baseline demographics were found to be well balanced between the arms. The median age was 54.0 years, with 59.3% of patients being postmenopausal and approximately 40% premenopausal. About 50% of patients had stage II disease, 40% had stage III, and 10% had stage I. The majority of the study population had received chemotherapy prior to enrollment. In the standard-of-care endocrine therapy arm, 84% of patients were treated with an aromatase inhibitor, and 16% received tamoxifen.

    At the data cutoff of August 8, 2025, with a median follow-up of 32.3 months, treatment had been discontinued in 347 patients receiving giredestrant and 520 receiving standard-of-care endocrine therapy.

    Improvement in Invasive Disease-Free Survival

    As Dr. Bardia reported, the study met its primary endpoint, demonstrating a statistically significant and clinically meaningful improvement in invasive disease–free survival with giredestrant vs standard-of-care endocrine therapy.

    Giredestrant reduced the risk of invasive recurrence or death by 30%, corresponding to a hazard ratio (HR) of 0.70 (P = .0014). The 3-year invasive disease–free survival rate was 92.4% with giredestrant vs 89.6% with standard-of-care endocrine therapy, representing an absolute benefit of approximately 3%.

    “The Kaplan-Meier curves for invasive disease–free survival separated early and remained separated over time,” said Dr. Bardia. “This superiority of giredestrant was consistent across all predefined subgroups, including region, menopausal status, risk, prior chemotherapy, and tumor stage [HR = 0.58 for stage II; HR = 0.74 for stage III].”

    In addition, giredestrant demonstrated superiority in distant recurrence–free interval compared with standard-of-care endocrine therapy, representing a 31% reduction in the risk of developing distant metastatic disease (HR = 0.69), although absolute risks appeared to be low at this time point (96.1% vs 94.2%).

    “Giredestrant also showed a trend for improvement in overall survival compared with standard endocrine therapy [HR = 0.79], although these results are immature at this interim analysis, and further follow-up is ongoing,” said Dr. Bardia.

    The safety profile of giredestrant was found to be consistent with its known profile. The overall incidences of adverse events and grade 3 to 4 adverse events appeared comparable between the arms.

    Of note, the discontinuation rate because of adverse events was lower with giredestrant (5.3%) compared with standard-of-care endocrine therapy (8.2%). This lower discontinuation rate was observed despite high compliance in both arms, with a mean dose intensity of over 99%. However, dose interruptions were more frequent with giredestrant (12.7% vs 6.6%).

    Common adverse events in both arms included arthralgia (48.0% vs 47.1%), hot flush (27.4% vs 28.8%), and headache (15.3% vs 13.2%). Although arthralgias were common, said Dr. Bardia, those leading to discontinuation were lower with giredestrant (1.6% vs 3.7%).

    Giredestrant was found to be associated with a higher incidence of bradycardia, occurring in approximately 10% of patients, but predominantly as asymptomatic grade 1 events. Grade 3 to 4 venous thromboembolism was more frequent in the standard-of-care endocrine therapy arm, likely reflecting tamoxifen use.

    “These results support giredestrant as a potential new standard for patients with ER [estrogen receptor]-positive, HER2-negative early breast cancer,” Dr. Bardia concluded. 

    DISCLOSURE: Dr. Bardia reported financial relationships with Pfizer, Novartis, Merck, Genentech, AstraZeneca/Daiichi Sankyo, Alyssum, Menarini, Gilead, Eli Lilly, and OnKure.

    REFERENCE

    1. Bardia A, Schmid P, Martin M, et al: Giredestrant vs standard-of-care endocrine therapy as adjuvant treatment for patients with estrogen receptor-positive, HER2-negative early breast cancer: Results from the global phase III lidERA Breast Cancer trial. SABCS 2025. Abstract GS1-10. Presented December 10, 2025.

     

    EXPERT POINT OF VIEW

    Invited discussant Lisa A. Carey, MD, ScM, FASCO, the L. Richardson and Marilyn Jacobs Preyer Distinguished Professor for Breast Cancer Research and Deputy Director of Clinical Sciences at the University of North Carolina (UNC) Lineberger Comprehensive Cancer Center, called the findings of the lidERA Breast Cancer trial a “pivotal moment” and the “first positive data for an oral SERD [selective estrogen receptor degrader] in the adjuvant setting.”

    Dr. Carey began by tracing the history of estrogen receptor targeting in hormone receptor–positive disease. She highlighted that although advancements have been made in the metastatic setting with oral SERDs, the early breast cancer setting saw “not much in the last 20 years related to estrogen receptor targeting until now,” with the success of giredestrant.

    Lisa A. Carey, MD, ScM, FASCO

    Lisa A. Carey, MD, ScM, FASCO

    Dr. Carey detailed key aspects of the lidERA Breast Cancer trial design, noting the inclusion of patients with high-risk stage I disease, the requirement for ovarian function suppression with giredestrant in premenopausal patients, and the allowance of short-term CDK4/6 inhibition before but not during the trial. She highlighted the trial’s predominantly high-risk patient population, with 70% falling into the high clinical risk category, and a significant proportion having node-positive disease. She pointed out that in the high-risk population treated in lidERA Breast Cancer, modern therapy for most would include a CDK4/6 inhibitor, which was not included in the study’s design.

    Regarding the primary efficacy data, Dr. Carey affirmed that the invasive disease–free survival endpoint was met, with giredestrant reducing the risk of recurrence or death by 30% (hazard ratio [HR] = 0.70). Despite it being early (median follow-up = 32.3 months), she found the invasive disease–free survival and distant recurrence–free interval data “quite reassuring,” noting the early and sustained separation of the Kaplan-Meier curves. She estimated an absolute invasive disease–free survival difference of 2.8% at just under 3 years, which, while small, is “likely to grow with additional follow-up.”

    Dr. Carey also praised the tolerability of giredestrant, noting a low rate of discontinuation (5.3% vs 8.2% for standard endocrine therapy), including fewer discontinuations because of musculoskeletal symptoms. She addressed the class effect of bradycardia, observing it was a “pretty minor issue” in lidERA Breast Cancer, with predominantly asymptomatic grade 1 events.

    Crucially, Dr. Carey contextualized the findings against other adjuvant advances in hormone receptor–positive breast cancer, including those from the ATAC, monarchE, and NATALEE trials. She observed “similar differences, both proportional and absolute” (2%–3% absolute benefit and HRs of 0.7–0.8) at comparable follow-up times, suggesting the efficacy of giredestrant is generally consistent with other improvements seen in this setting.

    Dr. Carey also discussed the potential implications for clinical practice, particularly regarding CDK4/6 inhibitors, which were not concurrently addressed in the trial. She proposed that giredestrant will be the favored endocrine therapy for patients not receiving a CDK4/6 inhibitor. For those in whom a CDK4/6 inhibitor is appropriate, she suggested an aromatase inhibitor plus CDK4/6 inhibition for the initial 2 years, followed by a potential switch to giredestrant, though she acknowledged this specific sequencing was not tested.

    The cost implications of giredestrant, according to Dr. Carey, also warrant consideration. She noted that oral SERDs in the metastatic setting typically exceed $20,000 per month, emphasizing the “large potential impact on the national health-care systems” if giredestrant is priced similarly.

    Dr. Carey concluded with a strong call for predictive biomarkers to tailor therapy beyond the estrogen receptor, as giredestrant has “very broad clinical implications,” and noted that models are needed to guide decision-making. 

    DISCLOSURE: Dr. Carey reported no personal financial interests with any commercial entity.

    Continue Reading

  • The future of agentic AI and its data protection implications the UK ICOs initial assessment

    The future of agentic AI and its data protection implications the UK ICOs initial assessment

    First data protection regulatory report

    In January 2026, and in the context of recent technological developments, industry announcements and market attention, the UK Information Commissioner’s Office (ICO) published a Tech Futures report on agentic AI. In doing so, it became the first data protection regulator to tackle the topic. The report does not constitute formal ICO guidance but does provide important insight to the regulator’s view on data protection implications, risks and how organisations may be able exploit the opportunities the technology offers. The report delivers on the action set out in the ICO’s AI and biometrics strategy to engage with industry to assess the data protection implications of agentic AI. It is intended to support the ICO’s ambition to encourage the responsible development and use of agentic AI.

    This blog takes an initial look at the key messages that can be drawn from the ICO’s report and what organisations can learn at this stage of the regulator’s policy thinking.

    The ICO’s report is to be welcomed in its assessment of evidence related to advancement, benefits and risk proliferation. Its nuanced approach provides a range of options as to how the technology may develop and be deployed. The report can therefore play a useful role in assisting organisations with initial risk assessments and planning for deployment.

    The ICO has gathered significant evidence to inform the report and has transparently set out the methodology used and resources that can be considered alongside the report. 

    Definitions

    Terms such as agents and agentic AI are often used interchangeably and the ICO helpfully provides definitions to enable a common language for our discussions about implications of agentic AI in the data protection community.

    The ICO explains that an agent is “software or a system that can carry out processes or tasks with varying levels of sophistication and automation.” It then explains that “when large language models (LLMs) or foundation models are integrated (‘scaffolded’) with other tools, including databases, memory, computer operating systems and ways of interacting with the world, they create what industry is agentic AI.” 

    The ICO also notes that because agentic AI systems build on LLMs, some of the negative characteristic features of LLMs (such as hallucinations and bias) may be present. 

    Agentic AI can take different forms, perhaps as a standalone agent or, when several agents are, combined, as a ‘multi-agent system’.

    Likely evolution of agentic AI, capabilities and use cases

    Four scenarios for the evolution of agentic AI are set out and explained in the ICO report:

    1. Scarce, simple agents (low adoption, low agentic capability)
    2. Just good enough to be everywhere (high adoption, low agentic capability)
    3. Agents in waiting (low adoption, high agentic capability)
    4. Ubiquitous agents (high adoption, high agentic capability)

    It is important to understand the new capabilities that agentic AI may offer. The report highlights perception (i.e. working with a wide range of inputs), planning or reasoning-like actions (e.g. generating plans, dividing tasks, error checking), action (e.g. accessing tools, interacting with people or AI agents, running code), and learning and memory (i.e. adaptive decision making, correcting errors in future plans, learning preferences and from feedback) as capabilities likely to be demonstrated by agentic AI systems to some extent. The report also indicates that capabilities are being assessed by researchers based on autonomy, efficacy, goal complexity, generality and under-specification. The ICO’s report therefore focuses on how agents can autonomously pursue goals, adapt to new situations and contexts, and an exhibit some reasoning-like capacities.

    Potential use cases covered in the report include research, coding, and planning, organising and executing transactions.   Use in agentic commerce, workplace applications, government services, automated cybersecurity applications, integrated personal assistants and the medical sector are also covered in the report, indicating a wide range of potential deployments. 

    It is also important to note that the ICO’s assessment of the stakeholder evidence in the report indicates that the rate of improvement in LLM capabilities may slow or even stop in the short to medium term. The graph of agentic technology evolution may not be a linear one.

    Looking further ahead, amongst other things, the ICO sees evidence that the following technical developments could emerge – truly multimodal agents, increasing agent autonomy and agent-to-agent communication and agentic AI embedded into a wider range of software and devices.   

    Key data protection implications

    Accountability and governance

    A key message from the ICO is on accountability- organisations must continue to take responsibility for AI in the context of data protection:

    “AI agency does not mean the removal of human, and therefore organisational, responsibility for data processing. Organisations must be clear on the expectations that still apply under data protection legislation.”

    The ICO notes that currently, and for the foreseeable future, organisations can control factors such as the actions the agent is authorised to take and the information the agent can access. An important learning point for organisations planning agentic AI governance is to prioritise the effective risk assessment of these elements and ensure that relevant controls are in place.

    On governance, the ICO highlights the importance of flexible and adaptable governance to move with changes in how agentic AI systems may operate. Whilst not a formal endorsement, the ICO highlights the relevance of the Safer Agentic AI Foundations, from the Agentic AI Safety Community of Practice. The ICO also indicates that organisations may need a separate, standalone monitoring system.

    The report’s section on accountability is relatively short at half a page, and it will be helpful for organisations if greater coverage is given to this topic in future ICO publications. Such further output could include information on how existing AI governance models will need to evolve, including existing AI standards and risk management frameworks such as those in use from NIST and ISO. It will also be relevant to address how to scale governance, and the balance between centralisation and decentralisation. Organisations will also need to address the risks of shadow AI, which could proliferate further with use of unauthorised AI agents, and how agents are managed and ultimately removed from use when no longer needed.

    Novel risks

    Data protection issues that may arise in the context of AI more generally, and particularly generative AI, can also be seen (perhaps even to a greater extent) in the context of agentic AI. Novel agentic AI data protection risks are also highlighted in the report, including:

    • issues in relation to determining controller and processor responsibilities through the agentic AI supply chain;
    • rapid automation of increasingly complex tasks resulting in a larger amount of automated decision-making;
    • purposes for agentic processing of personal information being set too broadly so as to allow for open-ended tasks and general-purpose agents;
    • agentic AI systems processing personal information beyond that which is necessary to achieve instructions or aims;
    • potential unintended use or inference of special category data;
    • increased complexity impacting transparency and the ease with which people can exercise their information rights;
    • new threats to cyber security resulting from, for example, the connected and autonomous nature of agentic AI;
    • and the concentration of personal information to facilitate personal assistant agents.

    The section of the report on automated decision making (ADM) sets out some general impacts that must be considered but is otherwise surprisingly short given the challenges that agentic AI may pose in this area. This appears to be because the ICO will set out its thinking on ADM and AI in more detail in the forthcoming code of practice.    

    It will be important for the ICO to explore issues of human intervention in more detail in future publications, including the role of alternatives to human in the loop solutions, such as human on the loop.

    The Tech Dispatch Report of the European Data Protection Supervisor is also helpful reading in this area.

    Role of agentic AI in automating data protection compliance

    Lastly, the report sets out how agentic AI could pose challenges for DPOs in maintaining oversight, but also how agentic AI could assist the process of data protection compliance itself. The report sets out the idea of ‘DPO agents’ i.e. systems that are integrated into data protection teams to scale and augment the role of human staff. The report also notes how privacy and personal information management agents could help people manage their own privacy settings and controls. 

    The ICO also calls for innovation in methods for the practical evaluation of the compliance of agentic AI systems with data protection legislation.

    Next steps

    The ICO has committed to publish a new statutory code of practice on AI and data protection in 2026 and we can expect a consultation process in the coming months.   The code is expected to have a specific focus on automated decision making, which will be particularly relevant to the implementation of agentic AI.

    We can also expect collaboration internationally with other DP regulators and with UK regulators via the Digital Regulation Cooperation Forum , workshops with stakeholders, and advice via the ICO’s innovation service and regulatory sandbox. 

     

     

     

     

     

    Continue Reading

  • France Advances Its Open Learning Vision With New Interoperability Decree

    France Advances Its Open Learning Vision With New Interoperability Decree

    Open standards strengthen national education systems while enabling French edtech to scale globally

    BURLINGTON, Mass., Jan. 22, 2026 /PRNewswire/ — With the adoption of its new Interoperability Framework for Digital Services for Education, France is setting clear expectations for how digital education tools must work together nationwide. It requires “public middle and high schools to use digital tools and services that comply with technical requirements for security, interoperability and responsible digital technology set by the Minister.”

    1EdTech stands ready to help educational organizations and education technology providers align with and benefit from the framework.

    By requiring internationally recognized open standards, France is reducing technical barriers that have traditionally slowed adoption and market entry, especially for open tools and resources, and is creating conditions for a more open, competitive, and sustainable edtech ecosystem.

    This standards-based approach supports:

    • Faster entry for startups and small-to-medium education technology providers
    • Lower long-term costs for educational institutions
    • Greater flexibility and choice for schools and educators

    Just as importantly, it allows French education technology providers to build solutions that can operate not only within France, but also across international markets that rely on the same global standards.

    “By requiring common interoperability standards, France is ensuring that digital education tools can work together by design,” said a French Ministry representative. “This approach helps lower long-term costs, protect student data, increase efficiency, and increase trust across the country. Interoperability is essential infrastructure for a modern, open, and future-ready education system.”

    “In the past, digital learning tools often needed custom connections for every school system, which was costly and slowed innovation, especially for smaller companies,” said Curtiss Barnes, CEO of 1EdTech Consortium. “France’s new interoperability framework reflects the same vision we share at 1EdTech: replacing one-off integrations with trusted, shared standards. That’s why we’re investing in simpler certification pathways and a new OneRoster profile that more specifically meets France’s needs, so providers of all sizes can more easily adopt standards, scale globally, and give schools real choice based on quality.”

    The 1EdTech standards named in France’s framework support different parts of digital learning:

    • OneRoster® helps schools share class and enrollment information, so teachers and students don’t have to manually add or update class lists across different tools.
    • Learning Tools Interoperability (LTI)® lets learning tools connect easily to learning platforms, allowing educators to launch tools with one click and students to use them without extra logins.
    • Common Cartridge® and Question & Test Interoperability (QTI)® make learning content and tests easier to share, so educators can reuse lessons and assessments across systems instead of rebuilding them from scratch.
    • Caliper Analytics® helps schools understand how students learn online by using shared data formats, making it easier to spot what’s working, what’s not, and where students need support.
    • Open Badges allows students to earn digital credentials they can keep and use anywhere, giving learners portable proof of their skills that can move with them between schools, jobs, and training programs.

    Together, these standards help schools build learning systems that can change and grow over time.

    French public middle and high schools, and education technology providers that serve them, will need to comply with the framework’s requirements. All 1EdTech standards are open and publicly available, and 1EdTech members have access to additional tools, guidance, and certification resources to support alignment with France’s framework.

    About 1EdTech Consortium

    1EdTech® Consortium is a global community committed to building an integrated foundation of open standards that make educational technology work better for everyone. Our mission is to reduce complexity, accelerate innovation, and expand possibilities for learners worldwide. Our members represent K-12, primary, secondary, and postsecondary education organizations, workforce and corporate education providers, and technology providers. Together, we create and evolve community-developed technical standards and practices that support learner success throughout the lifelong learning continuum. Our organization gives a voice to all stakeholders working to improve education. 1EdTech hosts the Learning Impact Conference, Digital Credentials Summit, Learning Impact Europe Conference, and other engagement opportunities to advance the leadership and ideas that shape the future of learning. Visit our website at 1edtech.org.

    SOURCE 1EdTech Consortium

    Continue Reading

  • Today in Energy – U.S. Energy Information Administration (EIA)

    Today in Energy – U.S. Energy Information Administration (EIA)

    Filter by article type:







    In-brief analysis

    Jan 22, 2026





    In our January 2026 Short-Term Energy Outlook, we forecast U.S. crude oil production next year will remain near the record 13.6 million barrels per day (b/d) produced in 2025 before decreasing 2% to 13.3 million b/d in 2027. If realized, a fall in annual U.S. crude oil production will mark the first since 2021.

    Read More ›


    In-brief analysis

    Jan 21, 2026



    photo of airfield


    When military aircraft are retired, they live out their days in the sunbelt at the U.S. Air Force’s facility on Davis-Monthan Air Force Base in Arizona, otherwise known as the Boneyard.

    Read More ›


    In-brief analysis

    Jan 20, 2026



    U.S. annual average retail gasoline price by region


    In our latest Short-Term Energy Outlook, we forecast retail U.S. gasoline prices will be lower the next two years than in 2025, falling 6% in 2026 and then increasing 1% in 2027. Our gasoline price forecast generally follows a similar path as global crude oil prices, but decreasing U.S. refinery capacity this year may offset some of the effects of lower crude oil prices on gasoline, especially in the West Coast region.

    Read More ›


    In-brief analysis

    Jan 16, 2026



    U.S. annual electric power sector generation by source


    Electricity generation by the U.S. electric power sector totaled about 4,260 billion kilowatthours (BkWh) in 2025. In our latest Short-Term Energy Outlook (STEO), we expect U.S. electricity generation will grow by 1.1% in 2026 and by 2.6% in 2027, when it reaches an annual total of 4,423 BkWh. The three main dispatchable sources of electricity generation (natural gas, coal, and nuclear) accounted for 75% of total generation in 2025, but we expect the share of generation from these sources will fall to about 72% in 2027. We expect the combined share of generation from solar power and wind power to rise from about 18% in 2025 to about 21% in 2027.

    Read More ›


    In-brief analysis

    Jan 14, 2026



    monthly Henry Hub natural gas price


    We expect the U.S. benchmark natural gas spot price at the Henry Hub to decrease about 2% to just under $3.50 per million British thermal units (MMBtu) in 2026 before rising sharply in 2027 to just under $4.60/MMBtu, according to our January Short-Term Energy Outlook (STEO). We expect the annual average Henry Hub price in 2026 to decrease slightly as annual supply growth keeps pace with demand growth over the year. However, in 2027, we forecast demand growth will rise faster than supply growth, driven mainly by more feed gas demand from U.S. liquefied natural gas (LNG) export facilities, reducing the natural gas in storage. We forecast annual average spot prices will decrease by 2% in 2026 and then increase by 33% in 2027.

    Read More ›


    In-brief analysis

    Jan 9, 2026



    annual average Henry Hub natural gas spot price


    In 2025, the wholesale U.S. natural gas spot price at the national benchmark Henry Hub in Louisiana averaged $3.52 per million British thermal units (MMBtu), based on data from LSEG Data. The 2025 average Henry Hub natural gas spot price increased 56% from the 2024 annual average, which—when adjusted for inflation—was the lowest on record. On a daily basis, the Henry Hub natural gas spot price ranged from $2.65/MMBtu to $9.86/MMBtu, reflecting a narrower range of daily prices compared with the previous year.

    Read More ›


    In-brief analysis

    Jan 7, 2026



    U.S. average weekly retail gasoline price


    The U.S. retail price for regular grade gasoline averaged $3.10 per gallon (gal) in 2025, $0.21/gal less than in 2024. This year marks the third consecutive year of declining nominal retail gasoline prices, according to data from our Gasoline and Diesel Fuel Update.

    Read More ›


    In-brief analysis

    Jan 5, 2026



    daily Brent crude oil spot price


    Data source: U.S. Energy Information Administration, based on Thomson Reuters data
    Data values: Europe Brent Spot Price FOB (free on board)


    Crude oil prices generally declined in 2025 with supplies in the global crude oil market exceeding demand. Crude oil inventory builds in China muted some of the price decline. Events such as Israel’s June 13 strikes on Iran and attacks between Russia and Ukraine targeting oil infrastructure periodically supported prices.

    Read More ›


    In-brief analysis

    Dec 22, 2025



    main image



    Source: U.S. Energy Information Administration




    Below is a list featuring some of our most popular and favorite articles from 2025. We will resume regular Today in Energy publications on January 5, 2026. Thanks for your continued readership of Today in Energy.

    Read More ›


    In-brief analysis

    Dec 19, 2025



    OPEC crude oil production and production capacity


    Data source: U.S. Energy Information Administration, Short-Term Energy Outlook
    Data values: Total Crude Oil Production
    Note: While EIA does not forecast unplanned production outages, they are assumed to remain at the most recent historical month’s level throughout the forecast period.




    Each month we publish estimates of key global oil market indicators that affect crude oil prices and movements in our Short-Term Energy Outlook (STEO). Among the most important indicators for global crude oil markets are estimates of OPEC’s effective crude oil production capacity and surplus production capacity, as well as any disruptions to liquid fuels production. Low surplus production capacity among OPEC countries can put upward pressure on crude oil prices in the event of unplanned supply disruptions or strong growth in global oil demand.

    Read More ›


    In-brief analysis

    Dec 17, 2025



    annual changes in global crude oil production


    We forecast that global crude oil production will increase by 0.8 million barrels per day (b/d) in 2026, with supply from Brazil, Guyana, and Argentina accounting for 0.4 million b/d of the expected global growth forecast in our December Short-Term Energy Outlook (STEO). Global crude oil production growth since 2023 has been driven by countries outside of OPEC+.

    Read More ›


    In-brief analysis

    Dec 15, 2025



    Evolution of forecasts for winter weather and residential energy expenditures


    Our estimates for residential energy expenditures this winter (November 2025 through March 2026) have increased since the publication of our initial Winter Fuels Outlook forecasts in mid-October. We now expect a colder winter, and our retail energy price forecasts have risen, especially for natural gas and propane.

    Read More ›


    In-brief analysis

    Dec 12, 2025



    U.S. crude oil production by region


    • In our latest Short-Term Energy Outlook, we forecast U.S. crude oil production will average 13.5 million barrels per day (b/d) in 2026, about 100,000 b/d less than in 2025.
    • This forecast decline in production follows four years of rising crude oil output.
    • Production increased by 0.3 million b/d in 2024 and by 0.4 million b/d in 2025, mostly because of increased output in the Permian Basin in Texas and New Mexico.
    • In 2026, we forecast modest production increases in Alaska, the Federal Gulf of America, and the Permian will be offset by declines in other parts of the United States.
    • We forecast that the West Texas Intermediate crude oil price will average $65 per barrel (b) in 2025 and $51/b in 2026, both lower than the 2024 average of $77/b.

    Read More ›


    In-brief analysis

    Dec 10, 2025



    classifying critical minerals and materials


    Data source: U.S. Department of the Interior’s 2025 list of critical minerals; U.S. Department of Energy’s 2023 list of critical materials and a recently proposed addition
    Note: This Today in Energy article launches the Energy Minerals Observatory, a new project of the U.S. Energy Information Administration. In 2026, as part of the Observatory and the Manufacturing Energy Consumption Survey (MECS), EIA plans to conduct field studies of three minerals: graphite, vanadium, and zirconium.


    Critical minerals, such as copper, cobalt, and silicon, are vital for energy technologies, but most critical minerals markets are less transparent than mature energy markets, such as crude oil or coal. Like other energy markets, many supply-side and demand-side factors influence pricing for these energy-relevant critical minerals, but critical minerals supply chains contain numerous data gaps.

    Read More ›


    In-brief analysis

    Dec 8, 2025



    daily PJM western hub spark spread and dark spread


    Data source: U.S. Energy Information Administration, based on data from S&P Global Market Intelligence
    Data note: The specifics of the calculation methodology are detailed in a previous article with minor adjustments to heat rates used. The heat rate used for the dark spread was 10,500 British thermal units per kilowatthour (Btu/kWh), while the heat rate for the spark spread was 7,000 Btu/kWh.



    Higher average daily wholesale electricity prices between January and November 2025 may be improving the operational competitiveness of some natural gas- and coal-fired generators in the PJM Interconnection compared with the same period in 2024. PJM is the largest wholesale electricity market in the United States. The spark and dark spreads, common metrics for estimating the profitability of natural gas- and coal-fired electric generators, have both increased over the past two years.

    Read More ›

    Continue Reading

  • CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

    CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

    Certification accelerates leadership in trusted AI governance, enabling organizations to outpace AI-accelerated threats with speed and control

    AUSTIN, Texas – January 22, 2026 – CrowdStrike (NASDAQ: CRWD) today announced it has achieved ISO/IEC 42001:2023 certification, validating its disciplined, externally audited approach to the responsible design, development, and operation of AI-powered cybersecurity. This certification spans core CrowdStrike Falcon® platform capabilities, including CrowdStrike Endpoint Security, Falcon® Insight XDR, and CrowdStrike® Charlotte AI.

    ISO 42001 provides organizations with a globally recognized framework as they navigate emerging AI standards and regulatory expectations. It reinforces trust in CrowdStrike’s responsible AI governance and accelerates leadership in the AI era, delivering the speed, precision, and control to outpace AI-accelerated threats safely and at scale.

    “CrowdStrike is among the first cybersecurity companies to achieve ISO 42001 certification, the world’s first AI management system standard,” said Michael Sentonas, president of CrowdStrike. “For a cybersecurity vendor, responsible AI governance is foundational. This certification validates the maturity, discipline, and leadership behind how we develop and operate AI across the Falcon platform.”

    AI-Accelerated Threats Demand AI-Powered Protection

    CrowdStrike pioneered AI-native cybersecurity and continues to deliver the platform innovation needed to stop evolving threats. Modern adversaries are weaponizing AI to scale attacks faster than defenders can respond. To safely gain the speed advantage, organizations need AI-powered protection built for the realities adversaries ignore. Defenders must operate under AI governance, regulation, and accountability that attackers do not – requiring AI that delivers intelligent automation, adheres to standards, and avoids introducing risk.

    Innovation for the Agentic Era

    The AI-native Falcon platform continuously analyzes behaviors and delivers real-time protection across the entire attack surface. Charlotte AI defines cybersecurity in the agentic era, elevating analysts from alert handlers to orchestrators of the agentic SOC. Intelligent agents trained on years of expertise from the world’s top SOC operators automate time-consuming tasks across the security lifecycle – always under defender control – freeing analysts to focus on the strategic decisions that strengthen security. Charlotte AI powers the agentic SOC on these foundational innovations: 

    • The Agentic Security Workforce provides mission-ready agents trained on human expertise and response actions from Falcon® Complete and incident response engagements.
    • Charlotte AI AgentWorks enables organizations to build and customize their own agents without writing a single line of code.
    • Charlotte Agentic SOAR is the orchestration layer that allows CrowdStrike, custom-built, and third-party agents to work together as one coordinated defense system guided by human expertise.


    Responsible Agentic Transformation

    Charlotte AI operates within a model of bounded autonomy, ensuring security teams maintain full oversight of AI-driven decisions and define when and how AI-driven and automated actions occur. AI data, models, and agents are protected with governance and controls designed for highly regulated environments.

    Accelerating CrowdStrike’s ongoing commitment to protecting the security and privacy of customer and organizational data in the AI era, ISO 42001 certification was awarded following an extensive audit conducted by an independent, accredited certification body. The assessment evaluated CrowdStrike’s AI management system, including governance, policies, risk management, and development practices for designing, deploying, and operating AI responsibly.

    To learn more about CrowdStrike’s ISO 42001 certification, visit the CrowdStrike Compliance and Certification Page.

    About CrowdStrike

    CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

    Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft, and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting, and prioritized observability of vulnerabilities.

    Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity, and immediate time-to-value.

    CrowdStrike: We stop breaches.

    Learn more: https://www.crowdstrike.com/

    Follow us: Blog | X | LinkedIn | Instagram

    Start a free trial today: https://www.crowdstrike.com/trial

    © 2026 CrowdStrike, Inc. All rights reserved. CrowdStrike and CrowdStrike Falcon are marks owned by CrowdStrike, Inc. and are registered in the United States and other countries. CrowdStrike owns other trademarks and service marks and may use the brands of third parties to identify their products and services.

    Media Contact

    Jake Schuster

    CrowdStrike Corporate Communications

    press@crowdstrike.com

     


    Continue Reading

  • How Ready to Advise rebuilt team confidence at Papin CPA

    How Ready to Advise rebuilt team confidence at Papin CPA

    Challenge: Bridging expertise and client understanding in the AI era

    Even with a strong advisory foundation, Papin CPA faced a critical challenge: bridging the gap between technical expertise and client understanding, especially in an era where AI-generated content often gives clients a false sense of confidence. As Chris Papin explained, “There’s a lot of noise in our industry … and we get a lot of questions from clients that are sometimes misplaced.”

    Internally, the firm also strived for consistency. While their workflows were well-developed, there was no guarantee that every team member would follow the same steps or deliver the same quality of insight. Junior staff, in particular, lacked the confidence to step into advisory roles, often unsure of how to translate complex tax concepts into client-friendly language.

    The result was a bottleneck in scaling advisory services and a missed opportunity to fully leverage the team’s collective potential. Without a reliable framework to validate expertise and empower all staff members, Papin CPA risked limiting their growth and impact.

    Continue Reading

  • Leveraging LLMs to Generate Phishing JavaScript in Real Time

    Leveraging LLMs to Generate Phishing JavaScript in Real Time

    Executive Summary

    Imagine visiting a webpage that looks perfectly safe. It has no malicious code, no suspicious links. Yet, within seconds, it transforms into a personalized phishing page.

    This isn’t merely an illusion. It’s the next frontier of web attacks where attackers use generative AI (GenAI) to build a threat that’s loaded after the victim has already visited a seemingly innocuous webpage.

    In other words, this article demonstrates a novel attack technique where a seemingly benign webpage uses client-side API calls to trusted large language model (LLM) services for generating malicious JavaScript dynamically in real time. Attackers could use carefully engineered prompts to bypass AI safety guardrails, tricking the LLM into returning malicious code snippets. These snippets are returned via the LLM service API, then assembled and executed in the victim’s browser at runtime, resulting in a fully functional phishing page.

    This AI-augmented runtime assembly technique is designed to be evasive:

    • The code for the phishing page is polymorphic, so there’s a unique, syntactically different variant for each visit
    • The malicious content is delivered from a trusted LLM domain, bypassing network analysis
    • It is assembled and executed at runtime

    The most effective defense against this new class of threat is runtime behavioral analysis that can detect and block malicious activity at the point of execution, directly within the browser.

    Palo Alto Networks customers are better protected through the following products and services:

    The Unit 42 AI Security Assessment can help empower safe AI use and development across your organization.

    If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team.

    LLM-Augmented Runtime Assembly Attack Model

    Our previous research shows how attackers can effectively use LLMs to obfuscate their malicious JavaScript samples offline. Reports from other sources have documented campaigns that leverage LLMs during runtime execution on compromised machines to tailor attacks (e.g., LLM-powered malware and ransomware).

    Anthropic researchers have also published reports indicating that LLMs have aided cybercriminals and played a role in AI-orchestrated cyberespionage campaigns. Motivated by these recent discoveries, we researched how threat actors could leverage LLMs to generate, assemble and execute phishing attack payloads within a webpage at runtime, making it challenging to detect with network analysis. Below we outline our proof of concept (POC) for this attack scenario and offer steps to help mitigate the impact of this potential attack.

    Attack Model For Our PoC

    The attack scenario begins with a seemingly benign page. Once loaded in the victim’s browser, the initial webpage makes requests for client-side JavaScript to popular and trusted LLM clients (e.g., DeepSeek and Google Gemini, though the PoC could be effective across a number of models.).

    Attackers can then trick the LLM into returning malicious JavaScript snippets using carefully engineered prompts that circumvent safety guardrails. These snippets are then assembled and executed in the browser’s runtime to render a fully functional phishing page. This leaves behind no static, detectable payload.

    Figure 1 shows how we developed our PoC to leverage LLMs to enhance existing attacks and bypass defenses. The first two steps involve initial preparation, while the final step details the generation and execution of phishing code within the browser at runtime.

    Figure 1. Workflow of the PoC. The first two steps are initial preparation, and the third is an example of generating malicious content to be rendered in the browser.

    Step 1: Select a Malicious or Phishing Webpage

    The attacker’s first step would be to select a webpage from an active phishing or malicious campaign to use as a model for the type of malicious code that would perform the desired function. From there, they can create JavaScript code snippets that will be generated in real-time to dynamically render the final page displayed to the user.

    Step 2: Translate Malicious JavaScript Code Into LLM Prompts

    The attacker’s next step would be to craft prompts describing the JavaScript code’s functionality to the LLM in plain text. They could iteratively refine prompts, generating malicious code that bypasses existing LLM guardrails. These generated snippets could differ structurally and syntactically, allowing attackers to create polymorphic code with the same functionality.

    Step 3: Generate and Execute Malicious Scripts at Runtime

    From there, attackers could embed these engineered prompts inside a webpage, which would load on the victim’s browser. The webpage would then use the prompt to request a popular, legitimate LLM API endpoint to generate malicious code snippets. These snippets could then be transmitted over popular, trusted domains to bypass network analysis. Subsequently, these generated scripts could be assembled and executed to render malicious code or phishing content.

    How This Attack Technique Helps with Evasion

    This technique builds upon existing evasive runtime assembly behaviors that we often observe on phishing and malware delivery URLs. For example, 36% of malicious webpages we detect daily exhibit runtime assembly behavior, such as executing constructed child scripts with an eval function (e.g., retrieved, decoded or assembled payloads). Leveraging LLMs during runtime on a webpage gives attackers the following benefits:

    • Evading network analysis: The malicious code generated by an LLM could be transferred over the network from a trusted domain, as access to domains of popular LLM API endpoints is often allowed from the client side.
    • Increasing the diversity of malicious scripts with each visit: An LLM can generate new variants of phishing code, leading to higher polymorphism. This can make detection more challenging.
    • Using runtime assembly and executing JavaScript code to complicate detection: Assembling and executing these code snippets during runtime enables more tailored phishing campaigns, such as selecting a target brand based on the victim’s location or email address.
    • Obfuscating code in plain text: Translating code into text for subsequent concealment within a webpage can be viewed as a form of obfuscation. Attackers commonly employ various conventional techniques (e.g., encoding, encryption and code fragmenting) to visually conceal malicious code and evade detection. While advanced analyses often identify conventional obfuscation methods by evaluating expressions, it will be more challenging for defenders to evaluate text as executable code without subjecting each snippet to an LLM.

    PoC Example

    In researching the PoC we were able to demonstrate how this augmentation could be applied to a real-world phishing campaign, illustrating its ability to enhance evasion techniques through the steps we outline above. A brief overview of this PoC is provided below.

    Step 1: Selecting a Malicious/phishing Webpage

    For our PoC, we replicated a webpage from an advanced real-world phishing campaign known as LogoKit. The original phishing attack uses a static JavaScript payload to transform a benign-looking web form into a convincing phishing lure. This script performs two key functions: personalizing the page based on the victim’s email in the address bar and exfiltrating captured credentials to an attacker’s web server.

    Step 2: Translating Malicious JavaScript Code Into LLM prompts

    Our PoC uses a popular LLM service, accessible via a chat API query from within the browser’s JavaScript. To mitigate potential misuse by attackers, we are not disclosing the name of this specific API. We used this LLM API to dynamically generate the code necessary for credential harvesting and impersonate target webpages. Because the malicious payload is generated dynamically in the browser, the initial page transmitted over the network is benign, allowing it to inherently bypass network-based security detectors.

    The attack’s success hinged on careful prompt engineering to bypass the LLM’s built-in safeguards. We found simple rephrasing was remarkably effective.

    For instance, a request for a generic $AJAX POST function was permitted (shown in Figure 2), while a direct request for “code to exfiltrate credentials” was blocked. Furthermore, indicators of compromise (IoCs) (e.g., Base64-encoded exfiltration URLs) could also be hidden within the prompt itself to keep the initial page clean.

    Screenshot displaying a document containing text instructions on coding. The text includes a red underlined URL and several coding commands and explanations related to AJAX requests. The document has a plain white background with red and black text. At the top of the image is the Base64 encoded URL. The second paragraph is the ask to make the AJAX request instead of credential exfiltration.
    Figure 2. Example of prompt engineering to bypass LLM guardrails and generate JavaScript code for phishing content.

    The non-deterministic output of the model provided a high degree of polymorphism, with each query returning a syntactically unique yet functionally identical variant of the malicious code. For example, Figure 3 shows differences in code snippets highlighted in red. This constant mutation makes detection more difficult.

    Screenshot of two side-by-side code comparisons in an IDE, focusing on different methods of extracting and handling URLs and domain data in JavaScript. The left code extract uses requests while the right code analyzes email-based URLs for domain extraction, highlighted with annotations and marked steps.
    Figure 3. Polymorphism creating multiple variants of dynamically generated JavaScript code.

    Of note, LLM-generated code can include hallucinations but we mitigated this through prompt refinement and increased specificity, effectively reducing syntax errors. As a result, the final, highly specific prompt successfully generated functional code in most instances.

    Step 3: Executing Malicious Scripts at Runtime

    The generated script was assembled and executed at runtime on the webpage to render the phishing content. This process successfully constructed a functional, brand-impersonating phishing page, validating the attack’s viability (shown in Figure 4). The successful execution of the generated code, which rendered the phishing page without error, confirmed the efficacy of our PoC.

    Screenshot collage showing a phishing attack process. Top image: a fake login page. Middle image: a fake login page for Palo Alto Networks for detecting the phishing page. Bottom image: a phishing code generator interface.
    Figure 4. Example of a phishing page rendered by assembling dynamically generated JavaScript on runtime in-browser.

    Generalizing the Threat and Expanding the Attack Surface

    Alternate Methods to Request LLM API

    Our attack model, demonstrated through a PoC, could be implemented in various ways. However, each methodology described in the PoC speaks to how an attacker connects to LLM APIs for transferring malicious code as snippets that are executed in the browser at runtime.

    As shown in our PoC, attackers could bypass security measures by directly connecting to a well-known LLM service API endpoint from a browser to execute code-generation prompts. Alternatively, they might use a backend proxy server on trusted domains or content delivery networks (CDNs) to connect to the LLM service for prompt execution. A further tactic could involve connecting to this backend proxy server via non-HTTP connections such as WebSockets, a method we have previously reported in phishing campaigns.

    Other Abuses of Trusted Domains

    Attackers have abused the trust of legitimate domains to circumvent detections in the past, as seen in instances like EtherHiding. In EtherHiding, attackers concealed malicious payloads on public blockchains associated with reputable and trusted smart contract platforms.

    The attack detailed in this article uses a combination of diverse, LLM-generated malicious code snippets and the transmission of this malicious code through a trusted domain, to evade detection.

    Translation of Malicious Code Into Text Prompts for More Attacks

    This article focuses on the conversion of malicious JavaScript code into a text prompt to facilitate the rendering of a phishing webpage. This methodology presents a potential vector for malicious actors to generate diverse forms of hostile code. For example, they could develop malware or establish a command-and-control (C2) channel on a compromised machine that generates and transmits malicious code from trusted domains associated with popular LLMs.

    Attacks Leveraging In-Browser Runtime Assembly Behaviors

    The attack model presented here exemplifies runtime assembly behaviors, where malicious webpages are dynamically constructed within a browser. Prior research has also documented different variants of runtime assembly for crafting phishing pages or malware delivery. For example, this article mentions a technique where an attacker breaks down malicious code into smaller components, subsequently reassembling them for execution at runtime within the browser (termed by SquareX as last mile reassembling attack). Various reports describe attackers using HTML smuggling techniques to deliver malware.

    The attack model outlined in this post goes further, as it involves the runtime generation of novel script variants that are later assembled and executed, posing a significantly elevated challenge to detection.

    Recommendations for Defenders

    The dynamic nature of this attack in combination with runtime assembly in the browser makes it a formidable defense challenge. This attack model creates a unique variant for every victim. Each malicious payload is dynamically generated and unique, transmitted over a trusted domain.

    This scenario signals a critical shift in the security landscape. Detection of these attacks (while possible through enhanced browser-based crawlers) ​​requires runtime behavioral analysis within the browser.

    Defenders should also restrict the use of unsanctioned LLM services at workplaces. While this is not a complete solution, it can serve as an important preventative measure.

    Finally, our work highlights the need for more robust safety guardrails in LLM platforms, as we demonstrated how careful prompt engineering can circumvent existing protections and enable malicious use.

    Conclusion

    This article demonstrates a novel AI-augmented approach where a malicious webpage uses LLM services to dynamically generate numerous variants of malicious code in real-time within the browser. To combat this, the most effective strategy is runtime behavioral analysis at the point of execution through in-browser protection and by running offline analysis with browser-based sandboxes that render the final webpage.

    Palo Alto Networks Protection and Mitigation

    Palo Alto Networks customers are better protected from the threats discussed above through the following products and services:

    Prisma AIRS customers can secure their in-house built GenAI applications against inputs that attempt to circumvent guardrails.

    Customers using Advanced URL Filtering and Prisma Browser (with Advanced Web Protection) are better protected against various runtime assembly attacks.

    Prisma Browser customers with Advanced Web Protection are protected against Runtime Re-assembly attacks from the first attempt, or “patient zero” hit, because the defense uses runtime behavioral analysis directly within the browser to detect and block malicious activity at the point of execution.

    The Unit 42 AI Security Assessment can help empower safe AI use and development across your organization.

    If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:

    • North America: Toll Free: +1 (866) 486-4842 (866.4.UNIT42)
    • UK: +44.20.3743.3660
    • Europe and Middle East: +31.20.299.3130
    • Asia: +65.6983.8730
    • Japan: +81.50.1790.0200
    • Australia: +61.2.4062.7950
    • India: 000 800 050 45107
    • South Korea: +82.080.467.8774

    Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance.

    Additional Resources

    Continue Reading