{"id":35002,"date":"2020-05-15T12:02:29","date_gmt":"2020-05-15T12:02:29","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544081"},"modified":"2020-05-15T12:02:29","modified_gmt":"2020-05-15T12:02:29","slug":"this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/","title":{"rendered":"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/03\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, read about how researchers at Trend Micro used an app store to demonstrate hacks on a manufacturing facility. Also, learn about this month\u2019s patch activity from Microsoft.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/www.cyberscoop.com\/trend-micro-factory-attacks-federico-maggi\/\"><strong>How Two Researchers Used an App Store to Demonstrate Hacks on a Factory<\/strong><\/a><\/p>\n<p><em>When malicious code spread through the networks of Rheinmetall Automotive, it disrupted plants on two continents, temporarily costing up to $4 million each week. While awareness of these type of threats has grown, there\u2019s still a risk that too many organizations view such attacks as isolated incidents, rather than the work of a determined attacker. Federico Maggi, a senior researcher at Trend Micro, set out to dispel that mindset.<\/em><\/p>\n<p><a href=\"https:\/\/trendtalks.fyi\/security\/\"><strong>#LetsTalkSecurity: Hacker Adventures<\/strong><\/a> <strong>&nbsp;<\/strong><\/p>\n<p><em>This Week, Rik Ferguson, Vice President of Security Research at Trend Micro, hosted the second episode of #LetsTalkSecurity featuring Jayson E. Street, Vice President at SphereNY. This series explores security and how it impacts our digital world. In discussion with some of the brightest and most influential minds in the community, Trend Micro explores this fascinating topic. Check out this week\u2019s episode and follow the link to find information about upcoming episodes and guests.<\/em><\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/vulnerabilities\/microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\"><strong>Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday<\/strong><\/a><\/p>\n<p><em>For the third consecutive month Microsoft issued a hefty list of Patch Tuesday security updates covering 111 CVEs with 16 making the critical list. This is the third month Microsoft has had more than 100 vulnerabilities listed in its monthly security rollup, but unlike the last few months, May\u2019s&nbsp;list&nbsp;does not contain any vulnerabilities currently being exploited in the wild.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/principles-of-a-cloud-migration-security-w5h-the-where\/\"><strong>Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE<\/strong><\/a><\/p>\n<p><em>Where do we add security in the cloud? Start by removing the thinking that security controls are tied to specific implementations. You don\u2019t need an intrusion prevention wall that\u2019s a hardware appliance much like you don\u2019t need an agent installed to do anti-malware. This blog puts the focus on your configuration, permissions, and other best practices.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/securing-smart-manufacturing\/\"><strong>Securing Smart Manufacturing<\/strong><\/a><\/p>\n<p><em>Trend Micro recently published a report that surveys the Industry 4.0 attack surface, finding that within the manufacturing operation, the blending of IT and OT exposes additional attack surfaces. In the current report on rogue robots, Trend Micro collaborated with the Politecnico di Milano to analyze the range of specific attacks today\u2019s robots face, and the potential consequences those attacks may have.<\/em><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months\/\"><strong>Package Delivery Giant Pitney Bowes Confirms Second Ransomware Attack in 7 Months<\/strong><\/a><\/p>\n<p><em>Package and mail delivery giant Pitney Bowes suffered its second ransomware attack in seven months. The incident came to light after a ransomware gang known as Maze published a blog post claiming to have breached and encrypted the company\u2019s network. The Maze crew provided proof of access in the form of 11 screenshots portraying directory listings from inside the company\u2019s computer network.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/tropic-troopers-back-usbferry-attack-targets-air-gapped-environments\/\"><strong>Tropic Trooper\u2019s Back: USBferry Attack Targets Air-Gapped Environments<\/strong><\/a><\/p>\n<p><em>Trend Micro recently found that Tropic Trooper\u2019s latest activities center around targeting Taiwanese and the Philippine military\u2019s physically isolated networks through a USBferry attack. Trend Micro also observed targets among military\/navy agencies, government institutions, military hospitals, and a national bank. The group employs USBferry, a USB malware that performs different commands on specific targets, maintains stealth in environments, and steals critical data through USB storage.<\/em><\/p>\n<p><a href=\"https:\/\/threatpost.com\/texas-courts-ransomware-attack\/155711\/\"><strong>Texas Courts Won\u2019t Pay Up in Ransomware Attack<\/strong><\/a><\/p>\n<p><em>A ransomware attack has hit the IT office that supports Texas appellate courts and judicial agencies, leading to their websites and computer servers being shut down. The office said that it will not pay the ransom requested by the cybercriminals. Specifically affected is the Office of Court Administration, which is the IT provider for the appellate courts and state judicial agencies within the Texas Judicial Branch.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-macos-dacls-rat-backdoor-show-lazarus-multi-platform-attack-capability\/\"><strong>New MacOS Dacls RAT Backdoor Show Lazarus\u2019 Multi-Platform Attack Capability<\/strong><\/a><\/p>\n<p><em>Trend Micro found an application sample in April called TinkaOTP that seemed like a normal one-time password authentication tool. However, further investigation showed the application bearing a striking resemblance to Dacls remote access trojan (RAT), a Windows and Linux backdoor that 360 Netlab discovered in December 2019.<\/em><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/facebook-awards-researcher-20000-account-hijacking-vulnerability\"><strong>Facebook Awards Researcher $20,000 for Account Hijacking Vulnerability<\/strong><\/a><\/p>\n<p><em>Security researcher Vinoth Kumar says Facebook awarded him $20,000 after he discovered and reported a Document Object Model-based cross-site scripting (DOM XSS) vulnerability that could have been exploited to hijack accounts. The researcher says he discovered the vulnerability in the window.postMessage() method, which is meant to safely enable cross-origin communication between Window objects.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/cloud-security-key-concepts-threats-and-solutions\"><strong>Cloud Security: Key Concepts, Threats, and Solutions<\/strong><\/a><\/p>\n<p><em>Enterprises may be migrating requirements to the cloud, starting fully in the cloud (going \u201ccloud native\u201d), or mastering their cloud-based security strategy. Regardless of what stage of the cloud journey a company is in, cloud administrators should be able to conduct security operations like performing vulnerability management, identifying important network events, carrying out incident response, and gathering and acting on threat intelligence \u2014 all while keeping many moving parts in compliance with relevant industry standards.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/from-bugs-to-zoombombing-how-to-stay-safe-in-online-meetings\/\"><strong>From Bugs to Zoombombing: How to Stay Safe in Online Meetings<\/strong><\/a><\/p>\n<p><em>Forced to now work, study, and socialize at home, the online digital world has become essential to our communications \u2014 and video conferencing apps have become our \u201cface-to-face\u201d window on the world. The problem is that as users flock to these services, the bad guys are also waiting to disrupt or eavesdrop on chats, spread malware, and steal data. In this blog, Trend Micro explores some of the key threats out there and how users can stay safe while video conferencing.<\/em><\/p>\n<p>Surprised by Texas courts\u2019 decision not to pay the ransom in its latest ransomware attack? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, read about how researchers at Trend Micro used an app store to demonstrate hacks on a manufacturing facility. Also, learn about this month\u2019s patch activity from Microsoft&#8230;.<br \/>\nThe post This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35003,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[311,307],"class_list":["post-35002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-current-news","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-15T12:02:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday\",\"datePublished\":\"2020-05-15T12:02:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\"},\"wordCount\":994,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg\",\"keywords\":[\"Current News\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\",\"name\":\"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg\",\"datePublished\":\"2020-05-15T12:02:29+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Current News\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/current-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/","og_locale":"en_US","og_type":"article","og_title":"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-15T12:02:29+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday","datePublished":"2020-05-15T12:02:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/"},"wordCount":994,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg","keywords":["Current News","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/","url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/","name":"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg","datePublished":"2020-05-15T12:02:29+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-how-researchers-used-an-app-store-to-demonstrate-hacks-on-a-factory-and-microsoft-again-surpasses-100-vulnerabilities-on-patch-tuesday\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Current News","item":"https:\/\/www.threatshub.org\/blog\/tag\/current-news\/"},{"@type":"ListItem","position":3,"name":"This Week in Security News: How Researchers Used an App Store to Demonstrate Hacks on a Factory and Microsoft Again Surpasses 100 Vulnerabilities on Patch Tuesday"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35002"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35002\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35003"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}