April 16, 2026
Categories
NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities
Skip to main content The National Vulnerability Database will now…
Executive orders likely ahead in next steps for national cyber strategy
Skip to main content National Cyber Director Sean Cairncross said…
OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model 
Skip to main content A new cybersecurity-focused variant of ChatGPT…
We’re only seeing the tip of the chip-smuggling iceberg
Skip to main content A string of federal indictments has…
Critical Nginx UI auth bypass flaw now actively exploited in the wild
A critical vulnerability in Nginx UI with Model Context Protocol…
New AgingFly malware used in attacks on Ukraine govt, hospitals
A new malware family named ‘AgingFly’ has been identified in…
WordPress plugin suite hacked to push malware to thousands of sites
More than 30 WordPress plugins in the EssentialPlugin package have…
Signed software abused to deploy antivirus-killing scripts
A digitally signed adware tool has deployed payloads running with…
Microsoft pays $2.3M for cloud and AI flaws at Zero Day Quest
Microsoft has awarded $2.3 million to security researchers after receiving…
CISA flags Windows Task Host vulnerability as exploited in attacks
CISA warned U.S. government agencies to secure their systems against…