Let’s Encrypt Temporarily Halts Certificate Issuance Following Root Incident

Let’s Encrypt Temporarily Halts Certificate Issuance Following Root Incident

On May 8, 2026, Let’s Encrypt, the widely used non-profit certificate authority, took the drastic step of temporarily suspending all certificate issuance. The move came after engineers discovered a critical issue involving a cross-signed certificate that linked the organization’s current Generation X root to its upcoming Generation Y root infrastructure. This preventive measure resulted in a complete shutdown of services

OpenAI’s GPT-5.4-Cyber: a practical boost for defenders — and a new risk calculus

OpenAI’s GPT-5.4-Cyber: a practical boost for defenders — and a new risk calculus

OpenAI has introduced GPT-5.4-Cyber, a purpose-built variant of GPT-5.4 tuned to assist vetted security professionals with tasks previously reserved for specialized analysts. Rather than a general consumer release, this model is designed to lower refusal rates for legitimate cybersecurity workflows: binary reverse engineering, vulnerability scanning, malware analysis and exploit research. The announcement frames the model as a defensive accelerant —

OpenAI Revokes macOS App Certificate After Axios Supply-Chain Compromise

OpenAI Revokes macOS App Certificate After Axios Supply-Chain Compromise

OpenAI has publicly disclosed a supply‑chain incident that affected the signing workflow for its macOS applications and, out of caution, is revoking and rotating the certificate used to notarize those apps. The company’s investigation found that a GitHub Actions workflow used in the macOS signing process pulled a compromised release of the widely used npm library Axios (version 1.14.1). Although

Anthropic Withholds Mythos Preview: Too Potent a Cyber Threat to Release

Anthropic Withholds Mythos Preview: Too Potent a Cyber Threat to Release

Anthropic’s decision to withhold the Claude Mythos Preview has punctured the usual celebratory arc of model announcements. Rather than rushing to commercialize another frontier AI, the company says Mythos demonstrated capabilities that could be exploited to find and chain high-severity vulnerabilities in widely used systems—so serious that Anthropic is choosing limited, defensive deployment over general release. A startling discovery in

Microsoft Links Medusa Ransomware Affiliate to Zero-Day Exploitation Campaign

Microsoft Links Medusa Ransomware Affiliate to Zero-Day Exploitation Campaign

Microsoft’s recent analysis tying a Medusa ransomware affiliate to a campaign that leveraged zero-day vulnerabilities has put a renewed spotlight on the evolving tactics of extortion groups and the threat posed by previously unknown software flaws. For security teams and executives, the announcement is a reminder that threat actors are combining rapid vulnerability exploitation with tried-and-true ransomware playbooks to increase