#infrastructure-sabotage

[ follow ]
#ics-security
Information security
fromSecurityWeek
2 hours ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
#cybersecurity
fromFortune
4 days ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Information security
fromSecuritymagazine
1 day ago

Pro-Iranian Actor Claims L.A. Metro Cyberattack

L.A. Metro is recovering from a cyberattack attributed to the pro-Iranian group Ababil of Minab, which claims significant data destruction and exfiltration.
Los Angeles
fromLos Angeles Times
1 week ago

L.A. Metro confirms it was hacked. Weeks later, it's still getting systems back online

L.A. Metro shut down parts of its network due to detected hacking activity, while maintaining uninterrupted transit services.
Europe politics
fromwww.thelocal.se
26 minutes ago

Pro-Russian group attempted to attack Swedish heating plant

A pro-Russian activist group attempted a destructive attack on a heating facility in Sweden, highlighting a shift in Russia's tactics against critical infrastructure.
Silicon Valley
fromWIRED
1 day ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Privacy professionals
fromFortune
4 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
#artificial-intelligence
fromComputerWeekly.com
1 day ago
UK politics

Flood warning: How citizens' AI agents will swamp public services | Computer Weekly

AI has the potential to transform public services by reducing user friction and improving access for citizens.
Information security
fromThe Hacker News
6 days ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
UK politics
fromComputerWeekly.com
1 day ago

Flood warning: How citizens' AI agents will swamp public services | Computer Weekly

AI has the potential to transform public services by reducing user friction and improving access for citizens.
Information security
fromThe Hacker News
6 days ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
fromArchDaily
1 day ago

Mapping the Technosphere: Architecture as an Interface Between Systems and Territories

Architecture can no longer be conceived as an isolated object, detached from the technical networks that sustain contemporary life. This condition calls for new readings and approaches.
Design
fromAdirondack Almanack
1 day ago

NYSDOT announces recognition for emergency bridge projects

"This recognition is a testament to the talent, dedication, and 'can-do' spirit of the professional staff on the NYS Department of Transportation's team," Commissioner Dominguez said. "From bridge strikes in the capital region to catastrophic flooding in the Adirondacks, our team members work tirelessly to restore traffic and critical infrastructure-safely and quickly-with modern and resilient structures along these vital corridors within New York State."
Brooklyn
New York City
fromInsideHook
2 days ago

Can Self-Driving Cars Help Fix the Nation's Potholes?

Pothole repairs are gaining attention, with NYC filling 100,000 potholes and Waymo partnering with Waze to identify potholes using autonomous vehicles.
fromPadailypost
5 days ago

Cheating brazen in new toll lanes

"Is everybody telling the truth? We're not sure," Program Director Kim Comstock told the San Mateo County Transportation Authority on Thursday.
California
#ai
fromAxios
6 days ago
Information security

Anthropic's newest AI model could wreak havoc. Most in power aren't ready

Mythos represents a significant advancement in AI, capable of exploiting security weaknesses autonomously and posing serious threats to cybersecurity.
Information security
fromAxios
6 days ago

Anthropic's newest AI model could wreak havoc. Most in power aren't ready

Mythos represents a significant advancement in AI, capable of exploiting security weaknesses autonomously and posing serious threats to cybersecurity.
Digital life
fromEarth911
6 days ago

Guest Idea: Why Sustainable Home Tech Choices Also Need Cybersecurity Awareness

Sustainable technology adoption is rising, but security risks of connected devices are often overlooked, impacting both environmental and digital safety.
#cyberattack
Healthcare
fromSecurityWeek
6 days ago

Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption

Signature Healthcare in Brockton diverted ambulances due to a cyberattack, impacting services but not surgeries or procedures.
East Bay (California)
fromSFGATE
2 weeks ago

Bay Area city remains paralyzed week after cyberattack

Foster City is experiencing a significant disruption due to a ransomware cyberattack, affecting communication and services for over a week.
SF politics
fromSFGATE
3 weeks ago

Bay Area city government without working phones, email after cyberattack

Foster City is experiencing significant disruptions to services due to a cyberattack, with email and phone systems still down after six days.
Information security
fromMail Online
1 month ago

Iran-linked attack on US 'first drop of blood' as new threat grows

Iran-linked hackers attacked Stryker, signaling potential broader cyberattacks on Western organizations and US infrastructure including data centers, banking systems, and energy facilities.
Information security
fromSecurityWeek
2 months ago

Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Russia-linked hackers breached ICS at roughly 30 Polish energy sites, damaging some devices and targeting monitoring systems without causing power outages.
Healthcare
fromSecurityWeek
6 days ago

Massachusetts Hospital Diverts Ambulances as Cyberattack Causes Disruption

Signature Healthcare in Brockton diverted ambulances due to a cyberattack, impacting services but not surgeries or procedures.
East Bay (California)
fromSFGATE
2 weeks ago

Bay Area city remains paralyzed week after cyberattack

Foster City is experiencing a significant disruption due to a ransomware cyberattack, affecting communication and services for over a week.
SF politics
fromSFGATE
3 weeks ago

Bay Area city government without working phones, email after cyberattack

Foster City is experiencing significant disruptions to services due to a cyberattack, with email and phone systems still down after six days.
Information security
fromMail Online
1 month ago

Iran-linked attack on US 'first drop of blood' as new threat grows

Iran-linked hackers attacked Stryker, signaling potential broader cyberattacks on Western organizations and US infrastructure including data centers, banking systems, and energy facilities.
Information security
fromSecurityWeek
2 months ago

Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Russia-linked hackers breached ICS at roughly 30 Polish energy sites, damaging some devices and targeting monitoring systems without causing power outages.
France politics
fromWIRED
6 days ago

'We Were Not Ready for This': Lebanon's Emergency System Is Hanging by a Thread

Lebanon faces a humanitarian crisis with nearly 1 in 5 people displaced by Israeli attacks, struggling with inadequate digital infrastructure.
UK news
fromComputerWeekly.com
5 days ago

UK Navy deters Russian submarines near critical undersea cables | Computer Weekly

The Royal Navy has deterred Russian submarines near critical undersea infrastructure, emphasizing the importance of undersea communications cables for global trade.
Brooklyn
fromHoodline
6 days ago

Three-Alarm Fire Disrupts Brooklyn Near Fort Hamilton Parkway

A three-alarm fire in Brooklyn caused significant smoke and traffic disruptions, prompting officials to advise residents to avoid the area.
San Francisco
fromMission Local
2 weeks ago

Cell outage blocks San Francisco 911 calls

A cell outage may disrupt 911 calls in San Francisco, prompting residents to use Wi-Fi calling or text 911 for assistance.
#fcc
Information security
fromComputerWeekly.com
2 weeks ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromComputerWeekly.com
2 weeks ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Gadgets
fromTheregister
2 weeks ago

Engineer sabotaged PC then complained when it didn't work

Ewen faced challenges with a fiber-optic device that produced faulty data, leading to a long drive to troubleshoot the issue.
Information security
fromSecurityWeek
1 day ago

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with seven new vulnerabilities, including critical Windows and Adobe flaws.
Information security
fromTechzine Global
1 day ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Miscellaneous
fromwww.theguardian.com
1 month ago

A massive headache': Russians move to walkie-talkies as internet blackouts hit Moscow

Moscow residents face unexplained internet disruptions as the Kremlin implements security measures, with authorities testing a whitelist system that would restrict access to only government-approved websites.
Miscellaneous
fromComputerWeekly.com
1 month ago

Render Networks unveils synchronised agentic critical infrastructure architecture | Computer Weekly

Render Networks expands ClearWay platform to automate critical infrastructure deployment, reducing capital risk through real-time field verification and audit-grade accountability across complex multi-asset projects.
Information security
fromWIRED
1 week ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
Information security
fromThe Hacker News
5 days ago

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
US politics
fromNextgov.com
2 months ago

Tech Bills of the Week: Measures seek to boost cyber posture of utilities

Congressional bills empower the Energy Department to strengthen physical and cyber security of pipelines, LNG facilities, and smaller electric utilities with grants and coordination.
fromSecurityWeek
1 month ago

German Rail Giant Deutsche Bahn Hit by Large-Scale DDoS Attack

Deutsche Bahn, Germany's national rail operator, has been dealing with a large-scale distributed denial-of-service (DDoS) attack that has disrupted some of its IT systems. Regular status updates from Deutsche Bahn indicated that the attack began on February 17 and continued into February 18. According to the rail giant, the attack came in waves and its scale is substantial. The DDoS attack disrupted Deutsche Bahn's information and ticketing systems, including its websites and the DB Navigator app.
Germany news
fromTheregister
2 months ago

Asia-based spies hacked 37 countries' critical networks

While this group might be pursuing espionage objectives, its methods, targets and scale of operations are alarming, with potential long-term consequences for national security and key services,
World news
fromArchitectural Digest
2 months ago

Designing When Your City Is Under Siege

Life doesn't pause for grief or fear. You might be going through something devastating but you're still packing lunches, still driving your kids to baseball practice, still showing up to work. One minute I find myself prepping for a whole home presentation and the next minute I'm checking the news, hoping and praying that no one has been killed on the streets today.
Design
Information security
fromThe Cipher Brief
3 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Information security
fromTechRepublic
4 weeks ago

Industrial Systems Under Siege: 77% of OT Environments Suffer Cyber Breaches

Industrial sectors lag in cybersecurity despite modernizing operational technologies, creating critical vulnerabilities in manufacturing, utilities, and energy infrastructure.
fromNextgov.com
1 month ago

Stryker hack could set stage for more pro-Iran cyber sabotage

The reported wiper attack ... may represent a similar dynamic, an early signal of activity that could expand beyond a single target. Organizations need to assume that attackers will gain a foothold and focus on proactively shutting down the attack paths adversaries rely on to escalate privileges, move laterally and expand their impact.
Information security
Information security
fromSecurityWeek
1 month ago

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric

Industrial control system manufacturers Siemens, Schneider Electric, Mitsubishi Electric, and Moxa released multiple security advisories addressing critical and high-severity vulnerabilities in their ICS products.
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Information security
fromSecurityWeek
1 month ago

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Trump administration releases comprehensive cyber strategy emphasizing government-private sector coordination, deterrence, regulatory reform, and investment in AI and quantum technologies to strengthen national cybersecurity.
#cyberattacks
Information security
fromSecuritymagazine
1 month ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromSecuritymagazine
1 month ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
#cyberwarfare
Information security
fromComputerworld
1 month ago

AI will likely shut down critical infrastructure on its own, no attackers required

Misconfigured AI controlling cyber-physical systems can unintentionally shut down national critical infrastructure in a G20 country by 2028.
Information security
fromSecuritymagazine
2 months ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
Information security
fromArs Technica
6 years ago

New clues show how Russia's grid hackers aimed for physical destruction

Russian hackers aimed to cause lasting physical destruction to Ukrainian power-grid equipment by using malware designed to damage hardware during recovery, not a brief outage.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
fromThe Hacker News
2 months ago

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

The findings are based on several years of deploying OMICRON's intrusion detection system (IDS) StationGuard in protection, automation, and control (PAC) systems. The technology, which monitors network traffic passively, has provided deep visibility into real-world OT environments. The results underscore the growing attack surface in energy systems and the challenges operators face in securing aging infrastructure and complex network architectures.
Information security
Information security
fromSecurityWeek
2 months ago

ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid

A cyberattack believed to be Russian targeted Poland's distributed energy resources, compromising RTUs and communication systems across about 30 sites and causing permanent ICS damage.
Information security
fromTechzine Global
1 month ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
Information security
fromSecurityWeek
1 month ago

3 Threat Groups Started Targeting ICS/OT in 2025: Dragos

Three new threat groups—Sylvanite, Azurite, and Pyroxene—began targeting ICS and OT in 2025, expanding threats to critical infrastructure globally.
Information security
fromThe Hacker News
1 month ago

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
[ Load more ]