- Trump’s cyber chief pick tells lawmakers he’ll assess efficacy of Cybercom-NSA dual-hat role, if confirmedby Greg Otto on January 15, 2026 at 10:56 pm
“If I’m confirmed for this, I think my role is to be objective about that as that comes up, or if it continues to come up as a topic,” Rudd said. The post Trump’s cyber chief pick tells lawmakers he’ll assess efficacy of Cybercom-NSA dual-hat role, if confirmed appeared first on CyberScoop.
- CISA’s secure-software buying tool had a simple XSS vulnerability of its ownby Tim Starks on January 15, 2026 at 10:47 pm
A researcher who discovered the vulnerability said it was fixed in December, after he first reported it to the agency in September. The post CISA’s secure-software buying tool had a simple XSS vulnerability of its own appeared first on CyberScoop.
- The quiet way AI normalizes foreign influenceby Greg Otto on January 15, 2026 at 2:30 pm
Americans are learning to “trust the citations” in AI-generated answers—but AI doesn’t reward credibility, it rewards access. The post The quiet way AI normalizes foreign influence appeared first on CyberScoop.
- Sources: DHS finalizing replacement for disbanded critical infrastructure security council by djohnson on January 14, 2026 at 8:18 pm
ANCHOR will restart conversations between government and industry around critical infrastructure security, with some changes around liability and other areas. The post Sources: DHS finalizing replacement for disbanded critical infrastructure security council appeared first on CyberScoop.
- Kimwolf botnet’s swift rise to 2M infected devices agitates security researchersby Matt Kapko on January 14, 2026 at 8:00 pm
The botnet took an unusual path by abusing residential proxy networks, allowing it to control an untapped collection of unofficial Android TV devices. The post Kimwolf botnet’s swift rise to 2M infected devices agitates security researchers appeared first on CyberScoop.
- California AG launches investigation into X’s sexualized deepfakesby Greg Otto on January 14, 2026 at 7:36 pm
California Attorney General Rob Bonta announced an investigation Wednesday into xAI over allegations that its artificial intelligence model Grok is being used to create nonconsensual sexually explicit images of women and children on a large scale, marking the latest escalation in regulatory efforts to address AI-generated deepfakes. The California investigation focuses on Grok’s “spicy mode,” The post California AG launches investigation into X’s sexualized deepfakes appeared first on CyberScoop.
- Predator spyware demonstrates troubleshooting, researcher-dodging capabilitiesby Tim Starks on January 14, 2026 at 6:16 pm
It’s the latest batch of revelations about what makes the Intellexa-made spyware stand out from competitors. The post Predator spyware demonstrates troubleshooting, researcher-dodging capabilities appeared first on CyberScoop.
- Microsoft seizes RedVDS infrastructure, disrupts fast-growing cybercrime marketplaceby Matt Kapko on January 14, 2026 at 3:00 pm
The service became a prolific tool for cybercriminals in the past year, as it facilitated thousands of attacks involving credential theft, account takeovers, mass phishing and payment diversion fraud. The post Microsoft seizes RedVDS infrastructure, disrupts fast-growing cybercrime marketplace appeared first on CyberScoop.
- Sean Plankey re-nominated to lead CISAby Tim Starks on January 13, 2026 at 11:50 pm
President Donald Trump resubmitted his nomination Tuesday after it stalled in the Senate last year. The post Sean Plankey re-nominated to lead CISA appeared first on CyberScoop.
- Microsoft Patch Tuesday addresses 112 defects, including one actively exploited zero-dayby Matt Kapko on January 13, 2026 at 10:35 pm
Researchers said the information disclosure zero-day exposes sensitive information that attackers can use to undermine defenses and make other exploits more reliable. The post Microsoft Patch Tuesday addresses 112 defects, including one actively exploited zero-day appeared first on CyberScoop.
CyberScoop
We are an ethical website cyber security team and we perform security assessments to protect our clients.





