Thursday, April 16, 2026
HomeTagsCybersecurity

Tag: Cybersecurity

Rogue: AI-Driven Web App Scanner Leveraging OpenAI For Analysis

Faizan Ahmad, a security expert at Meta, launched Rogue on GitHub under the GPL-3.0 license. This Python-based tool uses OpenAI models such as o4-mini, o3-mini, and o1-preview to find web vulnerabilities more effectively than older scanners. Rogue acts like a human tester by studying...

India Requires All Smartphones To Include Permanent Government Cybersecurity App

India’s Department of Telecommunications (DoT) has mandated that all smartphone makers preload a non-removable government cybersecurity app, Sanchar Saathi, on new devices sold in the country. The private directive, dated November 28, 2025, sets a strict 90-day compliance deadline for giants like Apple, Samsung,...

FCC Investigation Leads To $1.5 Million Comcast Penalty After Vendor Data Breach

The Federal Communications Commission announced a significant enforcement action against Comcast, imposing a $1.5 million fine following a data breach at a third-party vendor that exposed personal information belonging to approximately 237,000 customers. The incident underscores persistent supply chain security vulnerabilities and highlights regulatory...

NSA Releases Security Recommendations For Internet Providers and Network Defense Teams

The National Security Agency (NSA), along with the Cybersecurity and Infrastructure Security Agency (CISA) and several international partners, released a new guide on November 19, 2025, to help internet service providers (ISPs) and network defense teams combat cyber threats from bulletproof hosting (BPH) providers....

Microsoft Teams Adds Option To Report Messages Incorrectly Flagged As Security Threats

Microsoft has introduced a new feature in Teams that allows users to misreport messages identified as security threats, helping to reduce false positives in organizational communications. This update, tied to Microsoft 365 Roadmap ID 501202, began rolling out in early September 2025 for targeted...

EchoGram Attack Demonstrates How Major AI Models Can Be Manipulated To Approve Malicious Inputs

Large language models like GPT-4, Claude, and Gemini rely on safety guardrails to block harmful prompts, but a new technique called EchoGram can trick these defenses into approving dangerous inputs. Developed by researchers at HiddenLayer in early 2025, EchoGram exploits weaknesses in how guardrails...