Samsung today announced the new Galaxy A57 5G and Galaxy A37 5G, the latest Galaxy A series devices that bring Samsung’s newest mobile innovations — including enriched Awesome Intelligence — to more users worldwide. The latest Galaxy A series reflects Samsung’s commitment to expanding AI capabilities across more devices and empowering more users to harness the power of intuitive AI that simplifies everyday tasks. Galaxy A57 5G and Galaxy A37 5G strengthen the experiences users rely on every day with upgrades to performance, camera and display, alongside durability and security features. With long-term security support, the new Galaxy A series is built for the long-haul. Leading the lineup is the Galaxy A57 5G, featuring a slimmer, more refined design and upgraded AI-powered capabilities that make it the most powerful Galaxy A series device yet.
Enriched Awesome Intelligence Designed for Everyday Life
Through the latest One UI 8.5, Galaxy A57 5G and A37 5G extend Samsung’s latest AI innovations to more users, with Awesome Intelligence that helps people get more things done with ease while unlocking new ways to create and stay productive.
Voice Transcription is new to the Voice Recorder app, making it easier to revisit important details from meetings, lectures or calls by quickly transcribing and translating call recordings or turning voicemail audio into text. AI Select is easier to access with a long press on the Edge Panel, surfacing relevant actions directly on the screen to extract text or create content without manually selecting items. AI Select also supports Drag & Drop in Multi-Window layout, allowing users to easily move images into Samsung Notes or Photo Editor for faster editing and improved productivity.
Awesome Intelligence makes everyday photo editing easier than ever. Object Eraser now delivers more natural results when removing unwanted distractions, like a passerby in the background or clutter in a café. On Galaxy A57 5G, Best Face supports more photos and continuous shooting, making it easier to capture the perfect group photos where everyone looks their best. Fan favourite tools like Filters and Edit Suggestions help users quickly refine and share moments without extra effort, while Galaxy A57 5G also features Auto Trim for even easier video editing.
Circle to Search with Google adds multi-object recognition so users can easily explore multiple items in an image at once — from an outfit to surrounding accessories — all in one search.
The new Galaxy A series expands Awesome Intelligence experiences with a choice of agents designed to simplify everyday tasks from search to organizing plans or easily adjusting settings. As a conversational device agent, upgraded Bixby lets users intuitively control Galaxy settings and features using natural language, while Gemini navigates complex tasks across native Galaxy apps and select third-party apps to support faster, more intuitive interactions.
Awesome Camera to Capture Clearer Photos and Videos, Day or Night
As AI becomes more deeply integrated into mobile experiences, camera performance remains essential to delivering the everyday usability and satisfaction users expect.
Galaxy A57 5G and A37 5G deliver brighter, clearer visuals powered by the upgraded camera hardware and an improved Image Signal Processor (ISP). The devices feature a versatile triple-camera system, led by a 50MP main sensor, delivering sharp, detailed images across a wide range of lighting conditions without the need for manual adjustments.
When the lights go down, the Galaxy A57 5G and A37 5G camera adapts seamlessly with Nightography, capturing clear and true-to-life photos and videos even in low light conditions.
Galaxy A57 5G takes photography a step further with enhanced image processing that sharpens detail and reduces noise for even clearer, more vibrant results. It delivers rich contrast and balanced colour even in challenging light, and with a faster shutter speed, users can instantly capture fleeting moments faster and with improved clarity.
Galaxy A57 5G and A37 5G also benefit from AI-based subject recognition and scene optimization to balance portraits, preserve natural skin tones and create clearer background separation. When the moment calls for a wider perspective, the ultra-wide lens captures more in every group photo or landscape view, while the 5MP macro camera reveals fine details up close for added creative flexibility.
Performance for Streaming and Multitasking
Galaxy A57 5G delivers an improved design and performance, combining upgraded CPU, GPU and NPU to deliver improved performance with its sleek and light form. Built for smooth streaming, scrolling and content creation, its refined design features a glossy finish and distinctive triple-camera island for a standout modern look that feels comfortable in-hand.
Despite its slimmer profile, Galaxy A57 5G packs powerful performance. Its 5,000mAh battery supports up to two days of use — powering everything from filming and editing to viewing on the go. Super Fast Charging 2.0 reaches up to 60% in around 30 minutes for a quick boost before heading out, while a 13% larger vapor chamber helps sustain performance during extended gaming or recording. Slimmer bezels and a bright Super AMOLED + display with Vision Booster on both models ensure an immersive, clear viewing experience indoors and outside.
Built for everyday use, Galaxy A57 5G and A37 5G are rated IP68 for water and dust resistance, adding protection in real-world environments and offering users peace of mind when accidents happen.
Long-Term Support and Foundational Security
Galaxy A57 5G and A37 5G reinforce Samsung’s commitment to device longevity, giving users the confidence to rely on their device for years to come.
Samsung provides a fortified layer of device safety, transparency and user choice with Knox Vault, a hardware-based, tamper-resistant security solution. Galaxy A series offers users holistic protection through innovative security and privacy features including Security & Privacy Dashboard, Auto Blocker, Private Sharing, Theft Protection as well as the new Private Album, a Gallery feature that allows users to lock away personal media quickly and easily. Unlike traditional safeguards, the latest A series devices also proactively notify users about potential risks with Privacy Alerts, which are intelligent notifications that offer clearer insight and control over location permissions or suspicious monitoring of sensitive data. Together, these enhancements make security feel as intuitive as the rest of the experience, making device protection easier than ever for everyone.
Availability
Galaxy A57 5G and A37 5G will be available starting April 9 in select markets. Galaxy A57 5G will be offered in Awesome Navy, while Galaxy A37 5G comes in Awesome Charcoal. For added peace of mind, Samsung Care+ offers comprehensive coverage optimized to users’ device needs, including tailored benefits that help protect the device’s value.
179 internet-exposed ICS devices across 20 countries identified via insecure Modbus protocol
Posted in Commentary with tags Comparitech on April 9, 2026 by itnerdResearchers at Comparitech have identified 179 internet-exposed industrial control system (ICS) devices across 20 countries, including systems tied to power grids and railway networks, all accessible via the Modbus protocol. The devices were found responding on port 502, the default communication port for Modbus, which is widely used in critical infrastructure environments.
The exposed systems include equipment from major vendors such as Schneider Electric and ABB, performing functions like logic control, power monitoring, and data logging. The United States had the highest number of exposed devices at 57, followed by Sweden (22) and Turkey (19).
Denis Calderone, CTO, Suzu Labs:
“During yesterday’s extremely busy cybersecurity news cycle we were all abuzz about the six-agency advisory about Iranian actors targeting US critical infrastructure PLCs. One thing we pointed out yesterday while conversing with clients and others was to look for any Internet exposure to certain protocols used by PLCs including Modbus TCP on port 502.
“Modbus is particularly concerning because it is a protocol developed without security controls. Now, today, Comparitech publishes research showing 179 ICS devices sitting exposed on that exact port across 20 countries, with the United States leading the count at 57 devices. The timing on this could not be more relevant.
“To put it bluntly, Modbus was designed in 1979 for closed industrial networks and that’s why it lacks any concept of authentication and no encryption. If you can reach port 502, you can read from and write to the device registers. The researchers didn’t just do a Shodan search and look at headers, they performed a Masscan, identified open Modbus ports and were able to chart live energy consumption from an exposed power monitoring device using the manufacturer’s publicly available register list.”
“We already know the Iranian hackers are looking for this, and these devices are just sitting there waiting to be found. So, what we said yesterday stands today that PLCs and ICS devices need to be behind firewalls and segmented OT network zones, not exposed to the internet. Modbus was never meant to be an internet-facing protocol.
“The convergence of industrial systems onto IP networks has been causing this kind of exposure for decades now. If your organization runs any industrial control systems, scan your own environment for anything responding on port 502 and take it off the internet today. If you need remote access for maintenance or monitoring, put it behind a VPN. There is no scenario where an unauthenticated industrial control protocol should be directly reachable from the public internet.”
Damon Small, Board of Directors, Xcape, Inc.:
“Exposing Industrial Control System (ICS) assets directly to the Internet via unauthenticated protocols like Modbus represents a critical failure in perimeter hygiene that invites immediate disruption of physical operations.
“While the report’s tally of 179 devices is statistically small, the inclusion of programmable logic controllers (PLC) and power monitors in the U.S. and Sweden highlights a persistent gap in securing critical infrastructure. The fundamental issue is that Modbus lacks native encryption or authentication, meaning any device responding on port 502 is effectively an open door for unauthenticated read and write commands.
“Recent surges in activity from state-affiliated actors targeting similar vulnerabilities underscore that this is no longer a theoretical risk but an active targeting priority. Security teams must move beyond simple port blocking and verify that any necessary remote access is tunneled through a robust VPN or a secure gateway with granular identity controls.
“Prioritize an immediate scan of external IP ranges for port 502 and audit all Modbus TCP gateways to ensure they are not bridging internal Operation Technology (OT) and industrial control networks directly to the public Internet. Use the Purdue Model reference architecture for guidance on how to properly segment OT from IT to protect these critical infrastructures. In short, the problem is not with the devices or the protocols that they use, but rather the manner in which operators are deploying them.
“It is 2026, and we are still arguing about whether a power grid should be a public webpage.”
Larry Pesce, VP of Services, Finite State:
“This highlights a recurring and concerning issue: internet-exposed industrial control system (ICS) devices, particularly those using legacy protocols like Modbus that were never designed with security in mind.
“What stands out here isn’t just the exposure itself: it’s where it’s happening.
“Critical infrastructure organizations such as energy, water, and manufacturing have historically been among the most cautious when it comes to external attack surfaces. These environments typically emphasize segmentation, controlled access, and layered defenses. So seeing these systems directly reachable from the internet suggests a breakdown in foundational security practices.
“And that’s really the key takeaway:
“This isn’t a failure of advanced security controls, it’s a failure of fundamentals.
“The “Back to Basics” Problem
“What these exposures reinforce is the need to revisit core disciplines such as network perimeter management. If Modbus is reachable from the public internet, something upstream like firewalls, routing, and/or segmentation have failed. Full stop.
“Also, asset inventory. You can’t protect what you don’t know exists. Internet-wide scans keep finding devices because organizations don’t have a complete, continuously updated view of what’s deployed.
“Patch and update hygiene. Even when exposure is unavoidable, outdated firmware and unpatched services dramatically increases risk.
“Redundancy and resilience planning. Many ICS environments assume availability—but exposure introduces fragility. Even “low impact” disruptions can cascade if redundancy isn’t properly designed.
“The compounding risk effect is the part that tends to get underestimated.
“Individually, many of these exposed systems might not lead to catastrophic outcomes. Maybe it’s read-only access. Maybe it’s a non-critical site. Maybe exploitation requires additional steps.
“But security doesn’t fail in isolation.
“When you stack dozens, or hundreds, of “low impact” exposures, you create systemic risk.
“Attackers don’t need a single catastrophic vulnerability if they can enumerate environments, chain small weaknesses, and establish footholds across multiple sites. At that point, even minor disruptions can aggregate into operational, safety, or economic consequences.
“This keeps happening because a lot of organizations still rely on point-in-time scans and assumptions about what’s deployed. But what matters is what’s actually running in the field: the firmware, the configurations, the exposed services.
“And this is exactly the gap. Traditional approaches often miss “firmware reality”: the full picture of what’s deployed, exposed, and reachable.
“Without a continuous, accurate inventory tied to real deployed assets, these exposures slip through, even in mature environments.
“Honestly, this isn’t about blaming operators or engineers. These environments are complex, often decades in the making, with layers of legacy decisions.
“But moments like this are a good reset. Not a “we need more AI security tooling” moment or a “zero trust will fix everything” moment.
“This is a: “Did we lock the front door?” moment. Because in this case… the front door is Modbus on port 502, wide open to the internet.”
My admin page nor anything else that’s tied to administrating my router isn’t exposed to the Internet. I do that because I am paranoid that I will get pwned because I gave a threat actor the means to pwn me. I would suggest we all start to become a lot more paranoid.
Leave a comment »