#critical-infrastructure

[ follow ]
#cyber-sabotage
Information security
fromNextgov.com
1 day ago

Stryker hack could set stage for more pro-Iran cyber sabotage

Pro-Iran hacking group Handala attacked medical technology company Stryker using wiper malware, signaling potential escalation of Iran-linked cyber sabotage targeting U.S. and Israeli organizations.
US news
fromMail Online
1 day ago

New Jersey drone scare explodes again as police files reveal truth

Newly released documents reveal New Jersey police documented dozens of incidents involving large unidentified drones operating near critical infrastructure, military facilities, and restricted airspace throughout 2024.
#cyberattack
fromTechRepublic
2 days ago
Information security

Iran-Linked Hacktivists Hit Stryker, Knocking Employees Offline Across Multiple Countries

fromTechRepublic
2 days ago
Information security

Iran-Linked Hacktivists Hit Stryker, Knocking Employees Offline Across Multiple Countries

Information security
fromSecuritymagazine
3 days ago

Suspected Iranian Cyberattack Targets U.S. Medtech Company Stryker

Stryker experienced a global cyberattack involving destructive wiper malware that disabled Windows systems across the company, disrupting healthcare equipment supply chains worldwide.
Information security
fromSecurityWeek
1 month ago

Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Russia-linked hackers breached ICS at roughly 30 Polish energy sites, damaging some devices and targeting monitoring systems without causing power outages.
#cyberattacks
fromDataBreaches.Net
2 weeks ago
Privacy technologies

Top NATO allies believe cyberattacks on hospitals are an act of war. They're still struggling to fight back. - DataBreaches.Net

Information security
fromSecuritymagazine
1 week ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromNextgov.com
1 week ago

Iran-linked hacktivists could target governments, experts warn

Iranian regime-aligned hacktivists may escalate cyberattacks against U.S. state and local government targets, financial services, and energy sectors in retaliation for military operations.
fromDataBreaches.Net
2 weeks ago
Privacy technologies

Top NATO allies believe cyberattacks on hospitals are an act of war. They're still struggling to fight back. - DataBreaches.Net

Venture
fromComputerWeekly.com
4 days ago

Ericsson, Future Technologies scale wireless infrastructure for industrial AI | Computer Weekly

Ericsson and Future Technologies Venture expand collaboration to deploy enterprise wireless and private 5G networks across North American industrial and critical infrastructure sectors to support AI-driven operations.
Artificial intelligence
fromwww.theguardian.com
4 days ago

Datacenters are becoming a target in warfare for the first time

Iran deliberately targeted commercial datacenters in the Persian Gulf, marking the first known instance of a country at war striking commercial datacenters, causing widespread service disruptions across the UAE and Bahrain.
Information security
fromThe Hacker News
4 days ago

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CISA added three actively exploited vulnerabilities to its KEV catalog, including critical flaws in SolarWinds Web Help Desk, Omnissa Workspace One UEM, and Ivanti Endpoint Manager, with federal agencies required to patch by mid-to-late March 2026.
fromFortune
6 days ago

The Persian Gulf's 'saltwater kingdoms' rely so much on desalination that damage to the infrastructure could force evacuations | Fortune

In Kuwait, about 90% of drinking water comes from desalination, along with roughly 86% in Oman and about 70% in Saudi Arabia. The technology removes salt from seawater - most commonly by pushing it through ultrafine membranes in a process known as reverse osmosis - to produce the freshwater that sustains cities, hotels, industry and some agriculture across one of the world's driest regions.
World news
World news
fromwww.theguardian.com
1 week ago

It means missile defence on data centres': drone strikes raises doubts over Gulf as AI superpower

Iranian drones struck Amazon Web Services datacentres in the UAE and Bahrain, causing widespread civilian disruption and marking the first deliberate targeting of commercial datacentres by armed forces during active conflict.
Tech industry
fromBusiness Insider
1 week ago

Big Tech's new reality: Data centers are a war target

Drone strikes on Amazon data centers in the Middle East mark the first direct military targeting of Big Tech infrastructure, establishing data centers as critical warfare targets.
Information security
fromSecurityWeek
1 week ago

Iranian APT Hacked US Airport, Bank, Software Company

Iranian APT MuddyWater compromised networks across US aerospace, defense, banking, and NGO sectors, deploying new backdoors Dindoor and Fakeset amid regional military tensions.
#cyber-attacks
Information security
fromComputerWeekly.com
1 week ago

Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly

Pro-Iran hacktivist groups have intensified cyber attacks across Middle Eastern infrastructure, including breaches at Saudi energy facilities and GPS spoofing attacks affecting over 1,000 Persian Gulf ships during escalating regional conflict.
World news
fromIntelligencer
1 week ago

The Future of War Is Drones Bombing Data Centers

Iranian drone strikes on data centers in the UAE and Bahrain demonstrate a new warfare strategy targeting critical digital infrastructure, causing cascading internet outages across multiple regions and affecting major global companies.
#cybersecurity
fromTechCrunch
1 month ago
Information security

Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch

Information security
fromTheregister
3 months ago

US extradites Ukrainian accused of hacking for Russia

Ukrainian woman extradited to the U.S. accused of hacking U.S. water systems and a meat processing facility for Kremlin-backed cyber groups; trials set for 2026.
Information security
fromComputerWeekly.com
3 months ago

Western coalition supplying tech to Ukraine prepared for long war | Computer Weekly

Western-supported coalition supplied over €1.3bn in telecoms and IT equipment enabling Ukraine's government and critical services to remain operational despite Russian cyber and kinetic attacks.
Information security
fromTheregister
1 week ago

Businesses told to harden defenses amid Iran conflict risk

The UK's NCSC warns organizations of potential cyber threats from Middle East conflict escalation, with indirect threats almost certain for region-linked businesses.
fromTechCrunch
1 month ago
Information security

Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch

SF politics
fromIrish Independent
1 week ago

Dail to vote on designating building projects as 'critical' before they are fast tracked through planning process

The Dáil will vote on designating building projects as 'critical' before the Government fast-tracks them through the planning process.
fromDataBreaches.Net
1 week ago

Wisconsin k-12 district hit by weeklong outage - DataBreaches.Net

A reported "cyber incident" left the Denmark School District in the Village of Denmark, Wisconsin, without internet access for five school days, forcing teachers and students to rely on paper-based workarounds, according to a local news report.
Information security
Privacy professionals
fromDataBreaches.Net
1 week ago

Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule - DataBreaches.Net

A partial government shutdown delays the DHS cybersecurity incident reporting rule, leaving companies uncertain about compliance requirements and enforcement timelines.
Information security
fromSecurityWeek
2 weeks ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
fromTheregister
2 weeks ago

Open Source Endowment aims to raise big pile of money

Free open source software is fundamentally broken. In 2023, Denis Pushkarev, maintainer of the widely used core-js library, vented his frustration with the fact that users of his software seldom offer financial support, highlighting the disconnect between widespread dependency on open source and inadequate financial compensation for developers maintaining critical infrastructure.
Miscellaneous
Information security
fromTechCrunch
2 weeks ago

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 | TechCrunch

Cisco discovered a critical vulnerability in Catalyst SD-WAN products exploited since 2023, allowing remote attackers maximum-level network access and persistent hidden infiltration of enterprise and government networks.
Information security
fromComputerWeekly.com
2 weeks ago

Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly

UK and Five Eyes agencies warn of active threat campaigns targeting Cisco Catalyst SD-WAN products, requiring immediate investigation and patching of critical authentication bypass vulnerabilities.
Mental health
fromSecuritymagazine
3 weeks ago

Security Insights Delivered Through Podcasts

Security professionals face significant mental-health risks and team burnout, requiring leaders to integrate empathetic practices and psychological safety into security operations.
fromTheregister
3 weeks ago

China-linked crew embedded in US energy networks

In its yearly cybersecurity report, Dragos said state-sponsored crews haven't let up on their attempts to compromise America's critical infrastructure, with three new OT-focused threat groups joining the fray. This brings the total number worldwide to 26, and of these, 11 were active in 2025. Additionally, an existing group that Dragos tracks as Voltzite and is "highly correlated" with Volt Typhoon, according to Dragos CEO Robert M. Lee, kept up its intrusion activities last year.
Information security
Information security
fromSecurityWeek
3 weeks ago

3 Threat Groups Started Targeting ICS/OT in 2025: Dragos

Three new threat groups—Sylvanite, Azurite, and Pyroxene—began targeting ICS and OT in 2025, expanding threats to critical infrastructure globally.
US politics
fromSecurityWeek
3 weeks ago

CISA Navigates DHS Shutdown With Reduced Staff

CISA operations continue during the DHS shutdown at reduced capacity, requiring 888 of 2,341 staff to work without pay while projects are curtailed.
#ai-safety
fromTheregister
4 weeks ago

Misconfigured AI could shut down a G20 nation, says Gartner

Unlike traditional software bugs that might crash a server or scramble a database, errors in AI-driven control systems can spill into the physical world, triggering equipment failures, forcing shutdowns, or destabilizing entire supply chains, Gartner warns. "The next great infrastructure failure may not be caused by hackers or natural disasters but rather by a well-intentioned engineer, a flawed update script, or a misplaced decimal," cautioned Wam Voster, VP Analyst at Gartner.
Artificial intelligence
Information security
fromThe Hacker News
4 weeks ago

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

Attackers increasingly exploit trusted tools, simple entry points, and overlooked exposures to maintain persistent, value-driven access across cybercrime and espionage.
#counter-drone
#cyber-espionage
Information security
fromTechCrunch
1 month ago

China's Salt Typhoon hackers broke into Norwegian companies | TechCrunch

Chinese-backed hacking group Salt Typhoon breached multiple Norwegian organizations, exploiting vulnerable network devices to conduct espionage.
Information security
fromTechzine Global
1 month ago

BICS and Anapaya deliver new secure SCION networks worldwide

BICS and Anapaya will deploy SCION worldwide to give organizations direct control over data traffic and enable secure, compliant cross-border connectivity.
#cyberwarfare
Information security
fromNextgov.com
1 month ago

NIST releases a new draft cybersecurity framework for systems that never stop moving

Transportation cybersecurity lags behind other critical infrastructure sectors, creating evacuation and public-safety risks as transit systems become more digitalized.
Germany news
fromThe Local Germany
1 month ago

Germany to strenghten critical infrastructure as Russia fears spike

Germany will require about 1,700 essential service providers to strengthen security, conduct risk assessments, and promptly report incidents to protect critical infrastructure from sabotage.
#ai-driven-cyberattacks
fromFortune
4 months ago
Information security

AI empowers criminals to launch 'customized attacks at scale'-but could also help firms fortify their defenses, say tech industry leaders | Fortune

fromFortune
4 months ago
Information security

AI empowers criminals to launch 'customized attacks at scale'-but could also help firms fortify their defenses, say tech industry leaders | Fortune

fromSecurityWeek
1 month ago

Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems

The Indurex platform ingests and correlates data from multiple sources across the cyber-physical stack, with a strong focus on industrial historians, instrumentation and asset management systems (IAMS), alarm management, and OT network and endpoint data. The platform, which can be integrated with third-party OT security solutions, is designed to unify cyber, process, and safety context into a single operational view, using adaptive risk scoring to highlight issues and prioritize response actions.
Information security
Information security
fromSecuritymagazine
1 month ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
Information security
fromArs Technica
1 month ago

Wiper malware targeted Poland energy grid, but failed to knock out electricity

Poland's electric grid was targeted by wiper malware likely deployed by Russia-aligned Sandworm, aiming to disrupt communications between renewables and power operators but failing.
Information security
fromArs Technica
6 years ago

New clues show how Russia's grid hackers aimed for physical destruction

Russian hackers aimed to cause lasting physical destruction to Ukrainian power-grid equipment by using malware designed to damage hardware during recovery, not a brief outage.
World news
fromWIRED
1 month ago

US Hackers Reportedly Caused a Blackout in Venezuela

The U.S. conducted a cyberattack that caused a Venezuelan power blackout and disabled air-defense radar during Operation Absolute Resolve.
fromThe Hacker News
1 month ago

China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

Cisco Talos, which is tracking the activity under the name UAT-8837, assessed it to be a China-nexus advanced persistent threat (APT) actor with medium confidence based on tactical overlaps with other campaigns mounted by threat actors from the region. The cybersecurity company noted that the threat actor is "primarily tasked with obtaining initial access to high-value organizations," based on the tactics, techniques, and procedures (TTPs) and post-compromise activity observed.
Information security
fromFortune
1 month ago

AI will infiltrate the industrial workforce in 2026-let's apply it to training the next generation, not replacing them | Fortune

A silent crisis is shaking the very foundations of modern society. The industrial workforce responsible for building the global economy is at risk of crumbling. The people charged with keeping our power grids online, factories humming, utilities reliable, and supply chains moving uninterrupted are retiring at a fast clip. Sure, this may seem like the natural cycle of things as mass retirement opens the door to at least 3.8 million jobs.
Artificial intelligence
Berlin
fromwww.dw.com
2 months ago

Berlin blackouts cast light on infrastructure in Germany DW 01/10/2026

A January arson-caused blackout in southwestern Berlin revealed failures in emergency response, communication, and preparedness, leaving thousands, including vulnerable residents, without adequate support.
Information security
fromAxios
2 months ago

Maduro raid had telltale signs of a cyber-enabled blackout

U.S. Cyber Command and Space Command supported a targeted operation in Venezuela that produced selective, immediate blackouts to facilitate an action against the president.
fromTechzine Global
2 months ago

Cybersecurity in 2026 demands managing human behavior and agentic AI

In organizations with mature processes, this demonstrably leads to a 30 to 50 percent reduction in mean time to respond. This is not an optimization, but a necessary adjustment. The question is no longer whether AI agents will be deployed, but how far their autonomy extends. Security teams must explicitly determine which decisions can be automated and where human oversight remains mandatory. If these frameworks are lacking, the risks only increase.
Artificial intelligence
UK politics
fromTheregister
2 months ago

UK urged to cut out US Big Tech for sake of digi sovereignty

The UK relies heavily on US tech companies for critical digital infrastructure, risking national digital sovereignty and requiring the Cybersecurity and Resilience Bill to reduce dependency.
fromTheregister
2 months ago

UK government unveils 210M plan for cybersecurity overhaul

The funding will establish a Government Cyber Unit, led by the UK's CISO and overseen by the Department for Science, Innovation and Technology (DSIT), to improve risk identification, incident response, and recovery capabilities. The unit will also create a dedicated Government Cyber Profession, elevating cybersecurity from its current placement under the broader Government Security Profession.
UK politics
fromSecuritymagazine
2 months ago

CISA Releases Guide for Stadium and Arena Security

The Cybersecurity and Infrastructure Security Agency (CISA) published a guide detailing venue security and disruption management. In this guide, venue owners and operators can review fundamental strategies to mitigate repercussions of possible disruptions to the critical lifeline sectors of: Communications Energy Transportation Water and Wastewater Systems While this guide serves as a broad catalog for support, it is not comprehensive. Security leaders in the event security space are encouraged to leverage the provided resources and consider them in the context of their venue's unique needs.
Information security
Information security
fromNextgov.com
2 months ago

When data defense becomes national defense

Securing data systems is essential to national security because AI-enabled infrastructure depends on trustworthy data and resilient data pipelines.
Information security
fromThe Hacker News
2 months ago

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

GRU-linked APT44 ran a 2021–2025 campaign targeting Western critical infrastructure, exploiting misconfigured network edge devices and known software vulnerabilities.
fromTheregister
2 months ago

Amazon security boss blames Russia's GRU for energy hacks

The campaign demonstrates sustained focus on Western critical infrastructure, particularly the energy sector, with operations spanning 2021 through the present day,
Information security
US politics
fromNextgov.com
2 months ago

Trump admin to revisit bedrock cyber policies as it implements new strategy

The White House will revise core cyber policies and issue a six-pillar cybersecurity strategy to preempt adversaries, modernize networks, and secure critical infrastructure.
fromThe Atlantic
3 months ago

Trump's AI-Regulation Ban Is a Threat to National Security

Proponents of AI preemption equate competitiveness with deregulation, arguing that state-level guardrails hamper innovation and weaken the United States in its technological competition with China. The reality is the opposite. Today's most serious national-security vulnerabilities involving AI stem not from too much oversight, but from the absence of it. AI systems already underpin essential functions across our economy and national-security apparatus, including airport routing, energy-grid forecasting, fraud-detection systems, real-time battlefield data integration, and an expanding range of defense-industrial-base operations.
Artificial intelligence
fromTheregister
3 months ago

How NATO crafts stories to sharpen cyber skills

Andravia and Harbadus - two nations so often at odds with one another - were once again embroiled in conflict over the past seven days, which thoroughly tested NATO's cybersecurity experts' ability to coordinate defenses across battlefield domains. Around 1,500 practitioners took part in the annual battle that engulfed the island of Occasus-Icebergen, all working together to remediate cyberattacks on critical systems, the effects of which influenced how land, sea, and air forces were able to respond.
Information security
Information security
fromTheregister
3 months ago

PRC spies Brickstromed their way into critical US networks

China-backed cyber actors used Brickstorm to maintain long-term access to multiple critical networks, infecting systems across Linux/VMware/Windows and stealing data and cryptographic keys.
fromThe Hacker News
3 months ago

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

Cybersecurity company watchTowr Labs said it captured a dataset of over 80,000 files on these sites, uncovering thousands of usernames, passwords, repository authentication keys, Active Directory credentials, database credentials, FTP credentials, cloud environment keys, LDAP configuration information, helpdesk API keys, meeting room API keys, SSH session recordings, and all kinds of personal information. This includes five years of historical JSONFormatter content and one year of historical CodeBeautify content, totalling over 5GB worth of enriched, annotated JSON data.
Information security
fromTheregister
3 months ago

Countries use cyber targeting to plan strikes: Amazon CSO

This represents a "new operational model that's neither traditional cyber attack nor conventional warfare," Amazon Chief Security Officer Steve Schmidt told The Register. "The targeting data collected through cyber means flows directly into kinetic decision making."
Information security
World news
fromwww.theguardian.com
3 months ago

Moscow passes laws to boost defences against Ukrainian strikes

Russia enacts broad laws and deploys reservists and air defences to protect critical infrastructure as Ukrainian drones and deep-strike operations target energy sites and military figures.
Information security
fromTheregister
3 months ago

Take fight to the enemy, US cyber boss says

The U.S. will adopt an offensive national cyber strategy to impose costs on foreign threat actors and coordinate government and private sector actions.
fromTheregister
3 months ago

Akira ransomware starts hitting Nutanix AHV

In an updated advisory produced with the FBI and European law enforcement partners, it said Akira has expanded its capabilities and is now targeting Nutanix AHV virtual machines, an evolution from its previous attacks against VMware ESXi and Hyper-V. The agencies spotted attacks against Nutanix hypervisors in June, but did not specify the affected organizations, and added that the data informing the advisory is as recent as November 2025.
Information security
Information security
fromTechzine Global
3 months ago

Link11 aims to grow further through expansion in the Netherlands

Link11 appoints Stefan Benske as Account Executive Netherlands to expand cloud-native DDoS and WAAP protection for critical infrastructure sectors and NIS2 compliance.
fromTechCrunch
4 months ago

Australian spy chief warns Chinese hackers are 'probing' critical networks for espionage and sabotage | TechCrunch

According to Burgess, a hacker group known as Volt Typhoon is trying to break into critical infrastructure networks such as power, water, and transportation systems. Burgess warned that successful hacks could affect energy and water supplies, and cause widespread outages. The U.S. has previously said that the Chinese hackers have spent years planting malware on critical infrastructure systems that are capable of causing disruptive cyberattacks when activated.
Information security
fromComputerWeekly.com
4 months ago

IT services companies and datacentres face regulation as cyber security bill reaches Parliament | Computer Weekly

The Cyber Security and Resilience Bill (CSRB) aims to ensure critical services, including healthcare, water, transport and energy, are protected against cyber attacks, which cost the UK economy almost £15bn a year.
UK politics
fromArs Technica
4 months ago

Wipers from Russia's most cut-throat hackers rain destruction on Ukraine

In April, the group targeted a Ukrainian university with two wipers, a form of malware that aims to permanently destroy sensitive data and often the infrastructure storing it. One wiper, tracked under the name Sting, targeted fleets of Windows computers by scheduling a task named DavaniGulyashaSdeshka, a phrase derived from Russian slang that loosely translates to "eat some goulash," researchers from ESET said. The other wiper is tracked as Zerlot.
Information security
Environment
fromComputerWeekly.com
4 months ago

E.ON taps Nokia for comms network modernisation | Computer Weekly

E.ON will deploy a Nokia-based communications network to improve security, resilience, and efficiency across its distribution grid, supporting renewable integration and faster incident response.
fromTheregister
4 months ago

Cyberpunks mess with Canada's water, energy, farm systems

The victims included a municipal water facility where pressure values were changed, an oil and gas company whose tank gauge was tampered with, and a farm silo where drying temperatures were altered, "resulting in potentially unsafe conditions if not caught on time." Officials stressed these weren't sophisticated, state-sponsored operations but opportunistic intrusions that caused real-world disruption ranging from false alarms to degraded service. The attackers didn't need custom malware or insider access either - just a connection and curiosity.
Canada news
Information security
fromAxios
4 months ago

AI is about to supercharge cyberattacks

Generative AI enables hackers to enhance skills and automate attack chains, increasing success rates and targeting critical infrastructure and financial services.
Digital life
fromwww.theguardian.com
4 months ago

The Guardian view on the cloud crash: an outage that showed who really runs the internet | Editorial

A 15-hour AWS outage disrupted thousands of companies and millions of users, exposing heavy dependence and vulnerability to a few dominant cloud providers.
fromwww.dw.com
4 months ago

Germany: Far-right lawmakers accused of spying for Russia DW 10/22/2025

"The impression is almost unavoidable that the AfD is working through a Kremlin order list with its inquiries," Maier said, adding that the questions had demanded "increasing intensity and depth of detail."
Germany news
Information security
fromIT Pro
4 months ago

Microsoft issues warning over "opportunistic" cyber criminals targeting big business

Extortion and ransomware now motivate over half of cyberattacks, with financially driven incidents comprising at least 52%, far exceeding espionage.
fromwww.aljazeera.com
4 months ago

Ukraine does not need a NATO Article 5-like guarantee

It needs a security mechanism that triggers action automatically, not after collective consultations and individual deliberations. In recent months, a new baseline idea has taken hold in European and United States debates on Ukraine: Article 5like guarantees. In March, Italy's Prime Minister Giorgia Meloni was the first to suggest a mechanism inspired by Article 5 of the NATO Charter, which provides for collective action in the event of an attack on a member.
Miscellaneous
Information security
fromTechzine Global
4 months ago

Critical infrastructure struggles with AI and quantum threats

Critical infrastructure faces rising AI- and quantum-driven cyber risks despite falling breaches; 73% cite AI ecosystem as top security challenge and quantum threatens encryption.
[ Load more ]