Sweden's attribution of energy sector attack highlights rising threat to critical infrastructure
Sweden publicly blamed a pro-Russian group for a 2022 cyberattack on a heating plant, a significant move signaling a new era of hybrid threats.
We’re only seeing the tip of the chip-smuggling iceberg
Recent federal indictments reveal a vast shadow network smuggling AI chips to China. A deeper look shows why enforcement must move beyond the border.
Unverified 'Model Context Protocol' flaw: a theoretical blueprint for AI supply chain attacks
A report on a design flaw in a purported Anthropic protocol remains unverified, but it exposes the theoretical risk of AI models becoming vectors for
Audit: Big Tech often ignores California privacy law opt-out requests
An audit by the Privacy Rights Clearinghouse found that Google, Meta, and Microsoft fail to honor consumer 'Do Not Sell or Share' requests about half
Beyond the hype of GPT-5.4-Cyber: How AI is really shaping the future of cyber defense
Speculation about OpenAI's GPT-5.4-Cyber highlights a real trend: AI is escalating the cyber arms race. Here's how it empowers both attackers and defe
The unseen battlefield: Cyber warfare and the drone war in Ukraine
An in-depth analysis of the electronic and cyber warfare tactics, from GPS spoofing to C2 hijacking, defining the drone conflict in Ukraine.
The battle over FISA's Section 702: A temporary truce in the war between national security and American privacy
A contentious U.S. surveillance law, Section 702 of FISA, was renewed for two years, continuing the debate over national security versus American priv
OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model
OpenAI's new GPT 5.4 Cyber model and expanded access program puts it in direct competition with Anthropic, raising questions about control over powerf
Estonia's shadow war: Unmasking a decade of Russian espionage
A deep dive into how Estonia's security services uncovered a decade-long Russian espionage campaign that compromised NATO and EU secrets from the insi
The shadow war: A deep dive into the cyber conflict in Ukraine
A deep-dive analysis of the Russia-Ukraine cyber war, detailing the key threat actors, destructive malware, and the impact on global cybersecurity.
CISA cancels summer internships for cyber scholarship students amid DHS funding lapse
CISA has canceled its summer internships for CyberCorps® scholarship students, citing a DHS funding lapse and adding to a program already strained by
SAP patches critical vulnerability that could allow complete system takeover
SAP's May security update fixes a critical 9.6 CVSS vulnerability (CVE-2024-27296) that allows unauthenticated attackers to take full control of syste











