- NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilitiesby Matt Kapko on April 15, 2026 at 8:17 pm
The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation. The post NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities appeared first on CyberScoop.
- Executive orders likely ahead in next steps for national cyber strategyby Tim Starks on April 15, 2026 at 6:51 pm
National Cyber Director Sean Cairncross said execution of the strategy is “rolling forward actively.” The post Executive orders likely ahead in next steps for national cyber strategy appeared first on CyberScoop.
- OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model by djohnson on April 15, 2026 at 1:59 pm
A new cybersecurity-focused variant of ChatGPT and an expanded access program put OpenAI in direct competition with Anthropic’s Project Glasswing — and raises fresh questions about who gets to wield the most powerful security AI. The post OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model appeared first on CyberScoop.
- We’re only seeing the tip of the chip-smuggling icebergby Greg Otto on April 15, 2026 at 10:00 am
A string of federal indictments has exposed a pervasive shadow network of data centers and fake products spanning Southeast Asia. To secure national security, the U.S. must move enforcement from the airport gate to the factory floor. The post We’re only seeing the tip of the chip-smuggling iceberg appeared first on CyberScoop.
- CISA cancels summer internships for cyber scholarship students amid DHS funding lapseby Greg Otto on April 14, 2026 at 11:17 pm
The move adds to mounting pressure on a scholarship program already strained by hiring freezes, proposed budget cuts and a growing backlog of unplaced graduates. The post CISA cancels summer internships for cyber scholarship students amid DHS funding lapse appeared first on CyberScoop.
- Microsoft drops its second-largest monthly batch of defects on recordby Matt Kapko on April 14, 2026 at 8:27 pm
The vendor disclosed one actively exploited zero-day vulnerability in Microsoft Office SharePoint that allows attackers to view information and make changes to disclosed information. The post Microsoft drops its second-largest monthly batch of defects on record appeared first on CyberScoop.
- Space Force official touts AI’s impact on cyber complianceby djohnson on April 14, 2026 at 8:00 pm
The acting CISO said that AI is reshaping how the service measures and tracks cyber compliance, moving it from a box-checking exercise to something nimbler and more substantive. The post Space Force official touts AI’s impact on cyber compliance appeared first on CyberScoop.
- Black Basta’s playbook lives on as former affiliates launch fast-scale intrusion campaignby Matt Kapko on April 14, 2026 at 4:25 pm
The social engineering campaign spiked last month and has targeted dozens of organizations since May 2025, according to ReliaQuest. The post Black Basta’s playbook lives on as former affiliates launch fast-scale intrusion campaign appeared first on CyberScoop.
- Secretary Mullin must help finish the job: Urge the Senate to confirm Plankeyby Greg Otto on April 14, 2026 at 10:00 am
With global cyber threats escalating and budget cuts looming, CISA needs a Senate-confirmed director. It’s time to confirm Sean Plankey. The post Secretary Mullin must help finish the job: Urge the Senate to confirm Plankey appeared first on CyberScoop.
- Here’s how cyber heavyweights in the US and UK are dealing with Claude Mythosby djohnson on April 13, 2026 at 9:43 pm
Two reports from former high-level U.S. cyber officials and the UK government’s top AI research institution reveal how top defenders think about the tool’s hacking capabilities. The post Here’s how cyber heavyweights in the US and UK are dealing with Claude Mythos appeared first on CyberScoop.
CyberScoop
We are an ethical website cyber security team and we perform security assessments to protect our clients.






