#critical-infrastructure

[ follow ]
Information security
fromwww.theregister.com
1 day ago

Japan's PM orders cybersecurity review to defend against Anthropic Mythos

Japan ordered a cabinet-level review of cybersecurity strategy to assess government system vulnerabilities and ensure critical infrastructure operators can detect and fix them amid AI-enabled attack risks.
Privacy professionals
fromComputerWeekly.com
1 day ago

ICO fines Cl0p victim South Staffs Water over data breach | Computer Weekly

South Staffordshire Water and its parent received a reduced £964,900 ICO fine after improvements following a Cl0p ransomware attack that exposed data of 600,000 people.
#data-centers
Germany news
fromwww.dw.com
3 days ago

Data centers: Critical tech infrastructure under threat

Dietzenbach’s proximity to Frankfurt supports major data-center investment, driven by rising internet and AI demand and the critical infrastructure role of data centers.
Germany news
fromwww.dw.com
3 days ago

Data centers: Tech boom with downsides

Dietzenbach’s proximity to Frankfurt supports major data-center investment, with DE-CIX handling over 17 terabits at peak and data centers underpinning critical infrastructure.
Germany news
fromwww.dw.com
3 days ago

Data centers: Critical tech infrastructure under threat

Dietzenbach’s proximity to Frankfurt supports major data-center investment, driven by rising internet and AI demand and the critical infrastructure role of data centers.
Germany news
fromwww.dw.com
3 days ago

Data centers: Tech boom with downsides

Dietzenbach’s proximity to Frankfurt supports major data-center investment, with DE-CIX handling over 17 terabits at peak and data centers underpinning critical infrastructure.
Information security
fromTNW | Insights
4 days ago

Poland water treatment plants breached by hackers using default passwords as US faces same critical infrastructure threat

Five Polish water treatment plants were breached via default passwords and internet-exposed control systems, enabling changes to pump, filter, and chemical operations.
fromThe Cipher Brief
6 days ago

Corporate Cybersecurity Is the New Frontline of National Security

The battlefield is corporate, the targeting is consequential, and the effects are systemic. Ransomware campaigns now disrupt healthcare systems at scale, producing effects once associated with geopolitical bombing campaigns without crossing a border. Nation-state actors maintain persistent access inside critical infrastructure not to destroy, but to position.
Information security
Information security
fromtheregister
6 days ago

State-backed hackers hammer Palo Alto firewall zero-day before patch lands

State-sponsored hackers exploit a critical zero-day vulnerability in Palo Alto Networks firewalls to gain root access and move laterally through victim networks.
#cisa
Information security
fromSecurityWeek
1 week ago

CISA: Critical Infrastructure Must Master Isolation, Recovery

CISA warns US critical infrastructure operators of persistent threats from nation-state actors and introduces CI Fortify to enhance resilience against cyberattacks.
Information security
fromNextgov.com
1 week ago

CISA unveils CI Fortify to help secure critical infrastructure during conflicts

CISA launched the CI Fortify project to help critical infrastructure defend against hackers and ensure continuity during geopolitical conflicts.
US politics
fromTheregister
1 month ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
Information security
fromNextgov.com
1 week ago

Operational technology providers are feeling 'annoyance' at exclusion from Anthropic's Mythos rollout, sources say

Operational technology providers seek access to Anthropic's Mythos model for cybersecurity, citing exclusion from initial rollout affecting critical infrastructure.
Information security
fromTheregister
1 week ago

Five Eyes warn agentic is too dangerous for rapid rollout

Agentic AI poses significant risks, requiring careful adoption and robust security measures to protect critical infrastructure from exploitation.
#cybersecurity
Information security
fromNextgov.com
3 weeks ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Information security
fromNextgov.com
1 week ago

Why recovery speed matters when the homeland is the cyber battlefield

Cyberattacks are now a constant threat to essential services and military readiness, requiring a shift in defense strategies to anticipate and recover from disruptions.
Information security
fromThe New Yorker
2 weeks ago

How Big a Threat Are Iranian-Backed Cyber Attacks?

Iranian cyber actors have accessed critical U.S. infrastructure, highlighting vulnerabilities in cybersecurity and the ongoing nature of nation-state hacking.
Information security
fromNextgov.com
3 weeks ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Information security
fromSecuritymagazine
2 weeks ago

Protecting U.S. Critical Infrastructure as Global Tensions Rise

Geopolitical tensions necessitate enhanced security measures for critical infrastructure to mitigate indirect threats and improve situational awareness.
fromFortune
2 weeks ago

Why the key to American drone dominance lies with blockchain | Fortune

The drone threat is no longer confined to distant battlefields. It is coming to American soil, and the targets are no longer necessarily military targets.
Cryptocurrency
Information security
fromSecurityWeek
2 weeks ago

Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World's Biggest Exercise

Locked Shields 2026 tested cyber defense capabilities of 4,000 participants from 41 nations against simulated cyberattacks on critical infrastructure.
Information security
fromFortune
2 weeks ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
Information security
fromComputerWeekly.com
3 weeks ago

Sans Institute preps live systems for Nato cyber exercise | Computer Weekly

The Sans Institute is providing a real operational cyber range for the NATO Locked Shields exercise to enhance cyber security training and readiness.
Information security
fromThe Hacker News
3 weeks ago

Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems

ZionSiphon malware targets Israeli water treatment systems, showcasing a trend in politically motivated attacks on critical infrastructure.
#cyberattack
Europe news
fromSecurityWeek
3 weeks ago

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

A pro-Russian group linked to Russian intelligence was behind a failed cyberattack on a Swedish heating plant, part of broader attacks on European infrastructure.
Information security
fromSecuritymagazine
2 months ago

Suspected Iranian Cyberattack Targets U.S. Medtech Company Stryker

Stryker experienced a global cyberattack involving destructive wiper malware that disabled Windows systems across the company, disrupting healthcare equipment supply chains worldwide.
Europe news
fromSecurityWeek
3 weeks ago

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

A pro-Russian group linked to Russian intelligence was behind a failed cyberattack on a Swedish heating plant, part of broader attacks on European infrastructure.
Information security
fromSecuritymagazine
2 months ago

Suspected Iranian Cyberattack Targets U.S. Medtech Company Stryker

Stryker experienced a global cyberattack involving destructive wiper malware that disabled Windows systems across the company, disrupting healthcare equipment supply chains worldwide.
Europe news
fromIndependent
4 weeks ago

'He ate him without salt': Blockaded port boss berated by minister over his family firm's support for fuel protesters

Oil depot chief contacted by Culture Minister amid fuel protests blocking access to critical infrastructure.
#ai-safety
fromEntrepreneur
1 month ago
Artificial intelligence

Anthropic Warns Its New AI Could Enable 'Weapons We Can't Even Envision.' Skeptics Aren't Buying It.

fromEntrepreneur
1 month ago
Artificial intelligence

Anthropic Warns Its New AI Could Enable 'Weapons We Can't Even Envision.' Skeptics Aren't Buying It.

#ransomware
Information security
fromTheregister
1 month ago

Criminal wannabes even more dangerous than the pros

Ransomware is a significant current threat, targeting critical infrastructure and healthcare, causing immediate harm and financial losses.
Information security
fromSecurityWeek
1 month ago

Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems

Medusa ransomware group rapidly exploits vulnerabilities, impacting critical sectors and employing double extortion tactics since June 2021.
Information security
fromSecuritymagazine
1 month ago

Security Leaders Share Thoughts on Foster City Cyberattack

Foster City declared a state of emergency due to a ransomware attack, highlighting vulnerabilities in municipal IT infrastructure and the need for better funding and security.
SF politics
fromSecuritymagazine
1 month ago

New Trump Administration Budget Cuts $707M from CISA Funding

The 2027 budget includes significant funding shifts for DHS, with cuts to CISA aimed at refocusing its mission on critical infrastructure defense.
fromwww.dw.com
1 month ago

Nationwide raids after Berlin arson attack cut power to many

Today's searches show that we pursue every lead with the highest priority. Anyone who attacks our critical infrastructure attacks the security of our entire city. We will not accept that.
Germany news
fromThe Cipher Brief
1 month ago

GPS Denied: Time to Upgrade

On February 28, ships navigating the Strait of Hormuz started appearing on tracking screens in places they couldn't possibly be. They appeared to be sitting on airport runways, parked on Iranian land, and clustered at nuclear power plants. More than 1,100 commercial vessels had their navigation systems scrambled in a single day following US-Israeli airstrikes on Iran, bringing a waterway that handles a fifth of the world's oil exports to a halt.
Science
fromNextgov.com
2 months ago

Stryker hack could set stage for more pro-Iran cyber sabotage

The reported wiper attack ... may represent a similar dynamic, an early signal of activity that could expand beyond a single target. Organizations need to assume that attackers will gain a foothold and focus on proactively shutting down the attack paths adversaries rely on to escalate privileges, move laterally and expand their impact.
Information security
US news
fromMail Online
2 months ago

New Jersey drone scare explodes again as police files reveal truth

Newly released documents reveal New Jersey police documented dozens of incidents involving large unidentified drones operating near critical infrastructure, military facilities, and restricted airspace throughout 2024.
#cyberattacks
Information security
fromSecuritymagazine
2 months ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromNextgov.com
2 months ago

Iran-linked hacktivists could target governments, experts warn

Iranian regime-aligned hacktivists may escalate cyberattacks against U.S. state and local government targets, financial services, and energy sectors in retaliation for military operations.
fromDataBreaches.Net
2 months ago
Privacy technologies

Top NATO allies believe cyberattacks on hospitals are an act of war. They're still struggling to fight back. - DataBreaches.Net

Information security
fromSecuritymagazine
2 months ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromNextgov.com
2 months ago

Iran-linked hacktivists could target governments, experts warn

Iranian regime-aligned hacktivists may escalate cyberattacks against U.S. state and local government targets, financial services, and energy sectors in retaliation for military operations.
fromDataBreaches.Net
2 months ago
Privacy technologies

Top NATO allies believe cyberattacks on hospitals are an act of war. They're still struggling to fight back. - DataBreaches.Net

Venture
fromComputerWeekly.com
2 months ago

Ericsson, Future Technologies scale wireless infrastructure for industrial AI | Computer Weekly

Ericsson and Future Technologies Venture expand collaboration to deploy enterprise wireless and private 5G networks across North American industrial and critical infrastructure sectors to support AI-driven operations.
Artificial intelligence
fromwww.theguardian.com
2 months ago

Datacenters are becoming a target in warfare for the first time

Iran deliberately targeted commercial datacenters in the Persian Gulf, marking the first known instance of a country at war striking commercial datacenters, causing widespread service disruptions across the UAE and Bahrain.
Information security
fromThe Hacker News
2 months ago

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CISA added three actively exploited vulnerabilities to its KEV catalog, including critical flaws in SolarWinds Web Help Desk, Omnissa Workspace One UEM, and Ivanti Endpoint Manager, with federal agencies required to patch by mid-to-late March 2026.
fromFortune
2 months ago

The Persian Gulf's 'saltwater kingdoms' rely so much on desalination that damage to the infrastructure could force evacuations | Fortune

In Kuwait, about 90% of drinking water comes from desalination, along with roughly 86% in Oman and about 70% in Saudi Arabia. The technology removes salt from seawater - most commonly by pushing it through ultrafine membranes in a process known as reverse osmosis - to produce the freshwater that sustains cities, hotels, industry and some agriculture across one of the world's driest regions.
World news
World news
fromwww.theguardian.com
2 months ago

It means missile defence on data centres': drone strikes raises doubts over Gulf as AI superpower

Iranian drones struck Amazon Web Services datacentres in the UAE and Bahrain, causing widespread civilian disruption and marking the first deliberate targeting of commercial datacentres by armed forces during active conflict.
Tech industry
fromBusiness Insider
2 months ago

Big Tech's new reality: Data centers are a war target

Drone strikes on Amazon data centers in the Middle East mark the first direct military targeting of Big Tech infrastructure, establishing data centers as critical warfare targets.
Information security
fromSecurityWeek
2 months ago

Iranian APT Hacked US Airport, Bank, Software Company

Iranian APT MuddyWater compromised networks across US aerospace, defense, banking, and NGO sectors, deploying new backdoors Dindoor and Fakeset amid regional military tensions.
#cyber-attacks
Information security
fromComputerWeekly.com
2 months ago

Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly

Pro-Iran hacktivist groups have intensified cyber attacks across Middle Eastern infrastructure, including breaches at Saudi energy facilities and GPS spoofing attacks affecting over 1,000 Persian Gulf ships during escalating regional conflict.
Information security
fromComputerWeekly.com
2 months ago

Iranian hacktivists muster their forces but state APTs lay low | Computer Weekly

Pro-Iran hacktivist groups have intensified cyber attacks across Middle Eastern infrastructure, including breaches at Saudi energy facilities and GPS spoofing attacks affecting over 1,000 Persian Gulf ships during escalating regional conflict.
World news
fromIntelligencer
2 months ago

The Future of War Is Drones Bombing Data Centers

Iranian drone strikes on data centers in the UAE and Bahrain demonstrate a new warfare strategy targeting critical digital infrastructure, causing cascading internet outages across multiple regions and affecting major global companies.
SF politics
fromIrish Independent
2 months ago

Dail to vote on designating building projects as 'critical' before they are fast tracked through planning process

The Dáil will vote on designating building projects as 'critical' before the Government fast-tracks them through the planning process.
fromDataBreaches.Net
2 months ago

Wisconsin k-12 district hit by weeklong outage - DataBreaches.Net

A reported "cyber incident" left the Denmark School District in the Village of Denmark, Wisconsin, without internet access for five school days, forcing teachers and students to rely on paper-based workarounds, according to a local news report.
Information security
Privacy professionals
fromDataBreaches.Net
2 months ago

Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule - DataBreaches.Net

A partial government shutdown delays the DHS cybersecurity incident reporting rule, leaving companies uncertain about compliance requirements and enforcement timelines.
Information security
fromSecurityWeek
2 months ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
fromTheregister
2 months ago

Open Source Endowment aims to raise big pile of money

Free open source software is fundamentally broken. In 2023, Denis Pushkarev, maintainer of the widely used core-js library, vented his frustration with the fact that users of his software seldom offer financial support, highlighting the disconnect between widespread dependency on open source and inadequate financial compensation for developers maintaining critical infrastructure.
Miscellaneous
Information security
fromTechCrunch
2 months ago

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 | TechCrunch

Cisco discovered a critical vulnerability in Catalyst SD-WAN products exploited since 2023, allowing remote attackers maximum-level network access and persistent hidden infiltration of enterprise and government networks.
Information security
fromComputerWeekly.com
2 months ago

Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly

UK and Five Eyes agencies warn of active threat campaigns targeting Cisco Catalyst SD-WAN products, requiring immediate investigation and patching of critical authentication bypass vulnerabilities.
Mental health
fromSecuritymagazine
2 months ago

Security Insights Delivered Through Podcasts

Security professionals face significant mental-health risks and team burnout, requiring leaders to integrate empathetic practices and psychological safety into security operations.
fromTheregister
2 months ago

China-linked crew embedded in US energy networks

In its yearly cybersecurity report, Dragos said state-sponsored crews haven't let up on their attempts to compromise America's critical infrastructure, with three new OT-focused threat groups joining the fray. This brings the total number worldwide to 26, and of these, 11 were active in 2025. Additionally, an existing group that Dragos tracks as Voltzite and is "highly correlated" with Volt Typhoon, according to Dragos CEO Robert M. Lee, kept up its intrusion activities last year.
Information security
Information security
fromSecurityWeek
2 months ago

3 Threat Groups Started Targeting ICS/OT in 2025: Dragos

Three new threat groups—Sylvanite, Azurite, and Pyroxene—began targeting ICS and OT in 2025, expanding threats to critical infrastructure globally.
fromTheregister
2 months ago

Misconfigured AI could shut down a G20 nation, says Gartner

Unlike traditional software bugs that might crash a server or scramble a database, errors in AI-driven control systems can spill into the physical world, triggering equipment failures, forcing shutdowns, or destabilizing entire supply chains, Gartner warns. "The next great infrastructure failure may not be caused by hackers or natural disasters but rather by a well-intentioned engineer, a flawed update script, or a misplaced decimal," cautioned Wam Voster, VP Analyst at Gartner.
Artificial intelligence
Information security
fromThe Hacker News
2 months ago

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

Attackers increasingly exploit trusted tools, simple entry points, and overlooked exposures to maintain persistent, value-driven access across cybercrime and espionage.
Miscellaneous
fromwww.dw.com
2 months ago

EU ups drone cooperation amid hybrid threats

EU adopts a comprehensive counter-drone strategy to strengthen detection, coordination, industry capacity, and civil-military cooperation to protect critical infrastructure and borders.
#cyber-espionage
Information security
fromTechCrunch
3 months ago

China's Salt Typhoon hackers broke into Norwegian companies | TechCrunch

Chinese-backed hacking group Salt Typhoon breached multiple Norwegian organizations, exploiting vulnerable network devices to conduct espionage.
Information security
fromTechzine Global
3 months ago

BICS and Anapaya deliver new secure SCION networks worldwide

BICS and Anapaya will deploy SCION worldwide to give organizations direct control over data traffic and enable secure, compliant cross-border connectivity.
Information security
fromTheregister
3 months ago

Energy infrastructure cyberattacks are suddenly in fashion

Infrastructure cyberattacks are now mature, integrated into military strategy, and increasingly accessible due to democratized tools, exposing underfunded systems to severe disruption.
[ Load more ]