CISA warns over software flaws in industrial control systems

The US Cybersecurity and Infrastructure Agency (CISA) has warned organizations to check recently disclosed vulnerabilities affecting operational technology (OT) devices that should but aren’t always isolated from the internet.  CISA…

Flaws in Smart Jacuzzi App Could Be Exploited To Extract Users’ Data

The vulnerability existed in Jacuzzi Brand LLC’s SmartTub app web interface that could reveal users’ private data to remote malicious attackers. Researchers have identified vulnerabilities in Jacuzzi Brand LLC’s SmartTub…

#InfosecurityEurope2022: Actions Not Words: Hacking the Human Through Social Engineering

Jenny Radcliffe, The People Hacker, points to what cybersecurity can learn from a social engineer

These hackers are spreading ransomware as a distraction – to hide their cyber spying

Image: Shutterstock / BLACKDAY A group of likely state-backed cyber attackers have adopted a new loader to spread five different kinds of ransomware in a bid to hide their true…

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers. Advanced persistent threat group Fancy Bear…

5 Tips for Protecting Your Phone from Malware

Most people today depend on their phones entirely. Aside from being a portal to our social life, they also make our lives easier in many ways. One of the best…

#InfosecurityEurope2022: Firms Look To Align Security and Business Risk

Boards increasingly expect to see a return on their investment in cybersecurity

NSA, CISA say: Don't block PowerShell, here's what to do instead

Image: Getty Images/iStockphoto Cybersecurity authorities from the US, the UK, and New Zealand have advised businesses and government agencies to properly configure Microsoft’s built-in Windows command-line tool, PowerShell – but…

#InfosecurityEurope2022: Focus on End-User Behaviors to Enhance Security

Having metrics in place is crucial to tailoring staff awareness training programs effectively

Chinese Hackers Are Now Using the Nimbda Loader and a New Form of the Yahoyah Trojan

Tropic Trooper is an independent terrorist organization that has conducted operations directed at specific targets in Taiwan, the Philippines, and Hong Kong. Since 2011, Tropic Trooper has been operating with…