- Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacksby Matt Kapko on February 25, 2026 at 1:30 pm
Too many defenders and researchers are paying attention to defects and unsubstantiated exploit concepts that arenât worth their time, VulnCheckâs Caitlin Condon said. The post Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks appeared first on CyberScoop.
- Chinese groupâs ChatGPT use reveals worldwide harassment campaign against criticsby djohnson on February 25, 2026 at 10:00 am
OpenAI said a Chinese law enforcement agency uploaded reports to ChatGPT that details a worldwide digital operation to track and silence regime critics at home and abroad. The post Chinese groupâs ChatGPT use reveals worldwide harassment campaign against critics appeared first on CyberScoop.
- Anthropic rolls out embedded security scanning for Claude by djohnson on February 20, 2026 at 9:40 pm
The feature, currently limited to a small group of testers, will provide an easy-to-use feature that scans AI-generated code and offers up patching solutions. The post Anthropic rolls out embedded security scanning for Claude appeared first on CyberScoop.
- State Dept. official says post-quantum transition plans will outlive current leadershipby djohnson on February 19, 2026 at 8:43 pm
Governments and businesses have a shared interest in seeing post-quantum encryption broadly adopted throughout society. The post State Dept. official says post-quantum transition plans will outlive current leadership appeared first on CyberScoop.
- Unit 42: Nearly two-thirds of breaches now start with identity abuseby Matt Kapko on February 17, 2026 at 11:00 am
Palo Alto Networkâs incident response firm said identity-based attacks are exploding as poor security controls stretch across a widening mosaic of integrated tools and systems. The post Unit 42: Nearly two-thirds of breaches now start with identity abuse appeared first on CyberScoop.
- Google finds state-sponsored hackers use AI at âall stagesâ of attack cycle by djohnson on February 12, 2026 at 9:24 pm
The research underscores how AI tools have matured in their cyber offensive capabilities, even as it doesnât reveal novel or paradigm shifting uses of the technology. The post Google finds state-sponsored hackers use AI at âall stagesâ of attack cycle appeared first on CyberScoop.
- DHS privacy probe will focus on biometric tracking by ICE, OBIMby djohnson on February 6, 2026 at 10:32 pm
Auditors told CyberScoop the probe could expand to other parts of DHS and will look at the agencyâs increasing use of biometric markers in immigration enforcement. The post DHS privacy probe will focus on biometric tracking by ICE, OBIM appeared first on CyberScoop.
- WhatsApp releases account feature that looks to combat spywareby Tim Starks on January 27, 2026 at 5:18 pm
The new âStrict Account Settingsâ toggle extends WhatsAppâs privacy push beyond end-to-end encryption. The post WhatsApp releases account feature that looks to combat spyware appeared first on CyberScoop.
- CISA publishes a post-quantum shopping list for agencies. Security professionals arenât soldby djohnson on January 27, 2026 at 12:20 am
A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be updated. The post CISA publishes a post-quantum shopping list for agencies. Security professionals arenât sold appeared first on CyberScoop.
- Predator spyware demonstrates troubleshooting, researcher-dodging capabilitiesby Tim Starks on January 14, 2026 at 6:16 pm
Itâs the latest batch of revelations about what makes the Intellexa-made spyware stand out from competitors. The post Predator spyware demonstrates troubleshooting, researcher-dodging capabilities appeared first on CyberScoop.
Technology Cyberscoop
We are an ethical website cyber security team and we perform security assessments to protect our clients.






