<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CyberScoop</title>
	<atom:link href="https://cyberscoop.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cyberscoop.com/</link>
	<description></description>
	<lastBuildDate>Thu, 16 Apr 2026 23:06:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://cyberscoop.com/wp-content/uploads/sites/3/2023/01/cropped-cs_favicon-2.png?w=32</url>
	<title>CyberScoop</title>
	<link>https://cyberscoop.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>US nationals sentenced for aiding North Korea’s tech worker scheme</title>
		<link>https://cyberscoop.com/us-nationals-sentenced-facilitate-north-korea-tech-worker-scheme/</link>
		
		<dc:creator><![CDATA[Matt Kapko]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 23:05:57 +0000</pubDate>
				<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[dprk]]></category>
		<category><![CDATA[DTEX]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[laptop farms]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[North Korean IT workers]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88645</guid>

					<description><![CDATA[<p>Kejia Wang and Zhenxing Wang established shell companies and hosted laptop farms to help operatives obtain jobs at more than 100 U.S. companies.</p>
<p>The post <a href="https://cyberscoop.com/us-nationals-sentenced-facilitate-north-korea-tech-worker-scheme/">US nationals sentenced for aiding North Korea’s tech worker scheme</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Two New Jersey men were <a href="https://www.justice.gov/opa/pr/two-us-nationals-sentenced-facilitating-fraudulent-remote-information-technology-worker">sentenced</a> Wednesday for facilitating <a href="https://cyberscoop.com/north-korea-cybercrime-dtex-research-center-227/">North Korea’s long-running scheme</a> to plant operatives inside U.S. businesses as employees, generating more than $5 million in illicit revenue for the regime, the Justice Department said.&nbsp;</p>



<p>The U.S. nationals — Kejia Wang, also known as Tony Wang, and Zhenxing Wang, also known as Danny Wang — were part of a years-long conspiracy that placed operatives in jobs at more than 100 U.S. companies, including <a href="https://cyberscoop.com/north-korea-workers-infiltrate-fortune-500/">many Fortune 500 companies</a>, based in 27 states and the District of Columbia.</p>



<p>The elaborate scheme involved shell companies posing as software development firms, money laundering, and espionage with national security implications. Operatives involved in the conspiracy stole sensitive files from a California-based defense contractor related to U.S. military technology controlled under International Traffic in Arms Regulations (ITAR), officials said.</p>



<p>“Democratic People’s Republic of Korea (DPRK) IT workers are not limited to revenue generation. When tasked, they can operationalize their placement and access to support strategic intelligence requirements, including intellectual property theft, network disruption or extortion,” Michael Barnhart, nation state investigator at DTEX, told CyberScoop.</p>



<p>While most of North Korea’s scheme is focused on revenue, it sometimes applies a dual-use approach, tasking certain privileged IT workers with malicious activity aiding other state-backed hacking groups, Barnhart added.</p>



<p>“Not all IT workers can be hackers but every North Korean hacker can or has been an IT worker,” he said. “This distinction matters for insider‑threat analysis because unlike typical fraudulent hires motivated by personal financial gain, IT workers can inflict national‑security‑level damage.”</p>



<p>Kejia Wang, 42, Zhenzing Wang, 39, and their co-conspirators stole the identities of at least 80 U.S. residents to facilitate the hiring of North Korean operatives and collected at least $696,000 in fees combined, officials said. U.S. victim companies also incurred legal fees, remediation costs and other damages and losses exceeding $3 million.&nbsp;</p>



<p>Both men previously pleaded guilty to an assortment of crimes. Kejia Wang was sentenced to nine years in prison for conspiracy to commit wire and mail fraud, money laundering and identity theft. Zhenxing Wang was sentenced to 92 months in prison for conspiracy to commit wire and mail fraud and money laundering.&nbsp;</p>



<p>The pair were also ordered to forfeit a combined $600,000, of which two-thirds has already been paid, officials said.</p>



<p>The conspiracy, which ran from at least 2021 through October 2024, relied in part on shell companies — Hopana Tech, Tony WKJ and Independent Lab — the men set up to create the appearance of legitimate businesses.&nbsp;</p>



<p>“Pairing a U.S. person, a U.S. address, and a front company such as Independent Lab, the facilitators created the illusion of a legitimate domestic effort allowing the IT workers to present themselves as U.S.-based without triggering suspicion during onboarding or daily workflows,” Barnhart said.&nbsp;</p>



<p>“Front companies can act as that middle financial flow from victim companies back to DPRK units, which then pushes funds upward through the Workers’ Party of Korea to support whichever program the unit was aligned with, whether weapons development or domestic priorities,” he added.&nbsp;</p>



<p>These front companies reflect a higher level of tradecraft that exploits a weak spot in insider risk assessments because threats aren’t always a malicious person trying to break into a network, Barnhart said. “Sometimes it looks like an entire company appearing clean on paper.”</p>



<p>Authorities have responded to North Korea’s scheme by targeting U.S.-based facilitators who provide forged or stolen identities and <a href="https://cyberscoop.com/arizona-woman-arrested-and-charged-in-north-korean-it-worker-scheme/">laptop farms</a> for North Korean operatives, and <a href="https://cyberscoop.com/doj-north-korea-it-worker-scheme-cases-crypto-seized/">seizing cryptocurrency</a> linked to theft.&nbsp;</p>



<p>Law enforcement wins are stacking up, but researchers warn that North Korea’s operation is massive and consistently evolving.&nbsp;</p>



<p>The sentencing of Kejia Wang and Zhenxing Wang comes less than a month after a trio of American men were <a href="https://cyberscoop.com/north-korea-it-worker-scheme-three-sentenced/">sentenced for similar crimes</a>, including the operation of laptop farms, wire fraud and identity theft.&nbsp;</p>



<p>The Justice and Treasury Departments have also issued <a href="https://cyberscoop.com/doj-indicts-five-in-north-korean-fake-it-worker-scheme/">indictments</a> and <a href="https://cyberscoop.com/treasury-sanctions-north-korea-over-remote-it-worker-schemes/">sanctioned people and entities</a> allegedly involved in North Korea’s effort to send thousands of specialized technical professionals outside of the country to secure jobs under false pretenses and funnel their wages back to Pyongyang.</p>



<p>You can read the full indictments against Kejia Wang and Zhenxing Wang below.</p>



<div data-wp-interactive="core/file" class="wp-block-file"><object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/Kejia-Wang-indictment-6-27-25.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of Kejia-Wang-indictment-6-27-25."></object><a id="wp-block-file--media-7db0cd0a-39a2-4047-86f8-2f1d44c512de" href="https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/Kejia-Wang-indictment-6-27-25.pdf">Kejia-Wang-indictment-6-27-25</a><a href="https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/Kejia-Wang-indictment-6-27-25.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-7db0cd0a-39a2-4047-86f8-2f1d44c512de">Download</a></div>



<div data-wp-interactive="core/file" class="wp-block-file"><object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/Zhenxing-Wang-indictment-6-26-25.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of Zhenxing-Wang-indictment-6-26-25."></object><a id="wp-block-file--media-61aaf7a4-02c3-4e0e-97de-1859f3a18d57" href="https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/Zhenxing-Wang-indictment-6-26-25.pdf">Zhenxing-Wang-indictment-6-26-25</a><a href="https://cyberscoop.com/wp-content/uploads/sites/3/2026/04/Zhenxing-Wang-indictment-6-26-25.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-61aaf7a4-02c3-4e0e-97de-1859f3a18d57">Download</a></div>
<p>The post <a href="https://cyberscoop.com/us-nationals-sentenced-facilitate-north-korea-tech-worker-scheme/">US nationals sentenced for aiding North Korea’s tech worker scheme</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88645</post-id>	</item>
		<item>
		<title>Officials seize 53 DDoS-for-hire domains in ongoing crackdown</title>
		<link>https://cyberscoop.com/ddos-for-hire-takedowns-operation-poweroff/</link>
		
		<dc:creator><![CDATA[Matt Kapko]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 17:26:16 +0000</pubDate>
				<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[booter and stresser services]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DDoS-for-hire]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[law enforcement]]></category>
		<category><![CDATA[Operation PowerOFF]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88637</guid>

					<description><![CDATA[<p>Operation PowerOFF’s latest globally coordinated action identified more than 75,000 alleged cybercriminals. Officials warned each of them to stop jamming up traffic.</p>
<p>The post <a href="https://cyberscoop.com/ddos-for-hire-takedowns-operation-poweroff/">Officials seize 53 DDoS-for-hire domains in ongoing crackdown</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Authorities from 21 countries took down 53 domains and arrested four people allegedly involved in <a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-supported-global-operation-targets-over-75-000-users-engaged-in-ddos-attacks">distributed denial-of-service operations</a> used by more than 75,000 cybercriminals, Europol said Thursday.&nbsp;</p>



<p>The globally coordinated effort dubbed “<a href="https://www.operation-poweroff.com/">Operation PowerOFF</a>” disrupted booter services and seized and dismantled infrastructure, including servers and databases, that supported the DDoS-for-hire services, officials said.</p>



<p>Law enforcement agencies obtained data on more than 3 million alleged criminal user accounts from the seized databases, and ultimately sent more than 75,000 emails and letters to participants, warning them to halt their activities.</p>



<p>Officials from the countries involved in the operation also served 25 search warrants, removed more than 100 URLs advertising DDoS-for-hire services in search engine results and created search engine ads to target young people searching for DDoS-for-hire tools.</p>



<p>The operation, which is ongoing, primarily targets IP stressors or DDoS booters that cybercriminals use to inundate websites, servers and networks with junk traffic, rendering legitimate services inaccessible.&nbsp;</p>



<p>Officials described DDoS-for-hire tools as prolific and easily accessible, often including tutorials that allow non-tech savvy people to initiate attacks on various organizations.</p>



<p>“Attacks are often regionally focused, with users targeting servers and websites within their continent, and directed at a wide range of targets including online marketplaces, telecommunications providers and other web-based services,” Europol said in a news release. “Motivations vary from curiosity to ideological purposes linked to hacktivism, as well as financial gain through extortion or the disruption of competitors’ services.”</p>



<p>Operation PowerOFF is supported by multiple law enforcement agencies from the United States, United Kingdom, Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, the Netherlands, Norway, Poland, Portugal, Sweden and Thailand.</p>



<p>The international crackdown <a href="https://cyberscoop.com/international-crackdown-disrupts-ddos-for-hire-operations/">disrupted other popular DDoS-for-hire services</a> in late 2024, netting three arrests and 27 domain takedowns. Authorities in Poland in May <a href="https://cyberscoop.com/poland-ddos-arrests-europol-operation-poweroff/">arrested four alleged administrators</a> of DDoS-for-hire tools that cybercriminals used to launch thousands of attacks from 2022 to 2025.</p>
<p>The post <a href="https://cyberscoop.com/ddos-for-hire-takedowns-operation-poweroff/">Officials seize 53 DDoS-for-hire domains in ongoing crackdown</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88637</post-id>	</item>
		<item>
		<title>Ghost breaches: How AI-mediated narratives have become a new threat vector</title>
		<link>https://cyberscoop.com/ai-generated-breach-narratives-ghost-threat-vector-op-ed/</link>
		
		<dc:creator><![CDATA[Greg Otto]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:00:00 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Artificial Intelligence (AI)]]></category>
		<category><![CDATA[crisis communications]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[op-ed]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88624</guid>

					<description><![CDATA[<p>Three incidents. No actual breaches. Full-scale crisis response. AI hallucinations are creating a new threat vector that most organizations have yet to prepare for.</p>
<p>The post <a href="https://cyberscoop.com/ai-generated-breach-narratives-ghost-threat-vector-op-ed/">Ghost breaches: How AI-mediated narratives have become a new threat vector</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><br>A company wakes up to a news story claiming it has suffered a major data breach. The details are specific, technical and convincing. But the breach didn’t happen. No systems were compromised. No data was taken. A language model generated the entire story, filling in plausible details from scratch. And before the company can figure out what’s going on, a reporter at a reputable outlet picks up the story and requests comment. Within hours, the company is drafting statements and mobilizing its communications team to address a fictional event.</p>



<p>A second incident begins with something real. Years earlier, a company had suffered a genuine <a href="https://cyberscoop.com/tag/data-breach/">breach</a> that received wide media coverage. The incident was investigated, resolved and closed. Then one of the outlets that originally reported on it redesigned its website. Old articles received new URLs and updated timestamps, and search engines re-indexed them as fresh content. AI-powered news aggregators picked up the signal and flagged it as a developing story. The company found itself fielding inquiries about an incident that had been resolved years before.</p>



<p><em>[Ed. note: The authors are withholding full specifics about the incidents because full disclosure could cause harm, yet CyberScoop confirmed with the authors that the incidents did in fact take place].</em></p>



<p>A third incident introduces yet another dimension. A cybersecurity publication ran a story about a business email compromise attack that cost a UK company close to a billion pounds. The article quoted <a href="https://www.linkedin.com/posts/kevin-beaumont-security_im-quoted-in-this-tech-buzz-piece-today-activity-7448282628446646272-6RPO?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAI7TvYB6bkVgqFeg82r-7xygvq6uWR7awo">a well-known security researcher</a>, yet in reality, he had not spoken to the publication. <a href="https://cyberscoop.com/tag/artificial-intelligence-ai/">AI</a> generated the quotes, assigned them to him with full confidence, and the publication ran them as fact.</p>



<p>Together, these three cases expose a threat that most organizations have yet to prepare for. AI has developed the ability to fabricate convincing security incidents from nothing, complete with technical detail, named sources, and enough credibility to trigger full-scale crisis responses. Any organization that treats this as a distant or theoretical problem risks learning the hard way just how fast AI-generated fiction can become a real-world emergency.</p>



<h4 class="wp-block-heading" id="h-the-assumption-that-no-longer-holds">The assumption that no longer holds</h4>



<p>Cyber crisis response has always been built on a simple premise: something real happens, then you respond. That premise is breaking. AI systems now generate, amplify, and validate claims before security teams have confirmed anything. Once a narrative enters the ecosystem, it can be ingested into <a href="https://cyberscoop.com/tag/threat-intelligence/">threat intelligence</a> feeds, risk scoring platforms, and automated workflows. Fiction becomes signal.</p>



<p>For security teams, this creates a new class of false positive. Not a noisy alert from a misconfigured tool, but a fully formed external narrative that appears credible. A hallucinated breach can trigger internal investigations, executive escalation, and defensive actions. Time and resources get diverted toward disproving something that never happened.</p>



<p>Worse, it can influence real attacker behavior. Threat actors can weaponize fabricated breach narratives as pretext. Phishing emails referencing a “known incident” become more believable. Impersonation of IT or incident response teams becomes more effective. The narrative becomes part of the attack surface.</p>



<h4 class="wp-block-heading" id="h-what-this-means-for-security-teams">What this means for security teams</h4>



<p>Security teams are used to monitoring for indicators of compromise. They now need to monitor for indicators of narrative. Open source intelligence pipelines are increasingly automated. If those pipelines ingest false information, downstream systems will act on it. That includes SIEM enrichment, third-party risk scoring, and even automated containment decisions in some environments.</p>



<p>The practical implication is that security teams need visibility into how their organization is being represented externally, not just what is happening internally. This is not traditional threat intelligence, but it behaves like it. Early detection changes outcomes.</p>



<p>There is also a need for tighter integration with communications. When a false narrative emerges, the technical reality and the external perception diverge. Both need to be managed in parallel.</p>



<h4 class="wp-block-heading" id="h-what-this-means-for-communications-teams">What this means for communications teams</h4>



<p>For communications teams, the timeline has collapsed. The first signal of a “breach” may not come from the SOC. It may come from a journalist, a customer, or an automated alert.</p>



<p>Silence is no longer neutral. If a narrative exists, AI systems will fill gaps with whatever information is available. That can reinforce inaccuracies with each iteration. Responses need to be designed for machine consumption as well as human audiences. Clear, declarative language. Verifiable facts. Structured statements that can be easily parsed and reused. The goal is to establish a competitive presence in the information supply chain.</p>



<p>Preparation becomes critical. Pre-approved language that can be deployed quickly. Established coordination with legal and security before something surfaces.</p>



<h4 class="wp-block-heading" id="h-shared-implications">Shared implications</h4>



<p>Both security and communications teams are now operating in the same environment, whether they recognize it or not. A hallucinated breach can trigger real operational disruption. Vendor relationships may be paused, connections to third-party systems may be severed, regulators may take interest, and markets may react. None of that requires an actual compromise. And this creates a feedback loop. External narratives drive internal actions. Internal actions, if visible, reinforce external narratives.</p>



<p>Breaking that loop requires speed, coordination, and clarity.</p>



<h4 class="wp-block-heading" id="h-ai-audits-as-a-control-mechanism">AI audits as a control mechanism</h4>



<p>One of the most effective controls in this new environment is systematic AI auditing. Regularly testing how AI systems describe your organization, your security posture, and any alleged incidents. This provides visibility into what machines “believe” before that belief spreads. It allows organizations to identify and correct false narratives early, before they propagate into tooling, decision-making, and attacker behavior. It also highlights where accurate information needs to exist. Not just anywhere online, but in sources that AI systems prioritize.</p>



<h4 class="wp-block-heading" id="h-the-mindset-shift">The mindset shift</h4>



<p>This marks a shift from incident response to narrative response. Security teams need to treat every alert as potentially fabricated. Communications teams need to prepare for narratives that form independently of what actually happened. Both must operate with the understanding that perception alone can trigger real consequences. In this environment, the ability to detect and respond to false narratives matters as much as the ability to detect and respond to actual breaches. </p>



<p><em><a href="https://www.linkedin.com/in/mary-c-sullivan/">Mary Catherine Sullivan</a>, who holds a Ph.D. in political science from Vanderbilt University</em>,<em> is a senior director of Data Science for Digital &amp; Insights, within FTI&#8217;s Strategic Communications segment. She is a communications and data science leader specializing in message testing, audience research, digital communications analytics, and reputational risk assessment. As part of FTI Consulting’s Data Science team, she develops state-of-the-art artificial intelligence, natural language processing, machine learning, and statistical models to analyze media ecosystems, stakeholder discourse, and audience response—supporting informed, defensible decision-making for clients navigating complex reputational environments.</em></p>



<p><em><a href="https://www.linkedin.com/in/brettcallow/">Brett Callow</a> is a senior advisor in the Cybersecurity and Data Privacy Communications at FTI Consulting. With more than two decades of cybersecurity policy and legislation understanding and extensive cybersecurity communications experience, Brett’s expertise is widely recognized within the industry, by policy makers and the media. He has been involved in some of the most high-profile ransomware incidents and has participated in panels and policy-related discussions, including at the Office of the Director of National Intelligence and the Aspen Institute, and has served on the Advisory Board of the Royal United Services Institute’s Ransomware Harms project.</em></p>
<p>The post <a href="https://cyberscoop.com/ai-generated-breach-narratives-ghost-threat-vector-op-ed/">Ghost breaches: How AI-mediated narratives have become a new threat vector</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88624</post-id>	</item>
		<item>
		<title>NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities</title>
		<link>https://cyberscoop.com/nist-narrows-cve-analysis-nvd/</link>
		
		<dc:creator><![CDATA[Matt Kapko]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 20:17:55 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[CVSS]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NVD]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[vulnerability disclosure]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<category><![CDATA[vulnerability reporting]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88616</guid>

					<description><![CDATA[<p>The National Vulnerability Database will now only analyze vulnerabilities in critical software, systems used in the federal government and those under active exploitation.</p>
<p>The post <a href="https://cyberscoop.com/nist-narrows-cve-analysis-nvd/">NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The federal agency tasked with analyzing security vulnerabilities is overwhelmed as it and other authorities struggle to keep pace with a flood of defects that grows every year. The National Institute of Standards and Technology announced Wednesday that it has capitulated to that deluge and <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">narrowed the priorities</a> for its <a href="https://cyberscoop.com/tag/national-vulnerability-database/">National Vulnerability Database</a>.</p>



<p>NIST said it will only prioritize analysis for CVEs that appear in the Cybersecurity and Infrastructure Security Agency’s <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">known exploited vulnerabilities catalog</a>, software used in the federal government and critical software defined under <a href="https://www.nist.gov/system/files/documents/2026/04/15/EO%2014028%20Critical%20FINAL.pdf">Executive Order 14028</a>.</p>



<p>The federal agency’s goal with the change is to achieve long-term sustainability and stabilize the NVD program, which has encountered previous challenges, notably a <a href="https://cyberscoop.com/plan-to-resuscitate-beleaguered-vulnerability-database-draws-criticism/">funding lapse in early 2024</a> that forced NIST to temporarily stop providing key metadata for many vulnerabilities in the database.</p>



<p>The agency still hasn’t cleared a backlog of unenriched CVEs that built up during that pause and grew since then.&nbsp;</p>



<p>NIST said it analyzed nearly 42,000 vulnerabilities last year, adding that CVE submissions surged 263% from 2020 to 2025. “We don’t expect this trend to let up anytime soon. Submissions during the first three months of 2026 are nearly one-third higher than the same period last year,” the agency said in a blog post announcing the change.&nbsp;</p>



<p>Indeed, vulnerabilities are increasing across the board. For instance, Microsoft addressed 165 vulnerabilities Tuesday, its <a href="https://cyberscoop.com/microsoft-patch-tuesday-april-2026/">second-largest monthly batch of defects</a> on record.</p>



<p>NIST said CVEs that don’t fit its more narrow criteria will still be listed in the NVD, but they won’t be automatically enriched with additional details.&nbsp;</p>



<p>“This will allow us to focus on CVEs with the greatest potential for widespread impact,” the agency said. “While CVEs that do not meet these criteria may have a significant impact on affected systems, they generally do not present the same level of systemic risk as those in the prioritized categories.”</p>



<p>Researchers and threat hunters who analyze vulnerabilities for CVE Numbering Authorities (CNA) and vendors that publish their own assessments view NIST’s new approach as inevitable.</p>



<p>“They had to do something. NIST was woefully behind on classifying CVEs and would likely never have caught up,” Dustin Childs, head of threat awareness at Trend Micro’s Zero Day Initiative, told CyberScoop.</p>



<p>“I’m not sure if it was a herculean task or a sisyphean one, but either way, they were set up for failure under their previous system. This change allows them to prioritize their work,” he added.</p>



<p>NIST’s new approach will impact the vulnerability research community at large, but also put more private companies and organizations in a position to gain more authority as defenders seek out more <a href="https://cyberscoop.com/cve-program-funding-crisis-nvd-cisa-alternatives/">alternative sources</a>.</p>



<p>Caitlin Condon, vice president of security research at VulnCheck, previously told CyberScoop that prioritization remains a problem, with too many defenders paying attention to vulnerabilities that aren’t worth their time.&nbsp;</p>



<p>Of the more than 40,000 newly published vulnerabilities that VulnCheck cataloged last year, only 1% of those defects, just 422, were <a href="https://cyberscoop.com/vulncheck-exploited-vulnerabilities-report-2025/">exploited in the wild</a>.&nbsp;</p>



<p>NIST is also trying to reduce other duplicitous efforts with its new approach, effectively leaning even more on CNAs. CVEs that are submitted with a severity rating will no longer receive a separate CVSS score from NIST, the agency said.&nbsp;</p>



<p>While the agency remains the ultimate authority providing a government-backed catalog of vulnerability assessments, it acknowledged these changes will affect its users.</p>



<p>“This risk-based approach is necessary to manage the current surge in CVE submissions while we work to align our efforts with the needs of the NVD community,” the agency said. “By evolving the NVD to meet today’s challenges, we can ensure that the database remains a reliable, sustainable and publicly available source of information about cybersecurity vulnerabilities.”</p>
<p>The post <a href="https://cyberscoop.com/nist-narrows-cve-analysis-nvd/">NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88616</post-id>	</item>
		<item>
		<title>Executive orders likely ahead in next steps for national cyber strategy</title>
		<link>https://cyberscoop.com/executive-orders-likely-ahead-in-next-steps-for-national-cyber-strategy/</link>
		
		<dc:creator><![CDATA[Tim Starks]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 18:51:33 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Mythos]]></category>
		<category><![CDATA[Melania Trump]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[Take It Down Act]]></category>
		<category><![CDATA[Sean Cairncross]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[National Cyber Director]]></category>
		<category><![CDATA[Artificial Intelligence (AI)]]></category>
		<category><![CDATA[Executive order]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Russia]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88612</guid>

					<description><![CDATA[<p>National Cyber Director Sean Cairncross said execution of the strategy is “rolling forward actively.”</p>
<p>The post <a href="https://cyberscoop.com/executive-orders-likely-ahead-in-next-steps-for-national-cyber-strategy/">Executive orders likely ahead in next steps for national cyber strategy</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>National Cyber Director Sean Cairncross expects more executive orders coming from the White House as part of implementing the national cybersecurity strategy, he said Wednesday.</p>



<p>Staffers on Capitol Hill and others in the cyber world have been <a href="https://cyberscoop.com/fbi-operation-masquerade-russian-gru-router-takedown-brett-leatherman/">awaiting the implementation guidance</a> the Trump administration had proclaimed would come to accompany the strategy&nbsp; published last month.</p>



<p>Asked at a Semafor event about whether that would include executive orders, Cairncross answered, “I think that that&#8217;s the case.”</p>



<p>The administration released an <a href="https://cyberscoop.com/executive-order-cyber-enabled-fraud-transnational-criminal-organizations/">executive order on fraud</a> the same day it <a href="https://cyberscoop.com/trump-cybersecurity-strategy/">released its cyber strategy</a> on March 6. Some of that order touched on cybercrime.</p>



<p>“This is rolling forward actively, and you should expect that there will be more execution and action in line with our strategic goals,” he said.</p>



<p>Cairncross cited another administration activity that fit into the strategy, such as the <a href="https://katv.com/news/nation-world/first-take-it-down-act-conviction-marks-win-for-melania-trump-backed-law-ai-generated-abuse-artificial-intelligence-ai-generated-sexually-explicit-images-photos-videos-online-harassment-digital-online-abuse-technology-victims">first conviction</a> last week under the Take It Down Act, a law First Lady Melania Trump advocated for that seeks to combat non-consensual AI-generated sexually explicit images, violent threats and cyberstalking.</p>



<p>He declined to preview any future implementation plans, and said he expected they would be coming “relatively soon.”</p>



<p>A centerpiece of the administration strategy is confronting adversaries to make sure they suffer consequences for their hacking of United States targets.</p>



<p>Cairncross wouldn’t say explicitly if Trump, in his visit to Beijing next month, would address Chinese hacking.</p>



<p>“When we start to see things like <a href="https://cyberscoop.com/chinas-typhoons-changing-the-way-fbi-hunts-sophisticated-threats/">prepositioning on critical infrastructure</a>, that is something that needs to be addressed,” he said. Pressed on whether that meant cyber would be on the agenda during the visit, Caincross said, “I would expect that the safety and security of the American people will be first and foremost, as it always is for the president.”</p>



<p>Cairncross touted American ingenuity for producing an artificial intelligence model like Anthropic’s <a href="https://cyberscoop.com/claude-mythos-ai-cybersecurity-threat-report/">Claude Mythos</a>, rather than it developing under U.S. cyber rivals like China or Russia. He <a href="https://www.bloomberg.com/news/articles/2026-04-14/us-treasury-seeking-access-to-anthropic-s-mythos-to-find-flaws">acknowledged reports</a> about the administration holding meetings about the cyber risks and benefits of something like Mythos — “the model right now that everyone&#8217;s talking about” — adding that the administration is looking to balance the dangers and positive capabilities of AI in cyberspace.</p>



<p>“I would say from the White House perspective, we are working very closely with industry,” Cairncross said. “We&#8217;ve been in close collaboration with the model companies across the interagency to make sure that we are evaluating and doing this.”</p>
<p>The post <a href="https://cyberscoop.com/executive-orders-likely-ahead-in-next-steps-for-national-cyber-strategy/">Executive orders likely ahead in next steps for national cyber strategy</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88612</post-id>	</item>
		<item>
		<title>OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model </title>
		<link>https://cyberscoop.com/openai-expands-trusted-access-for-cyber-to-thousands-for-cybersecurity/</link>
		
		<dc:creator><![CDATA[djohnson]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 13:59:27 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[application security]]></category>
		<category><![CDATA[Artificial Intelligence (AI)]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[OpenAI]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88604</guid>

					<description><![CDATA[<p> A new cybersecurity-focused variant of ChatGPT and an expanded access program put OpenAI in direct competition with Anthropic's Project Glasswing — and raises fresh questions about who gets to wield the most powerful security AI.</p>
<p>The post <a href="https://cyberscoop.com/openai-expands-trusted-access-for-cyber-to-thousands-for-cybersecurity/">OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model </a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>OpenAI <a href="https://openai.com/index/scaling-trusted-access-for-cyber-defense/">said</a> it is expanding its Trusted Access for Cyber program to “thousands of individuals and organizations,” who will use the company’s technology to root out bugs and vulnerabilities in their products.</p>



<p>The program will also incorporate&nbsp; GPT 5.4 Cyber, a new variant of ChatGPT that OpenAI says is specifically optimized for cybersecurity tasks. OpenAI’s goal with this release is to make advanced cybersecurity tools more widely accessible.</p>



<p>The company said access to the program and cybersecurity-focused model will still be governed by “strong” Know-Your-Customer and identity verification rules to help prevent the model’s spread to bad actors.</p>



<p>“Our goal is to make these tools as widely available as possible while preventing misuse,” the company said in a blog posted Tuesday. “We design mechanisms which avoid arbitrarily deciding who gets access for legitimate use and who doesn’t.”</p>



<p>OpenAI’s announcement comes one week after Anthropic rolled out <a href="https://cyberscoop.com/project-glasswing-anthropic-ai-open-source-software-vulnerabilities/">Project Glasswing</a>, a similar effort that seeks to provide major tech companies with Claude Mythos, an unreleased model that Anthropic officials have claimed is too dangerous to sell commercially.</p>



<p>OpenAI officials noted they publicly <a href="https://openai.com/index/trusted-access-for-cyber/">announced</a> Trusted Access for Cyber program months earlier.&nbsp;They have also quietly avoided direct comparisons to Mythos, and GPT 5.4 Cyber.</p>



<p>Cybersecurity experts in the U.S. and UK <a href="https://cyberscoop.com/claude-mythos-ai-cybersecurity-threat-report/">have described</a> Mythos as a significant improvement from previous frontier models around identifying (and potentially exploiting) cybersecurity vulnerabilities, though there remains debate and speculation about the model’s ultimate impact on information security.&nbsp;&nbsp;<br><br>Similarly, GPT 5.4 Cyber has been finetuned for testing and vulnerability research, though OpenAI wants to make iterative improvements to the program as lessons are learned. <br><br>The company has plans to allow&nbsp; a broader group of cyber operators to use the model to protect critical infrastructure, public services and other digital systems. The company said it is also leery of having too much influence over which industries or sectors ultimately take part in the program.</p>



<p>“We don’t think it’s practical or appropriate to centrally decide who gets to defend themselves,” the blog stated. “Instead, we aim to enable as many legitimate defenders as possible, with access grounded in verification, trust signals, and accountability.”</p>
<p>The post <a href="https://cyberscoop.com/openai-expands-trusted-access-for-cyber-to-thousands-for-cybersecurity/">OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model </a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88604</post-id>	</item>
		<item>
		<title>We’re only seeing the tip of the chip-smuggling iceberg</title>
		<link>https://cyberscoop.com/ai-chip-smuggling-china-export-controls-enforcement-op-ed/</link>
		
		<dc:creator><![CDATA[Greg Otto]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 10:00:00 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Artificial Intelligence (AI)]]></category>
		<category><![CDATA[export control]]></category>
		<category><![CDATA[op-ed]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88600</guid>

					<description><![CDATA[<p>A string of federal indictments has exposed a pervasive shadow network of data centers and fake products spanning Southeast Asia. To secure national security, the U.S. must move enforcement from the airport gate to the factory floor.</p>
<p>The post <a href="https://cyberscoop.com/ai-chip-smuggling-china-export-controls-enforcement-op-ed/">We’re only seeing the tip of the chip-smuggling iceberg</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Last year, Nvidia CEO Jensen Huang repeatedly denied that China was obtaining America&#8217;s most advanced chips. &#8216;There&#8217;s no evidence of any AI chip diversion,&#8217; he said, dismissing such reports on another occasion as &#8216;tall tales.&#8217;</p>



<p>Federal prosecutors would beg to differ. They’ve charged six men <a href="https://www.justice.gov/opa/pr/chinese-national-and-two-us-citizens-charged-conspiring-smuggle-artificial-intelligence">over the past three weeks</a> with smuggling billions of dollars’ worth of AI chips to China. The indictments, while a tactical victory, are a warning of how pervasive the problem has become, thanks both to loopholes in federal law and a failure to support existing laws with serious enforcement.</p>



<p>Both Washington and Beijing have tried to reshape AI chip supply chains to bolster their respective national security agendas <a href="https://www.bloomberg.com/news/articles/2026-04-08/greer-stresses-china-trade-over-investment-before-trump-xi-meet">ahead</a> of an expected trade-focused summit in May. While the United States has <a href="https://www.fdd.org/analysis/2025/09/08/why-export-controls-work-5-debunked-myths-about-u-s-china-ai-competition/">imposed</a> export controls on advanced chips to cut off China’s military modernization efforts, China has <a href="https://www.fdd.org/analysis/2025/11/10/signaling-confidence-in-its-domestic-industry-china-bans-foreign-ai-chips-in-state-funded-data-centers/">pushed</a> its firms to adopt domestically produced components to secure its self-reliance.</p>



<p>But neither side can fully avoid the <a href="https://www.fbi.gov/history/famous-cases/willie-sutton">Willie Sutton</a> rule. Why smuggle chips? Because that’s where the profit is — particularly without enough resources dedicated to enforcement.&nbsp;</p>



<p>A closed Chinese market grasping for more powerful alternatives to their own products offers a prime incentive for American firms to provide components to Beijing. Smuggling has also <a href="https://www.fdd.org/analysis/policy_briefs/2025/03/04/seeking-decisive-edge-china-uses-third-party-countries-to-circumvent-u-s-ai-export-controls/">transformed</a> an emerging network of data center infrastructure across Southeast Asia into a source of illicit computing power for U.S. adversaries.</p>



<p>The recent cases highlight these features in detail. In March, prosecutors <a href="https://www.fdd.org/analysis/2026/03/20/exposure-of-major-chinese-linked-chip-smuggling-operations-shows-limits-of-industry-self-policing/">charged</a> three people connected to Super Micro Computer,&nbsp;an American computing firm, with smuggling an estimated $2.5 billion in chips to Chinese customers by shipping servers to the company’s offices in Taiwan and elsewhere in the region. In the meantime, the trio designed warehouses full of fake products to fool U.S. authorities. A week later, prosecutors <a href="https://www.justice.gov/opa/pr/chinese-national-and-two-us-citizens-charged-conspiring-smuggle-artificial-intelligence">unveiled</a> charges against another three individuals accused of conspiring to ship advanced chips to China via business contacts in Thailand.</p>



<p>This string of prosecutions suggests that despite some high-profile successes, smuggling remains a pervasive issue across the industry. While this is partially a problem of professed ignorance, it can also be solved with a combination of policy, personnel, and policing.&nbsp;</p>



<p>The United States must strengthen controls over emerging technologies at the factory floor rather than the airport gate. While Washington has strong export control laws, these regulations are intended to prevent components from leaving the country. They do not, however, block Chinese firms from purchasing these technologies inside the country.</p>



<p>This divergence in intentions produces difficulties for prosecution, as smugglers are often solely <a href="https://www.fdd.org/analysis/2026/03/20/exposure-of-major-chinese-linked-chip-smuggling-operations-shows-limits-of-industry-self-policing/">indicted</a> for evading customs enforcement rather than charged with illicitly obtaining the components while still on American soil. However, Congress can close this loophole via stronger due diligence laws that require greater scrutiny of potential customers ahead of the customs enforcement process.</p>



<p>Washington is also in an arms race with AI firms to properly fund enforcement mechanisms, a race it is currently losing. While one smuggling case alone involved $2.5 billion, federal spending on policing export controls <a href="https://www.commerce.gov/sites/default/files/2024-03/BIS-FY2025-Congressional-Budget-Submission.pdf">amounted</a> to $122 million in all of 2025.</p>



<p>Moreover, this surge of investment in computer hardware is increasingly global in scope, <a href="https://www.fdd.org/analysis/2025/10/01/adversary-supply-chains-targeted-in-major-update-to-u-s-export-controls/">magnifying</a> the current shortage of federal agents responsible for enforcing export controls at the exact moment both allies and adversaries are seeking to purchase ever larger batches of advanced chips.</p>



<p>Even with stronger policies and more personnel, prosecuting AI chip smuggling must also remain a policing priority for federal law enforcement. While these cases are often complex due to a range of technical and jurisdiction challenges, as well as an array of shifting export control regimes, the FBI and the Commerce Department should remain committed to tracking and disrupting these smuggling networks.</p>



<p>It will be key for the administration to separate enforcement actions from its ongoing diplomatic exchanges with Beijing — dropping domestic prosecutions should not be used as a bargaining chip to deliver trade concessions during the President Donald Trump’s upcoming travels to Beijing.</p>



<p>We need stronger enforcement so that the next billion-dollar smuggling case marks real progress, rather than exposing just how much slipped through.</p>



<p><em>Jack Burnham is a senior research analyst at the Foundation for Defense of Democracies’ China Program, focusing on China’s military, emerging technologies, and science and technology policy. Follow Jack on X </em><a href="https://x.com/JackBurnham802"><em>@JackBurnham802</em></a><em>.</em></p>
<p>The post <a href="https://cyberscoop.com/ai-chip-smuggling-china-export-controls-enforcement-op-ed/">We’re only seeing the tip of the chip-smuggling iceberg</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88600</post-id>	</item>
		<item>
		<title>CISA cancels summer internships for cyber scholarship students amid DHS funding lapse</title>
		<link>https://cyberscoop.com/cisa-cancels-cybercorps-internships-dhs-funding-crisis/</link>
		
		<dc:creator><![CDATA[Greg Otto]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 23:17:33 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[Workforce]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency (CISA)]]></category>
		<category><![CDATA[Department of Homeland Security (DHS)]]></category>
		<category><![CDATA[CyberCorps]]></category>
		<category><![CDATA[Office of Personnel Management (OPM)]]></category>
		<category><![CDATA[National Science Foundation]]></category>
		<category><![CDATA[budget]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88609</guid>

					<description><![CDATA[<p>The move adds to mounting pressure on a scholarship program already strained by hiring freezes, proposed budget cuts and a growing backlog of unplaced graduates.</p>
<p>The post <a href="https://cyberscoop.com/cisa-cancels-cybercorps-internships-dhs-funding-crisis/">CISA cancels summer internships for cyber scholarship students amid DHS funding lapse</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity and Infrastructure Security Agency has informed participants of the federal government’s Scholarship for Service program that it has canceled this year’s summer internship programs due to the current funding issues at the Department of Homeland Security.&nbsp;</p>



<p>Emails from <a href="https://cyberscoop.com/tag/cybersecurity-and-infrastructure-security-agency-cisa/">CISA</a> obtained by CyberScoop recently informed applicants that the agency will not bring any <a href="https://cyberscoop.com/tag/cybercorps/">CyberCorps</a>: Scholarship for Service interns onboard this summer due to the impacts of the federal funding lapse and the current administrative situation at <a href="https://cyberscoop.com/tag/department-of-homeland-security-dhs/">DHS</a>. For some applicants, agency representatives acknowledged that the cancellations represent a second consecutive year of disrupted placement efforts.</p>



<p>The National Science Foundation (<a href="https://cyberscoop.com/tag/national-science-foundation/">NSF</a>) leads and manages the program, in coordination with the Office of Personnel Management (<a href="https://cyberscoop.com/tag/office-of-personnel-management-opm/">OPM</a>) and DHS. The program covers tuition and provides stipends for students specializing in cybersecurity and artificial intelligence. In exchange, graduates must complete an internship and subsequently work in federal service for a period equal to the duration of their scholarship. </p>



<p>An OPM official told CyberScoop the agency is “actively in contact with all Federal cabinet agencies on this topic, and are confident that we will place nearly all eligible Scholarship for Service participants within the next couple months.”</p>



<p>An NSF spokesperson declined to comment.&nbsp; CISA did not respond to CyberScoop’s request for comment.&nbsp;</p>



<p>The sudden closure of agency pipelines highlights how federal job seekers are currently navigating a paralyzed hiring environment, exacerbated by budget turmoil at DHS and proposed workforce reductions under the Trump administration. The White House’s fiscal 2027 budget would <a href="https://cyberscoop.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa/">slash CISA’s budget</a> by <a href="https://www.whitehouse.gov/wp-content/uploads/2026/04/budget_fy2027.pdf">$707 million</a>, according to a summary released earlier this month, which would deeply chop down an agency that already took a big hit in President Donald Trump’s first year.</p>



<p>Sources told CyberScoop Tuesday that CISA has been reaching out to internship applicants who had participated in a virtual job fair held in February, where they were told that the agency would have 100 internship roles available. However, applicants were warned that the agency would not be able to hire anyone until the agency was funded.&nbsp;</p>



<p>Program participants expressed <a href="https://cyberscoop.com/cyber-scholarship-for-service-students-say-government-has-pulled-rug-on-them-potentially-burdening-them-with-debt/">regret to CyberScoop last November</a> over taking part in an initiative that binds them to an employer currently unable to hire them. Program administrators have reportedly advised students to get creative in their job searches, a directive that caused frustration among participants who rely on standard federal placement pipelines.</p>



<p>In response to the growing backlog of unplaced graduates, OPM <a href="https://cyberscoop.com/opm-nsf-cybercorps-sfs-mass-deferment-government-shutdown/">announced plans to collaborate</a> with the National Science Foundation on a mass deferment. OPM Director Scott Kupor stated that the deferment will be implemented after the government shutdown resolves, providing graduates additional time to secure qualifying positions.</p>



<p>The structural breakdown of the CyberCorps pipeline presents long-term challenges for the federal government&#8217;s ability to recruit technical talent. The United States currently faces an estimated 500,000 open cybersecurity positions. The scholarship program was historically viewed as a reliable mechanism to bypass private-sector wage competition and secure early-career talent for the federal government.</p>



<p>Lawmakers <a href="https://www.nbcnews.com/politics/congress/congress-dhs-funding-expel-members-swalwell-iran-war-rcna303779">are currently battling over bills</a> that would end the DHS shutdown.&nbsp;</p>



<p><em>Tim Starks contributed to this story.&nbsp;</em></p>
<p>The post <a href="https://cyberscoop.com/cisa-cancels-cybercorps-internships-dhs-funding-crisis/">CISA cancels summer internships for cyber scholarship students amid DHS funding lapse</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88609</post-id>	</item>
		<item>
		<title>Microsoft drops its second-largest monthly batch of defects on record</title>
		<link>https://cyberscoop.com/microsoft-patch-tuesday-april-2026/</link>
		
		<dc:creator><![CDATA[Matt Kapko]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 20:27:39 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Action1]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency (CISA)]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Defender]]></category>
		<category><![CDATA[Microsoft SharePoint]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[Trend Micro]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerability disclosure]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<category><![CDATA[vulnerability reporting]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88597</guid>

					<description><![CDATA[<p>The vendor disclosed one actively exploited zero-day vulnerability in Microsoft Office SharePoint that allows attackers to view information and make changes to disclosed information.</p>
<p>The post <a href="https://cyberscoop.com/microsoft-patch-tuesday-april-2026/">Microsoft drops its second-largest monthly batch of defects on record</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft addressed 165 vulnerabilities affecting its various products and underlying systems, including one actively exploited vulnerability in Microsoft Office SharePoint, in this month’s <a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr">Patch Tuesday update</a>.&nbsp;</p>



<p>“By my count, this is the second-largest monthly release in Microsoft’s history,” Dustin Childs, head of threat awareness at Trend Micro’s Zero Day Initiative, wrote in a <a href="https://www.zerodayinitiative.com/blog/2026/4/14/the-april-2026-security-update-review">blog post</a> Tuesday.</p>



<p>Microsoft didn’t explain why its monthly batch of patches grew so large this month, but Childs noted that many vulnerability programs are experiencing a significant increase in submissions found by artificial intelligence tools. “For us, our incoming rate has essentially tripled, making triage a challenge, to say the least,” he added.&nbsp;</p>



<p>The zero-day vulnerability — <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201">CVE-2026-32201</a> — has a CVSS rating of 6.5 and allows attackers to view sensitive information and make changes to disclosed information. Microsoft said the improper input validation defect in Microsoft Office SharePoint allows unauthenticated attackers to perform spoofing over a network.</p>



<p>The Cybersecurity and Infrastructure Security Agency added the zero-day to its <a href="https://www.cisa.gov/news-events/alerts/2026/04/14/cisa-adds-two-known-exploited-vulnerabilities-catalog">known exploited vulnerabilities catalog</a> shortly after Microsoft’s disclosure.&nbsp;</p>



<p>Microsoft also addressed a high-severity vulnerability — <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-33825">CVE-2026-33825</a> — that was publicly known at the time of release. The vendor said the defect in Microsoft Defender is more likely to be exploited and could allow unauthorized attackers to elevate privileges locally.</p>



<p>“What starts as a foothold can quickly become full system domination,” Jack Bicer, director of vulnerability research at Action1, said in a blog post about the vulnerability.&nbsp;</p>



<p>“Once exploited, it allows full control over endpoints, enabling data exfiltration, disabling security tools and lateral movement across networks,” Bicer said.</p>



<p>Proof-of-concept exploit code for the defect is publicly available, which increases the likelihood of exploitation in the wild, he added.</p>



<p>Microsoft disclosed two critical vulnerabilities this month — <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-33824">CVE-2026-33824</a> affecting Windows IKE Extension and <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-26149">CVE-2026-26149</a> affecting Microsoft Power Apps — but designated both of the defects as less likely to be exploited.</p>



<p>More than three-quarters of the vulnerabilities disclosed this month are less likely to be exploited, according to Microsoft. Meanwhile, the company designated 19 vulnerabilities as more likely to be exploited.</p>



<p>The full list of vulnerabilities addressed this month is available in <a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr">Microsoft’s Security Response Center</a>.</p>
<p>The post <a href="https://cyberscoop.com/microsoft-patch-tuesday-april-2026/">Microsoft drops its second-largest monthly batch of defects on record</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88597</post-id>	</item>
		<item>
		<title>Space Force official touts AI’s impact on cyber compliance</title>
		<link>https://cyberscoop.com/space-force-ciso-touts-ai-impact-cyber-compliance/</link>
		
		<dc:creator><![CDATA[djohnson]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 20:00:34 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Artificial Intelligence (AI)]]></category>
		<category><![CDATA[cybersecurity compliance]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Space Force]]></category>
		<guid isPermaLink="false">https://cyberscoop.com/?p=88591</guid>

					<description><![CDATA[<p>The acting CISO said that AI is reshaping how the service measures and tracks cyber compliance, moving it from a box-checking exercise to something nimbler and more substantive.</p>
<p>The post <a href="https://cyberscoop.com/space-force-ciso-touts-ai-impact-cyber-compliance/">Space Force official touts AI’s impact on cyber compliance</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Seth Whitworth, who is both acting Associate Deputy Chief of Space Operations for Cyber and Data and acting chief information security officer, said he believes AI tools are shifting the way defenders review cyber risk, both for individual systems and more holistically throughout an enterprise.&nbsp;&nbsp;</p>



<p>In particular, Large Language Models can be used to systematically implement fixes for the smaller but critical weaknesses that have allowed state-sponsored hackers and cybercriminals to get inside victim networks and live off the land.</p>



<p>“Our adversaries are not looking for the massive cybersecurity vulnerabilities &#8211; we’re actually pretty good at [defending] that,” said Whitworth Tuesday at AI Talks, presented by Scoop News Group. “They’re looking for a misconfiguration, a failed update, a tiny little thing that allows them an entry point into a very connected network.”</p>



<p>Many of these basic cyber hygiene problems tend to fall under existing compliance programs, but it can take more than legal mandates to fix them. Many enterprise IT networks – particularly older ones – build up technical debt over time, leading to forgotten systems, hidden routers and other forms of shadow IT that get more insecure over time.</p>



<p>Cybersecurity experts say agents and the Large Language Models that power them &#8211; which operate in perpetuity 24/7, – are <a href="https://cyberscoop.com/claude-mythos-ai-cybersecurity-threat-report/">particularly well-suited</a> to finding these smaller flaws and quickly exploiting them.</p>



<p>But Whitworth argued that the same technology can be used to reshape how organizations measure and track cyber compliance, from a sluggish box-checking exercise to something more nimble and substantive. He claimed that Space Force’s internal process for obtaining Authorities to Operate and other formal security certifications used to take 3-18 months. Now, it “can now be done in weeks and days.”</p>



<p>That in turn can empower program managers to “pull in all of that massive amount of data, allow the AI &#8211; who doesn’t get tired, who doesn’t miss patterns, who doesn’t miss these components &#8211; to churn on those items and them deliver something” that can inform real-time changes to cybersecurity, he said.</p>



<p>Whitworth also acknowledged the “fear” that many organizations still have around the use of AI, as well as lingering concerns about some of the technology’s enduring limitations like <a href="https://cyberscoop.com/uk-warns-ai-prompt-injection-unfixable-security-flaw/">hallucinations</a> and data poisoning. He said he still gives AI-generated outputs “extra scrutiny, because I haven’t seen the trusted validation” yet.</p>



<p>But he also said he gets more valuable insight on the Space Force’s holistic cyber risk from using Large Language Models than he does from other security control assessments, which tend to narrowly focus on the risk of single systems or assets in isolation.</p>



<p>“We are operating in a highly connected, highly orchestrated world, and so moderate risk that’s accepted in one program immediately becomes moderate risk that is accepted in another program,” said Whitworth. “AI can take that whole picture and understand that when this system change impacts this system, it also impacts this [other] system.”</p>
<p>The post <a href="https://cyberscoop.com/space-force-ciso-touts-ai-impact-cyber-compliance/">Space Force official touts AI’s impact on cyber compliance</a> appeared first on <a href="https://cyberscoop.com">CyberScoop</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">88591</post-id>	</item>
	</channel>
</rss>
