EU targets Meta over WhatsApp AI access restrictions

Help Net Security

Overview

The European Commission is taking action against Meta, alleging that the company violated EU competition laws by restricting access to WhatsApp for third-party AI assistants. In a change announced on October 15, 2025, Meta updated its WhatsApp Business Solution Terms, effectively preventing outside AI programs from interacting with users on the platform. Since January 15, 2026, Meta's own AI assistant has been the only one allowed on WhatsApp. The Commission is planning to impose interim measures while investigating these practices. This situation raises concerns about competition and innovation in the AI space, as limiting access could stifle the development of alternative AI solutions that could benefit users.

Key Takeaways

  • Affected Systems: WhatsApp, Meta AI, third-party AI assistants
  • Timeline: Ongoing since January 2026

Original Article Summary

The European Commission believes Meta breached EU competition rules by blocking other AI assistants from accessing and interacting with users on WhatsApp. The case centers on a change Meta announced on 15 October 2025 to the WhatsApp Business Solution Terms. The update effectively blocked third-party, general-purpose AI assistants from operating on WhatsApp. Since 15 January 2026, Meta AI has been the only AI assistant available on the app. The Commission plans to impose interim measures … More → The post EU targets Meta over WhatsApp AI access restrictions appeared first on Help Net Security.

Impact

WhatsApp, Meta AI, third-party AI assistants

Exploitation Status

No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.

Timeline

Ongoing since January 2026

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Update, Meta.

Related Coverage

Hackers Deliver Global Group Ransomware Offline via Phishing Emails

Hackread – Cybersecurity News, Data Breaches, AI and More

A new strain of ransomware known as Global Group is being distributed through phishing emails. This malware is particularly concerning because it can encrypt files without requiring an internet connection, meaning that even offline systems are at risk. Organizations and individuals who fall victim to these phishing attacks could face significant data loss and operational disruptions. Cybersecurity experts warn that the ease of delivery via email makes this a widespread threat that could affect various sectors. Users are advised to be cautious with unsolicited emails and to implement robust security measures to protect against potential attacks.

Feb 9, 2026

TeamPCP Turns Cloud Infrastructure into Crime Bots

darkreading

A group known as TeamPCP has been targeting cloud infrastructures with automated attacks that resemble worm-like behavior. These attacks exploit exposed services and interfaces, allowing the attackers to compromise cloud environments on a large scale. Organizations using cloud services need to be particularly vigilant, as these automated attacks can lead to significant data breaches and operational disruptions. The scale of these attacks poses a serious risk to businesses that may not have adequate security measures in place to protect their cloud environments. Companies are urged to strengthen their defenses against these types of vulnerabilities to prevent falling victim to such automated threats.

Feb 9, 2026

Hackers exploit SolarWinds WHD flaws to deploy DFIR tool in attacks

BleepingComputer

Hackers are exploiting vulnerabilities in SolarWinds Web Help Desk (WHD) to gain unauthorized access to systems. This allows them to execute code on affected machines, deploying legitimate forensic tools like Velociraptor to maintain persistence and enable remote control. Organizations using SolarWinds WHD should be particularly vigilant, as these vulnerabilities can lead to serious security breaches. The situation underscores the need for companies to regularly update and patch their systems to protect against such attacks. Users of the software must act quickly to ensure their environments are secure.

Feb 9, 2026

Hackers breach SmarterTools network using flaw in its own software

BleepingComputer

SmarterTools has reported that its network was breached by the Warlock ransomware gang, which gained access through a vulnerability in the company's email system. Fortunately, this incident did not compromise any business applications or account data, meaning that sensitive user information remains secure. However, the breach raises concerns about the security of email systems and the potential for ransomware attacks targeting software vulnerabilities. Organizations using SmarterTools should review their email security practices and ensure they are employing appropriate safeguards against such threats. This incident serves as a reminder that even established software can have weaknesses that attackers might exploit.

Feb 9, 2026

Cyber Attack Hits European Commission Staff Mobile Systems

Hackread – Cybersecurity News, Data Breaches, AI and More

The European Commission has reported a cyber attack on its mobile infrastructure, which potentially exposed the names and phone numbers of its staff members. This breach raises concerns about the security of sensitive personal information within a major governmental body. Such incidents can lead to targeted phishing attacks and further exploitation of the compromised data. The European Commission has not disclosed specific details about how the attack occurred or whether it has affected other systems. The revelation serves as a reminder of the ongoing risks faced by public institutions in safeguarding their digital assets.

Feb 9, 2026

Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme

Infosecurity Magazine

Two men from Connecticut have been charged with a federal crime for allegedly running a fraudulent scheme that targeted online gambling platforms, swindling approximately $3 million. The accused reportedly used sophisticated techniques to manipulate betting systems, allowing them to place bets without the necessary funds. This case raises concerns about the security measures employed by online gambling sites and highlights the vulnerabilities that can be exploited by fraudsters. The investigation into their activities suggests that such schemes could undermine the integrity of online gaming, affecting both the platforms and their users. Law enforcement is taking this case seriously, as it not only involves financial loss but also potential impacts on the reputation and trustworthiness of online gambling environments.

Feb 9, 2026