Senate judiciary presses for answers ahead of FISA deadline
There’s a growing question on Capitol Hill as the expiration of sweeping U.S. government surveillance powers looms: Where is the Trump administration? The Senate Judiciary…
There’s a growing question on Capitol Hill as the expiration of sweeping U.S. government surveillance powers looms: Where is the Trump administration? The Senate Judiciary…
United States Immigration and Customs Enforcement is leveraging Palantir’s generative artificial intelligence tools to sort and summarize immigration enforcement tips from its public submission form,…
MicroWorld Technologies, the maker of the eScan antivirus product, has confirmed that one of its update servers was breached and used to distribute an unauthorized…
WhatsApp has unveiled Strict Account Settings, an advanced security feature designed to shield high-risk users from sophisticated cyber threats and targeted attacks. The lockdown-style protection…
Malicious open source software packages have become a critical problem threatening the software supply chain. That’s one of the major takeaways of a new report…
The Trump administration’s elimination of a security attestation requirement for federal software vendors could change how those companies demonstrate their products’ security to customers in…
Security researchers are warning of insecure deployments in enterprise environments of the Moltbot (formerly Clawdbot) AI assistant, which can lead to leaking API keys, OAuth tokens,…
On Wednesday, the Department of Homeland Security published new details about Mobile Fortify, the facial recognition app that federal immigration agents use as a method…
A Chinese national has been sentenced to nearly four years in U.S. federal prison for laundering tens of millions of dollars stolen from American investors…
The NSW government has embarked on a redesign of its cyber response and threat intelligence foundation, including incident and emergency response frameworks to enable faster…
U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 28, 2026 The U.S. Cybersecurity and Infrastructure…
Canadian citizens are facing a coordinated phishing campaign that leverages government impersonation and brand spoofing to harvest personal and financial data at scale. The campaign…