CyberScoop

CyberScoop

Publication
0 followers

U.S. cyber policy, government cyber defense.

We’re only Seeing the Tip of the Chip-Smuggling Iceberg
NewsApr 15, 2026

We’re only Seeing the Tip of the Chip-Smuggling Iceberg

Federal prosecutors have charged six individuals in three separate cases for smuggling roughly $2.5 billion worth of advanced AI chips to China, using complex routes through Taiwan, Thailand and other Southeast Asian hubs. The indictments expose how current U.S. export controls...

By CyberScoop
Microsoft Drops Its Second-Largest Monthly Batch of Defects on Record
NewsApr 14, 2026

Microsoft Drops Its Second-Largest Monthly Batch of Defects on Record

Microsoft’s April Patch Tuesday addressed 165 vulnerabilities, the second‑largest monthly release in the company’s history. The update includes an actively exploited zero‑day in Office SharePoint (CVE‑2026‑32201) and a high‑severity Defender flaw (CVE‑2026‑33825) with public exploit code. Trend Micro’s Dustin Childs...

By CyberScoop
Space Force Official Touts AI’s Impact on Cyber Compliance
NewsApr 14, 2026

Space Force Official Touts AI’s Impact on Cyber Compliance

Space Force acting cyber chief Seth Whitworth says large language models are reshaping how the service reviews cyber risk and achieves compliance. He highlighted that AI can automatically patch minor misconfigurations that often serve as entry points for state‑sponsored actors....

By CyberScoop
Black Basta’s Playbook Lives on as Former Affiliates Launch Fast-Scale Intrusion Campaign
NewsApr 14, 2026

Black Basta’s Playbook Lives on as Former Affiliates Launch Fast-Scale Intrusion Campaign

A loose network of former Black Basta affiliates has launched a fast‑scale intrusion campaign, targeting over 100 senior employees across dozens of organizations. The attackers employ mass email bombing and Microsoft Teams help‑desk impersonation to gain rapid remote access, often...

By CyberScoop
Secretary Mullin Must Help Finish the Job: Urge the Senate to Confirm Plankey
NewsApr 14, 2026

Secretary Mullin Must Help Finish the Job: Urge the Senate to Confirm Plankey

On March 23 the Senate confirmed Markwayne Mullin as homeland security secretary, but the Cybersecurity and Infrastructure Security Agency (CISA) still lacks a Senate‑confirmed director. The vacancy leaves the nation’s primary civilian cyber‑defense agency without clear authority to set priorities,...

By CyberScoop
OpenAI’s Mac Apps Need Updates Thanks to the Axios Hack
NewsApr 13, 2026

OpenAI’s Mac Apps Need Updates Thanks to the Axios Hack

OpenAI updated its macOS security certificates and is requiring users to install the latest app versions after a supply‑chain attack on the popular Axios npm library compromised its signing workflow. The attack, linked to North Korean hacking group UNC1069, injected...

By CyberScoop
Commerce Setting up New AI Export Regime to Push Adoption of ‘American AI’ Abroad
NewsApr 10, 2026

Commerce Setting up New AI Export Regime to Push Adoption of ‘American AI’ Abroad

The U.S. Department of Commerce announced a new "American AI" export program, inviting companies to submit full‑stack AI solutions for a government‑backed catalog. Designated packages will receive priority export licensing, inter‑agency coordination, and financing referrals, as mandated by President Trump’s...

By CyberScoop
Inside the FBI’s Router Takedown that Cut Off APT28’s ‘Tremendous Access’
NewsApr 9, 2026

Inside the FBI’s Router Takedown that Cut Off APT28’s ‘Tremendous Access’

The FBI’s Operation Masquerade forced a reset of DNS settings on more than 18,000 compromised TP‑Link routers, cutting off Russian GRU‑linked APT28 (Fancy Bear) from infiltrating over 200 organizations worldwide. By targeting the routers themselves, the agency blocked the malicious IP...

By CyberScoop
Don’t Just Fight Fraud, Hunt It
NewsApr 9, 2026

Don’t Just Fight Fraud, Hunt It

The article warns that AI has transformed fraud into an industrialized, global enterprise that can create tens of thousands of synthetic identities in days. Traditional detection methods—such as tracking reused emails or devices—are rapidly losing relevance, with unique email patterns...

By CyberScoop
Hack-for-Hire Spyware Campaign Targets Journalists in Middle East, North Africa
NewsApr 8, 2026

Hack-for-Hire Spyware Campaign Targets Journalists in Middle East, North Africa

A suspected Indian‑linked hack‑for‑hire group, identified as the Bitter APT, has been deploying Android ProSpy spyware against journalists and activists across the Middle East and North Africa. The campaign, active since at least 2022, uses spear‑phishing messages from fake social‑media...

By CyberScoop
Tech Giants Launch AI-Powered ‘Project Glasswing’ to Identify Critical Software Vulnerabilities
NewsApr 7, 2026

Tech Giants Launch AI-Powered ‘Project Glasswing’ to Identify Critical Software Vulnerabilities

Anthropic unveiled Project Glasswing, a coalition of Amazon, Apple, Broadcom, Cisco, CrowdStrike, the Linux Foundation, Microsoft and Palo Alto Networks that will use the unreleased Claude Mythos Preview AI model to hunt for hidden software flaws. In early testing the...

By CyberScoop
Iranian Hackers Launching Disruptive Attacks at U.S. Energy, Water Targets, Feds Warn
NewsApr 7, 2026

Iranian Hackers Launching Disruptive Attacks at U.S. Energy, Water Targets, Feds Warn

U.S. federal agencies have issued a joint alert that Iranian‑affiliated advanced persistent threat actors are exploiting internet‑facing operational technology, specifically programmable logic controllers (PLCs) from Rockwell Automation/Allen‑Bradley. The attacks have disrupted PLC functions across energy, water, and government sectors, manipulating...

By CyberScoop
PcTattleTale Stalkerware Maker Sentence Includes Fine, Supervised Release
NewsApr 6, 2026

PcTattleTale Stalkerware Maker Sentence Includes Fine, Supervised Release

A federal judge sentenced Bryan Fleming, the creator of pcTattleTale stalkerware, to supervised release and a $5,000 fine after he pleaded guilty to manufacturing a device for covert communication interception. The case marks the first stalkerware conviction since 2014, when...

By CyberScoop
Akira Ransomware Group Can Achieve Initial Access to Data Encryption in Less than an Hour
NewsApr 2, 2026

Akira Ransomware Group Can Achieve Initial Access to Data Encryption in Less than an Hour

The Akira ransomware group can move from initial access to full data encryption in under an hour, often within four hours. Active since 2023, it has extorted roughly $245 million in ransom payments through September 2025. Akira leverages zero‑day exploits, vulnerable VPNs,...

By CyberScoop
CyberScoop | Pulse