#critical-infrastructure-security

[ follow ]
Privacy professionals
fromTechCrunch
2 days ago

Salt Typhoon is hacking the world's phone and internet giants. Here's everywhere that's been hit. | TechCrunch

Salt Typhoon, a Chinese hacking group, conducted one of the broadest recent cyberattacks targeting major telecom companies worldwide, stealing millions of phone records from senior government officials and compromising at least 200 companies globally.
World news
fromRadioFreeEurope/RadioLiberty
5 days ago

Azerbaijan Accuses Iran Of Plotting Attack On Major Pipeline, Jewish Sites

Azerbaijan claims Iranian IRGC operatives planned terrorist attacks on critical infrastructure including the BTC pipeline, Israeli Embassy, and Jewish sites to destabilize the region.
fromFast Company
1 week ago

How Iran built such a formidable cyberwar machine

Being on the receiving end of what was the world's first true cyber weapon showed Iran exactly what was possible then and in the future. In response, Iran moved aggressively to build its cyber capabilities. The country established governance and coordination structures-including the Supreme Council of Cyberspace in 2012-to advance its goals, while also sponsoring advanced persistent threat groups.
World news
Information security
fromNextgov.com
1 week ago

CISA appoints new acting cyber chief after recent leadership shakeups

Chris Butera becomes CISA's acting executive assistant director for cybersecurity following leadership restructuring and workforce reductions at the agency.
Information security
fromFortune
1 week ago

Iran doesn't need sci-fi AI to pose a serious cyber threat | Fortune

Iran, a sophisticated cyber power, may develop AI-powered attacks against U.S., Israeli, and Gulf State critical infrastructure as military tensions escalate and automated hacking tools become more prevalent.
fromDataBreaches.Net
1 week ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
fromNextgov.com
2 weeks ago

US cyber responses will be 'linked to adversary actions' and involve industry coordination, official says

Future U.S. government responses in cyberspace will be "linked to adversary actions" and will involve coordination between the private sector and smaller governments, a top White House official said Thursday. The dynamic, which will be codified in a forthcoming national cyber strategy, is meant to make clear that foreign adversaries' actions that target U.S. networks have consequences, according to Alexandra Seymour, who serves as the principal deputy assistant national cyber director for policy in the Office of the National Cyber Director.
US politics
Berlin
fromThe Local Germany
1 month ago

Berlin offers 1 million euro reward for information on blackout culprits

Germany offers a €1 million reward for information leading to arrest of suspected far-left militants after an arson attack caused a major Berlin blackout.
Miscellaneous
fromwww.bbc.com
4 months ago

What's the best way to detect and destroy drones?

Civilian demand for drone detection and jamming systems has surged; radio-frequency jamming counters about 80–90% of drones while acoustic, optical, and sensor suites aid detection.
Information security
fromNextgov.com
4 months ago

China accuses NSA of multi-year hack targeting its national time systems

China accused the U.S. National Security Agency of a yearslong cyberespionage campaign against the National Time Service Center, exploiting an overseas phone provider and staff devices.
fromComputerWeekly.com
4 months ago

China responsible for rising cyber attacks, says NCSC | Computer Weekly

The NCSC also reported that hostile states are using artificial intelligence (AI) to increase the efficiency and frequency of their existing attack methods, but are not yet using the technology for novel attacks. Actors linked to China, Russia, Iran and North Korea are starting to use large language models to evade detection, exfiltrate data, research security vulnerabilities and devise social engineering to gain access to systems.
Information security
fromThe Local Germany
4 months ago

How can Europe protect its skies against 'escalating' drone menace?

Drones flying over airports, commercial sites and other sensitive infrastructure in Europe is a growing phenomenon which EU leaders blame on Russia, and preventing the disruption they cause will prove a tough technical challenge, observers say. Detecting the drones, making them non-operational by jamming them, or even shooting them down, are all complex and hazardous tasks. And while Russian involvement is suspected, it is difficult to prove.
Germany news
fromSecurityWeek
5 months ago

A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York

While close to 150 world leaders prepared to descend on Manhattan for the U.N. General Assembly, the U.S. Secret Service was quietly dismantling a massive hidden telecom network across the New York area - a system investigators say could have crippled cell towers, jammed 911 calls and flooded networks with chaos at the very moment the city was most vulnerable. The cache, made up of more than 300 SIM servers packed with over 100,000 SIM cards and clustered within 35 miles of the United Nations, represents one of the most sweeping communications threats uncovered on U.S. soil.
Information security
World politics
fromThe Cipher Brief
5 months ago

China's Gray War on America

China employs non-kinetic, strategic cyber and informational tactics to pre-position capabilities within U.S. critical infrastructure as part of a broader gray-war strategy.
[ Load more ]