TrojAI has extended its platform for securing artificial intelligence (AI) applications, tools and platforms to now include a red teaming capability that is performed by AI agents that have been specifically trained to perform that task. Additionally, the company has extended its firewall for AI to now include an instance of AI coding assistants, while...
Read More
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent directive requiring all federal civilian agencies to remediate a critical vulnerability affecting Fortinet’s enterprise security software by the end of this week, underscoring growing concerns over active cyber exploitation targeting government and private networks. Critical Zero-Day Exploitation Prompts Emergency Action The vulnerability, tracked as...
Read More
Artificial intelligence (AI) has obviously taken existing computer hardware to a whole new level. The biggest-ever computing leap, however, has yet to come. That’s the looming explosion of quantum computing — a new kind of platform that’s completely different from binary code-based processors used by nearly every kind of computer today. See, quantum computers utilize...
Read More
In late March and early April 2026, Meta Platforms was hit with two landmark legal defeats over the alleged addictive design and child-safety failures of its social media platforms, while simultaneously deepening its AI push through a US$10.00 billion data center expansion, new Ray‑Ban Meta prescription smart glasses, and VA‑backed immersive therapy partnerships. Together, these developments...
Read More
Police in Orange County have arrested a 61-year-old man after he allegedly showed up at a park to meet an underage boy for sex. Instead, authorities say, it was a sting set up by a vigilante group that targets suspected child predators. Officers responded to Huntington Beach Central Park around 7:30 p.m. Sunday after receiving...
Read More
The Medusa ransomware operation is increasingly exploiting new vulnerabilities days before they are publicly disclosed, according to new research from Microsoft. Cybersecurity experts at Microsoft published an examination of activity from the group — which recently claimed responsibility for a devastating attack on the largest hospital in Mississippi and a county in northern New Jersey. ...
Read More
“A .lnk file is how Windows handles shortcuts: Whenever you click on that Outlook icon on your desktop, you’re actually clicking on a separate file that uses the Outlook image and directs the operating system to open up Microsoft Outlook,” explained Jamie Boote, senior manager, strategic security consulting at Black Duck. “You can also create...
Read More
In mid-September 2024, Donald Trump had plenty on his plate. He was the Republican Party’s presidential nominee in a competitive race with roughly seven weeks until Election Day; he had just lost a debate against then-Vice President Kamala Harris; and he was maintaining an active travel and media schedule. But on Sept. 16, literally one...
Read More
The dark web is home to almost anything you could think of, but one researcher discovered at least one website designed to carry out assassination orders, and has revealed the disturbing ‘kill list’ messages attached to each request. Most people have at least heard of the dark web or are familiar with it in concept,...
Read More
The hackers claim to have deleted everything they took – which included the private details and pictures of around 8,000 children as well as contact information for parents and carers. “All child data is now being deleted. No more remains and this can comfort parents,” one of the cyber-criminals involved told the BBC. It’s understood...
Read More
1 2 3 4 5 22
National Cyber Security

FREE
VIEW