
Executive Orders Likely Ahead in Next Steps for National Cyber Strategy
National Cyber Director Sean Cairncross said the White House will likely issue additional executive orders to flesh out the cyber strategy released in March. The administration already issued an executive order targeting cyber‑enabled fraud on the same day the strategy was published. Cairncross highlighted the first conviction under the Take It Down Act, which tackles AI‑generated non‑consensual content, and noted ongoing reviews of Anthropic’s Claude Mythos AI model for security risks. He emphasized close inter‑agency and industry collaboration as the next phase of implementation will arrive soon.
We’re only Seeing the Tip of the Chip-Smuggling Iceberg
Federal prosecutors have charged six individuals in three separate cases for smuggling roughly $2.5 billion worth of advanced AI chips to China, using complex routes through Taiwan, Thailand and other Southeast Asian hubs. The indictments expose how current U.S. export controls...

Microsoft Drops Its Second-Largest Monthly Batch of Defects on Record
Microsoft’s April Patch Tuesday addressed 165 vulnerabilities, the second‑largest monthly release in the company’s history. The update includes an actively exploited zero‑day in Office SharePoint (CVE‑2026‑32201) and a high‑severity Defender flaw (CVE‑2026‑33825) with public exploit code. Trend Micro’s Dustin Childs...
Space Force Official Touts AI’s Impact on Cyber Compliance
Space Force acting cyber chief Seth Whitworth says large language models are reshaping how the service reviews cyber risk and achieves compliance. He highlighted that AI can automatically patch minor misconfigurations that often serve as entry points for state‑sponsored actors....

Black Basta’s Playbook Lives on as Former Affiliates Launch Fast-Scale Intrusion Campaign
A loose network of former Black Basta affiliates has launched a fast‑scale intrusion campaign, targeting over 100 senior employees across dozens of organizations. The attackers employ mass email bombing and Microsoft Teams help‑desk impersonation to gain rapid remote access, often...

Secretary Mullin Must Help Finish the Job: Urge the Senate to Confirm Plankey
On March 23 the Senate confirmed Markwayne Mullin as homeland security secretary, but the Cybersecurity and Infrastructure Security Agency (CISA) still lacks a Senate‑confirmed director. The vacancy leaves the nation’s primary civilian cyber‑defense agency without clear authority to set priorities,...

OpenAI’s Mac Apps Need Updates Thanks to the Axios Hack
OpenAI updated its macOS security certificates and is requiring users to install the latest app versions after a supply‑chain attack on the popular Axios npm library compromised its signing workflow. The attack, linked to North Korean hacking group UNC1069, injected...
Commerce Setting up New AI Export Regime to Push Adoption of ‘American AI’ Abroad
The U.S. Department of Commerce announced a new "American AI" export program, inviting companies to submit full‑stack AI solutions for a government‑backed catalog. Designated packages will receive priority export licensing, inter‑agency coordination, and financing referrals, as mandated by President Trump’s...

Inside the FBI’s Router Takedown that Cut Off APT28’s ‘Tremendous Access’
The FBI’s Operation Masquerade forced a reset of DNS settings on more than 18,000 compromised TP‑Link routers, cutting off Russian GRU‑linked APT28 (Fancy Bear) from infiltrating over 200 organizations worldwide. By targeting the routers themselves, the agency blocked the malicious IP...

Don’t Just Fight Fraud, Hunt It
The article warns that AI has transformed fraud into an industrialized, global enterprise that can create tens of thousands of synthetic identities in days. Traditional detection methods—such as tracking reused emails or devices—are rapidly losing relevance, with unique email patterns...

Hack-for-Hire Spyware Campaign Targets Journalists in Middle East, North Africa
A suspected Indian‑linked hack‑for‑hire group, identified as the Bitter APT, has been deploying Android ProSpy spyware against journalists and activists across the Middle East and North Africa. The campaign, active since at least 2022, uses spear‑phishing messages from fake social‑media...

Tech Giants Launch AI-Powered ‘Project Glasswing’ to Identify Critical Software Vulnerabilities
Anthropic unveiled Project Glasswing, a coalition of Amazon, Apple, Broadcom, Cisco, CrowdStrike, the Linux Foundation, Microsoft and Palo Alto Networks that will use the unreleased Claude Mythos Preview AI model to hunt for hidden software flaws. In early testing the...

Iranian Hackers Launching Disruptive Attacks at U.S. Energy, Water Targets, Feds Warn
U.S. federal agencies have issued a joint alert that Iranian‑affiliated advanced persistent threat actors are exploiting internet‑facing operational technology, specifically programmable logic controllers (PLCs) from Rockwell Automation/Allen‑Bradley. The attacks have disrupted PLC functions across energy, water, and government sectors, manipulating...

PcTattleTale Stalkerware Maker Sentence Includes Fine, Supervised Release
A federal judge sentenced Bryan Fleming, the creator of pcTattleTale stalkerware, to supervised release and a $5,000 fine after he pleaded guilty to manufacturing a device for covert communication interception. The case marks the first stalkerware conviction since 2014, when...
Akira Ransomware Group Can Achieve Initial Access to Data Encryption in Less than an Hour
The Akira ransomware group can move from initial access to full data encryption in under an hour, often within four hours. Active since 2023, it has extorted roughly $245 million in ransom payments through September 2025. Akira leverages zero‑day exploits, vulnerable VPNs,...