The US Cybersecurity and Infrastructure Agency (CISA) has warned organizations to check recently disclosed vulnerabilities affecting operational technology (OT) devices that should but aren’t always isolated from the internet. CISA…
Day: June 23, 2022
Flaws in Smart Jacuzzi App Could Be Exploited To Extract Users’ Data
The vulnerability existed in Jacuzzi Brand LLC’s SmartTub app web interface that could reveal users’ private data to remote malicious attackers. Researchers have identified vulnerabilities in Jacuzzi Brand LLC’s SmartTub…
#InfosecurityEurope2022: Actions Not Words: Hacking the Human Through Social Engineering
Jenny Radcliffe, The People Hacker, points to what cybersecurity can learn from a social engineer
These hackers are spreading ransomware as a distraction – to hide their cyber spying
Image: Shutterstock / BLACKDAY A group of likely state-backed cyber attackers have adopted a new loader to spread five different kinds of ransomware in a bid to hide their true…
Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug
The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers. Advanced persistent threat group Fancy Bear…
5 Tips for Protecting Your Phone from Malware
Most people today depend on their phones entirely. Aside from being a portal to our social life, they also make our lives easier in many ways. One of the best…
#InfosecurityEurope2022: Firms Look To Align Security and Business Risk
Boards increasingly expect to see a return on their investment in cybersecurity
NSA, CISA say: Don't block PowerShell, here's what to do instead
Image: Getty Images/iStockphoto Cybersecurity authorities from the US, the UK, and New Zealand have advised businesses and government agencies to properly configure Microsoft’s built-in Windows command-line tool, PowerShell – but…
#InfosecurityEurope2022: Focus on End-User Behaviors to Enhance Security
Having metrics in place is crucial to tailoring staff awareness training programs effectively
Chinese Hackers Are Now Using the Nimbda Loader and a New Form of the Yahoyah Trojan
Tropic Trooper is an independent terrorist organization that has conducted operations directed at specific targets in Taiwan, the Philippines, and Hong Kong. Since 2011, Tropic Trooper has been operating with…