Flaws in Smart Jacuzzi App Could Be Exploited To Extract Users’ Data

The vulnerability existed in Jacuzzi Brand LLC’s SmartTub app web interface that could reveal users’ private data to remote malicious attackers. Researchers have identified vulnerabilities in Jacuzzi Brand LLC’s SmartTub…

Feds Dismantle Russian Rsocks Botnet Powered by Millions of IoT Devices

The hackers behind Rsocks botnet used the hacked IoT devices as proxy servers where its customers would pay them for using the device’s IP address while the device owner remained…

How 3D Printing Has Become a Global Trend With Time

What occurs to your mind when you hear of 3D printing? The latest advent in technology? Well, truth be told, 3D printing shares a pristine history and became a force…

U.S. Water Utilities Prime Cyberattack Target, Experts

Environmentalists and policymakers warn water treatment plants are ripe for attack. Industrial controls governing water-related U.S. critical infrastructure are woefully under-estimated as cyberattack targets. The potential for attack, say policymakers,…

Taming the Digital Asset Tsunami

Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and…

New PoC Shows IoT Devices Can Be Hacked to Install Ransomware on OT Networks

In this PoC, the ransomware attack dubbed R4IoT uses vulnerable IoT devices (in this case, vulnerable security cameras) to gain access, IT for traversal, and OT, particularly PLCs for detonation.…

EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

Malware borrows generously from code used by other botnets such as Mirai, Qbot and Zbot. A rapidly evolving IoT malware dubbed “EnemyBot” is targeting content management systems (CMS), web servers…

10 Application Security Best Practices To Follow In 2022

In recent years, the app development industry has experienced unprecedented growth. Mobile applications and web applications have become an integral part of our everyday lives, offering millions of options. Due…

Fronton IOT Botnet Packs Disinformation Punch

Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda. A fresh look at the Fronton DDoS-focused botnet reveals the criminal…

Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect their smart devices are at risk. The IT security researchers at Manchester,…