Industrial Control Systems

ICS news

  

PyPI unverifies 1,800 emails with expired domains to prevent attacks

Attackers could register expired domains to take over email addresses and developer accounts.SCM feed for Endpoint/Device SecurityRead More

  

AI attacks expose email security threats

Here’s a strategy for embracing AI-enabled email security.SCM feed for Endpoint/Device SecurityRead More

  

UK rescinds order that required backdoor to Apple cloud data

The UK backed off after privacy advocates sounded the alarm bell about vulnerabilities caused by allowing backdoors into encryption.SCM feed

  

EU’s NIS Cooperation Group calls for input to shape Europe’s quantum-resistant digital infrastructure roadmap

The European Commission’s NIS Cooperation Group has opened a public consultation to gather feedback on its recently published… The post

  

Palo Alto Networks prepares enterprises for quantum threats

Palo Alto Networks has unveiled PAN-OS 12.1 “Orion,” a suite of security enhancements designed to prepare enterprises for quantum computing

  

SonicWall unveils unified management platform

The new firewalls integrate hardware, software, managed services, and flexible billing within a single platform designed to help partners scale

  

Fortinet launches FortiCNAPP PoP in Singapore

The Singapore PoP brings Fortinet’s AI-powered cloud security services closer to customers, helping organizations manage multi-cloud and hybrid environments while

  

Four BeyondTrust solutions pass Australian IRAP assessment

Conducted by CyberCX between March and July 2025, the evaluation verified compliance with the March 2025 Australian Information Security Manual

  

Google Cloud publishes OT Hybrid security guidance

The report emphasizes the growing integration of IT and OT systems, noting that vulnerabilities, including weak identity and access management,

  

Cryptominer deployed via compromised USB devices

Infected USB devices have been used to compromise organizations in the U.S., Europe, Asia, Africa, and Australia with cryptomining malware

  

New supply chain attack campaigns involving illicit software packages escalate

Malicious PyPI and npm packages that exploit dependencies have been increasingly used by threat actors in conducting supply chain intrusions,

  

XenoRAT trojan launched in South Korean foreign embassy-aimed cyberespionage

BleepingComputer reports that intrusions with the XenoRAT malware have been deployed against multiple European embassies across South Korea as part

  

Novel 5G attack technique uncovered

SecurityWeek reports that mobile devices running on 5G connectivity could have their messages compromised without the need for an illicit

  

Lenovo AI chatbot impacted by critical XSS bugs

Threat actors could exploit critical cross-site scripting vulnerabilities in Lenovo’s GPT-4-powered artificial intelligence chatbot Lena to facilitate malicious code injections

  

Cryptojacking scheme nets imprisonment for fraudster

The U.S. Justice Department announced that Nebraskan Charles O. Parks III, also known as CP30, has been sentenced to a

  

Actively exploited flaws persist in hundreds of N-able N-central instances

Over 870 online instances of the N-able N-central management, automation, and orchestration tool used by managed service providers continue to

  

Over a million impacted by Allianz Life breach

TechCrunch reports that leading U.S. life insurance firm Allianz Life had information from 1.1 million customers exfiltrated following a breach

  

Australian telco compromised in cyber incident

TPG Telecom, which is Australia’s second-largest fixed voice and data network, had its customers’ information pilfered following the breach of

  

Cyberattack infiltrates Bragg’s systems

Major casino game provider Bragg Gaming Group had its internal environments compromised following a systems breach identified over the weekend,

  

Ransomware, data theft strike telecoms in UK and Australia, raising concerns for critical infrastructure

U.K. telecoms giant Colt has been hit by a ransomware attack claimed by the Warlock gang, affecting some… The post

  

The future of government data, AI automation and mission-ready modernization

Government agencies may have a difficult time modernizing their systems and adopting AI, but those processes may also complement each

  

Crypto24 ransomware blends legitimate tools with custom malware to strike manufacturing, other sectors

Trend Micro has uncovered a new ransomware group, Crypto24, which blends legitimate tools with custom-built malware to carry… The post