Commercial AI Models Show Rapid Gains in Vulnerability Research Information Security Magazine 1 month ago AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds
DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’ Information Security Magazine 1 month ago Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users
US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea Information Security Magazine 1 month ago US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms
APK Malformation Found in Thousands of Android Malware Samples Information Security Magazine 1 month ago APK malformation tactic now appears in over 3000 Android malware samples evading static analysis
Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack Information Security Magazine 1 month ago Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data
NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities Information Security Magazine 1 month ago NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs
Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads Information Security Magazine 1 month ago Ox Security claims as many as 200,000 servers are exposed by newly discovered MCP vulnerability
Automotive Ransomware Attacks Double in a Year Information Security Magazine 1 month ago Halcyon says ransomware now accounts for more than two-fifths of cyber-attacks targeting carmakers
OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI Information Security Magazine 1 month ago OpenAI’s new frontier model focused on cybersecurity comes following Anthropic’s launch of Claude Mythos Preview and Project Glasswing
European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program Information Security Magazine 1 month ago The EU cybersecurity agency looks to become the third Top-Level Root CVE Numbering Authority, alongside CISA and MITRE
Signed Adware Operation Disables Antivirus Across 23,000 Hosts Information Security Magazine 1 month ago Huntress uncovers adware deploying AV-killing payloads via signed updates across 23,000 endpoints
Critical Nginx-ui MCP Flaw Actively Exploited in the Wild Information Security Magazine 1 month ago Critical nginx-ui MCP authentication bypass CVE-2026-33032 actively exploited with CVSS 9.8
AI Companies to Play Bigger Role in CVE Program, Says CISA Information Security Magazine 1 month ago At VulnCon, Lindsey Cerkovnik, head of vulnerability management at CISA, said AI companies should play a bigger role in vulnerability disclosures in the future
Researchers Spot Surge in Brute-Force Attacks from Middle East Information Security Magazine 1 month ago Barracuda says 88% of brute-force attempts in Q1 were from the region
Microsoft Fixes Two Zero-Days in April Patch Tuesday Information Security Magazine 1 month ago Microsoft has patched two zero-day flaws and over 160 others
CISOs Urged to Innovate with Talent Retention as Job Satisfaction Declines Information Security Magazine 1 month 1 week ago A new IANS report claims just 34% of cybersecurity professionals plan to stay put in the next 12 months
Triad Nexus Expands Global Fraud Operations Despite US Sanctions Information Security Magazine 1 month 1 week ago Triad Nexus scales $200m scams, uses infrastructure laundering, localized fraud and US-access blocks
Malicious Chrome Extensions Campaign Exposes User Data Information Security Magazine 1 month 1 week ago 108 malicious Chrome extensions steal sessions, Google data, inject ads via single C2 infrastructure
AI Security Institute Advocates Security Best Practices After Mythos Test Information Security Magazine 1 month 1 week ago The AISI has issued its judgement on Anthropic’s Mythos Preview model
Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat Information Security Magazine 1 month 1 week ago Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn