Category: www.infosecurity-magazine.com

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs This article has been indexed from www.infosecurity-magazine.com Read the original article: NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

Automotive Ransomware Attacks Double in a Year

Halcyon says ransomware now accounts for more than two-fifths of cyber-attacks targeting carmakers This article has been indexed from www.infosecurity-magazine.com Read the original article: Automotive Ransomware Attacks Double in a Year

OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI

OpenAI’s new frontier model focused on cybersecurity comes following Anthropic’s launch of Claude Mythos Preview and Project Glasswing This article has been indexed from www.infosecurity-magazine.com Read the original article: OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI

AI Companies to Play Bigger Role in CVE Program, Says CISA

At VulnCon, Lindsey Cerkovnik, head of vulnerability management at CISA, said AI companies should play a bigger role in vulnerability disclosures in the future This article has been indexed from www.infosecurity-magazine.com Read the original article: AI Companies to Play Bigger…

AI Companies To Play Bigger Role in CVE Program, Says CISA

At VulnCon, Lindsey Cerkovnik, head of vulnerability management at CISA, said AI companies should play a bigger role in vulnerability disclosures in the future This article has been indexed from www.infosecurity-magazine.com Read the original article: AI Companies To Play Bigger…

Malicious Chrome Extensions Campaign Exposes User Data

108 malicious Chrome extensions steal sessions, Google data, inject ads via single C2 infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious Chrome Extensions Campaign Exposes User Data

Mirax Android Trojan Turns Devices Into Residential Proxy Nodes

Security researchers warn of Mirax, an emerging Android banking trojan using MaaS, remote access and residential proxies to target European users This article has been indexed from www.infosecurity-magazine.com Read the original article: Mirax Android Trojan Turns Devices Into Residential Proxy…

Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn This article has been indexed from www.infosecurity-magazine.com Read the original article: Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat