Topic: critical infrastructure
-
Is Solar Power Overwhelming the Grid?
Insecure domestic solar power systems pose a new threat to national electricity grids, as vulnerable control devices could be manipulated to cause synchronized power disruptions, according to a recent report. Common IoT devices like smart cameras are being exploited for privacy invasions, enablin...
Read More » -
Ukrainian Hacker Accused of Aiding Russian Cyberattacks
A Ukrainian national, Victoria Eduardovna Dubranova, has been extradited to the U.S. and charged for allegedly working with Russian state-backed hacktivist groups to target American critical infrastructure, including water systems and election infrastructure. The indictment details that the group...
Read More » -
Australia's Critical Infrastructure Under Siege: Attacks Double
Australia's critical infrastructure has experienced a 111% increase in cyber attack notifications, with the ASD issuing over 190 alerts in FY25, highlighting growing vulnerabilities in essential services. The healthcare sector is particularly at risk, with malicious actors succeeding in 95% of in...
Read More » -
Gentlemen Ransomware Strikes Romanian Energy Provider
A ransomware attack on Romania's Oltenia Energy Complex, a major power supplier, disrupted its IT systems during the holiday period but did not compromise the national energy grid's stability. The attack is attributed to the Gentlemen ransomware group, which uses specific tactics like unique file...
Read More » -
Russian GRU Hackers Target Western Firms via Edge Devices
A Russian military intelligence (GRU) campaign has shifted from exploiting software vulnerabilities to targeting misconfigured customer-owned network edge devices, like routers and VPN gateways, to stealthily infiltrate Western critical infrastructure. This tactical change, documented by Amazon T...
Read More » -
Google Warns of Rising Cyber-Physical Attacks in Europe
Google Cloud Security forecasts a major increase in cyber-physical attacks on Europe's critical infrastructure by 2026, targeting sectors like energy, transportation, and digital systems, which threatens public safety and economic stability. State-sponsored cyber espionage from countries such as ...
Read More » Australia's Cyber Crisis: A Call to Action for Businesses
Australian businesses face sophisticated cyber campaigns aimed at crippling economic stability and critical national functions, moving beyond simple data theft to cause national paralysis. The conflict in Ukraine demonstrated that cyber warfare is synchronized with military operations, targeting ...
Read More »-
Unite to Conquer Cybersecurity Threats: Key Partnerships
Global cyberattacks have tripled since 2023, targeting critical infrastructure in nations like the UAE, Ukraine, and Israel, highlighting the urgent need for precise data and AI-driven defenses. The UAE's cybersecurity strategy emphasizes education, public awareness, and five key pillars—partners...
Read More » -
Hacktivists Breach Decoy Infrastructure in Cyber Attack
The pro-Russian hacktivist group TwoNet has escalated from DDoS attacks to targeting critical infrastructure, as shown by their breach of a water treatment facility honeypot in September, moving from access to disruption in just over a day. During the attack, TwoNet exploited default credentials ...
Read More » -
Cyber-Physical Systems at Risk: How to Protect Critical Infrastructure
Global economic and geopolitical tensions are increasing cyber risks to critical cyber-physical systems, with nearly half of professionals citing these factors and concerns over risk reduction and system audits. Third-party vendor access is a major vulnerability, with 46% of organizations experie...
Read More » -
Securing Critical Infrastructure: A Cyber-Physical Threat Briefing
The convergence of operational technology with digital networks is increasing vulnerabilities in critical infrastructure like energy and transportation systems. Economic instability, geopolitical tensions, and supply chain disruptions are heightening cyber risks, with many organizations re-evalua...
Read More » -
US Critical Infrastructure Hit by Pro-Russia Cyberattacks
Pro-Russia hacktivist groups are exploiting weak security to breach U.S. critical infrastructure, causing real disruptions in sectors like water and energy, as detailed in a joint advisory from CISA, the FBI, and the NSA. These loosely organized groups, such as Cyber Army of Russia Reborn, use ba...
Read More » -
Secure Energy Operations: Password & Continuity Management
Energy infrastructure faces a unique cybersecurity challenge: it must enforce strong authentication to prevent catastrophic physical disruptions, while ensuring 24/7 operational continuity where strict policies can be dangerous. The sector is under increasing threat from sophisticated attacks, an...
Read More » -
US & Australia Release AI Security Guidelines for Infrastructure
U.S. and Australian cybersecurity agencies have released joint guidelines to help critical infrastructure operators securely integrate AI tools, like machine learning models, into operational technology systems while managing new risks. The framework emphasizes key principles, including conductin...
Read More » -
Czech Agency Warns of Chinese Tech Risks in Critical Infrastructure
The Czech Republic's cybersecurity agency warns critical infrastructure operators to avoid Chinese technology and data transfers due to high risks of disruption and national security threats. Chinese laws allow government access to data from private cloud providers, and malicious cyber activities...
Read More » -
NIST, MITRE Launch $20M AI Centers for Manufacturing and Cybersecurity
NIST is investing $20 million to establish two AI research hubs, managed by MITRE, to strengthen U.S. technological leadership in manufacturing and cybersecurity. The centers aim to boost domestic manufacturing competitiveness and secure critical infrastructure by developing new technology evalua...
Read More » -
Australia's 2024-2025 Cyber Threat Report Reveals Key Security Trends
Australia is experiencing a sharp increase in cybersecurity threats, driven by its growing reliance on internet-connected technology and targeting by both criminal and state-sponsored actors, leading to significant financial losses and a rise in incidents. State-backed cyber actors and cybercrimi...
Read More » -
Microsoft GoAnywhere Flaw Fuels Ransomware Attacks
A critical vulnerability (CVE-2025-10035) in Fortra's GoAnywhere MFT platform is being exploited by ransomware attackers, allowing remote access without user interaction. The cybercrime group Storm-1175, linked to Medusa ransomware, is actively using this flaw to gain initial access, deploy remot...
Read More » -
Global Leaders Convene in Dubai to Tackle Tech, Economy, and Health
The Annual Meetings of the Global Future Councils and Cybersecurity 2025 in Dubai, organized by the UAE Government and the World Economic Forum, bring together over 700 experts from 93 countries to address global challenges in technology, economy, and public health. The event features 37 speciali...
Read More » -
Romanian Water Authority Hit by Major Ransomware Attack
A ransomware attack disrupted administrative systems at Romania's national water authority, but crucial operational technology controlling physical water infrastructure like dams remained unaffected and functional. The attackers used the legitimate Windows BitLocker feature to encrypt files, leav...
Read More » -
Denmark Accuses Russia of Cyberattack on Water Supply
Danish intelligence has formally attributed cyberattacks on critical infrastructure to the Russian state, identifying groups Z-Pentest and NoName057(16) as instruments of a hybrid warfare campaign against Western nations. The attacks, including a destructive strike on a water utility and disrupti...
Read More » -
Smart Grids Face Rising Cyber Threats as They Modernize
The shift to decentralized smart grids dramatically expands the cybersecurity attack surface, as millions of distributed devices like EV chargers and solar inverters each become a potential entry point, demanding security built into every layer. Key vulnerabilities include compromised device firm...
Read More » -
State-Sponsored Cyber-Attacks: A Top Fear for Businesses
State-sponsored cyber-attacks are a top fear for cybersecurity professionals, with many citing a lack of preparedness for such threats linked to geopolitical conflict as a primary concern. Over a third of surveyed professionals feel their governments provide insufficient support, and the risk ext...
Read More » -
Rising Cyber Threats Fuel Push for Economic Security Bill
A UK parliamentary committee report warns that the country's economic security is at risk due to vulnerabilities from foreign dependencies and inadequate defenses against threats like economic warfare. Cybersecurity is identified as a major concern, with the report emphasizing the need for strong...
Read More » -
Cisco Warns: Aging Tech Poses Major AI Security Risk
Aging digital infrastructure poses a growing security threat, as outdated systems like routers and network storage often lack patches and support, leaving them vulnerable to exploitation by AI-enhanced attackers. Cisco's "Resilient Infrastructure" initiative addresses this by alerting customers t...
Read More » -
Russian Hackers Unleash Destructive Wiper Attacks on Ukraine
Russian state-linked hackers, Sandworm, have launched wiper malware attacks on Ukrainian sectors including government, energy, logistics, and the grain industry, as part of a broader digital offensive alongside military actions. The targeting of Ukraine's grain sector is particularly strategic, a...
Read More » -
PMT Security and DroneShield Unite to Protect Australia's Critical Infrastructure
PMT Security and DroneShield have formed a strategic alliance to enhance protection for Australia's critical infrastructure and government facilities against unauthorized drones by integrating advanced counter-drone capabilities. The partnership addresses rising security threats from drones, such...
Read More » -
DigiCert Unveils First RADAR Threat Intelligence Brief
DigiCert's inaugural RADAR Threat Intelligence Brief reveals an unprecedented escalation in DDoS attacks, with two incidents reaching peaks of 2.4 and 3.7 terabits per second, signaling a shift where internet infrastructure becomes both weapon and battleground. The report identifies key trends in...
Read More » -
Top Cybersecurity Products Launched This Week: October 2025
OPSWAT's MetaDefender Drive offers a portable, network-free threat scanner for securely validating temporary devices before they access protected networks. Radiflow360 integrates operational technology risk management, compliance, and incident response into a unified platform for mid-sized indust...
Read More » -
Scan Threats Anywhere with OPSWAT's Portable Drive
OPSWAT's MetaDefender Drive with Smart Touch is a portable device that scans for malware and ensures compliance on transient cyber assets without requiring network access, preventing potential cyberattacks before devices connect to secure environments. It is designed for critical infrastructure, ...
Read More » -
Forward Edge-AI Secures Patent for Quantum-Safe Data Diode
Forward Edge-AI has patented and deployed its Isidore Quantum One-Way Data Diode, a key step in international collaboration for quantum-resistant cyber defense. The system uniquely enables true one-way data flow while supporting post-quantum encryption, closing a critical security gap against fut...
Read More » -
Building Cyber Defenses: How Nations Secure Their Digital Borders
Cyberspace is now recognized as the fifth domain of warfare, with nations integrating cyber operations into military and intelligence activities, yet accurately attributing attacks remains a major challenge. Active cyber defense strategies, such as threat hunting, are essential for resilience, en...
Read More » -
Conti Ransomware Suspect Extradited to Face Court
Oleksii Lytvynenko has been extradited from Ireland to the U.S. for his alleged role in the Conti ransomware group, accused of hacking systems and extorting ransom payments. The Conti ransomware targeted over 1,000 entities globally, causing at least $150 million in damages and posing a significa...
Read More » -
DroneShield Launches RfPatrol Plugin for TAK Ecosystem
DroneShield has launched a new plugin for the TAK ecosystem, enabling RfPatrol Mk2 users to integrate drone detection data directly into the CivTAK platform for enhanced situational awareness. The plugin provides real-time alerts and overlays detection data with other sensor inputs on the CivTAK ...
Read More » -
Satellites Are Leaking Your Private Data: Calls, Texts, and Secrets
Researchers found that approximately half of geostationary satellite signals are unencrypted, allowing interception of sensitive communications like phone calls and military data with basic equipment. Using affordable hardware, the team captured private data including T-Mobile customer communicat...
Read More » -
EU Cyberattacks Increasingly Target Critical Infrastructure
The ENISA Threat Landscape 2025 report reveals a significant increase in cyberattacks targeting operational technology systems, which now account for 18.2% of all documented threats, driven by their growing interconnectedness and deliberate targeting by malicious actors. Pro-Russian hacker groups...
Read More » -
New National OT Security Guidelines Released
An international coalition of cybersecurity agencies has released new operational technology (OT) security guidelines to protect critical infrastructure worldwide, providing a structured framework for organizations to enhance system resilience. The framework outlines five core principles, includi...
Read More » -
UK & US Charge Alleged Scattered Spider Hackers
Two key members of the Scattered Spider cybercrime group, Thalha Jubair and Owen Flowers, have been arrested and charged in the U.S. and U.K. for their roles in numerous damaging cyber intrusions, including attacks on critical infrastructure and corporate networks. The suspects are accused of usi...
Read More » -
CISA Alerts: Chinese "BrickStorm" Malware Targets VMware Servers
A sophisticated Chinese-linked malware campaign called "Brickstorm" is targeting VMware vSphere servers, using hidden virtual machines to steal credentials and compromise networks, as detailed by U.S. and Canadian cybersecurity agencies. The malware employs advanced evasion techniques like encryp...
Read More » -
Fake Windows Update Spreads Malware, Salesforce Breach Exposed
Attackers are using sophisticated social engineering, like fake Windows Update screens, to deliver malware, while a significant breach at Salesforce highlights ongoing supply chain vulnerabilities. The expansion of IoT networks and AI tools introduces novel privacy and security risks, such as dat...
Read More » -
AI Meltdown: Reshaping Enterprise Expectations
The enterprise AI industry lacks a major failure to drive maturity, as past incidents haven't spurred structural changes due to difficulty proving AI's direct role and reliance on disclaimers to avoid responsibility. A market adjustment is expected as AI hype meets reality, shifting corporate pri...
Read More » -
Secure Your Exchange Server: CISA & NSA Best Practices
A new cybersecurity framework from CISA and the NSA provides detailed steps to protect Microsoft Exchange Server installations from sophisticated threats, focusing on hybrid and on-premises environments. Key recommendations include restricting administrative access, enforcing multi-factor authent...
Read More » -
UK Cyber Resilience Bill: Key Provisions Unveiled
The UK is introducing the Cyber Security and Resilience Bill in response to a 130% surge in significant cyber incidents, aiming to strengthen national digital defenses and protect essential services. The bill expands regulatory scope by classifying data centers, managed service providers, and oth...
Read More » -
State Hackers Infiltrated Telecom Giant Ribbon for Months
Ribbon Communications disclosed that state-sponsored hackers had unauthorized access to its systems for nearly a year, starting in December 2024, and has since removed them with law enforcement involvement. The breach affected a customer base including Fortune 500 companies and government departm...
Read More » -
Bitdefender & NETGEAR: Rising Home Cybersecurity Threats
Modern homes face nearly triple the daily cybersecurity attacks compared to last year, with households averaging 22 connected devices and enduring about 29 attacks daily. Entertainment devices like streaming systems, smart TVs, and IP cameras are the most vulnerable, often unpatched and accountin...
Read More » -
US Government Shutdown Cuts Cybersecurity Staff
The US government shutdown has drastically reduced staffing at key cybersecurity agencies, with CISA losing 65% of its personnel and NIST retaining only 34%, severely limiting national digital defense capabilities. Critical cybersecurity functions are impaired, including vulnerability management,...
Read More » -
Genians & RASInfotech: Proven Cybersecurity at GITEX 2025
Genians, in partnership with RASInfotech, is advancing Universal Zero Trust Network Access (ZTNA) adoption and will showcase its capabilities at GITEX 2025, focusing on cybersecurity achievements like visibility and compliance across the MEA region. The collaboration has delivered tangible result...
Read More » -
Unpatched Cisco Firewalls, Red Hat's GitLab Breached by Hackers
Cybersecurity threats are intensifying due to unpatched devices and supply chain compromises, as seen in attacks on Cisco firewalls and Red Hat, highlighting the need for timely updates and third-party risk management. Global infrastructure, including undersea cables, is increasingly vulnerable t...
Read More » -
BEAMTEL Launches CyberPlatform to Boost Morocco's Cybersecurity
BEAMTEL has launched CyberPlatform, Morocco's first fully Arabic-language cybersecurity education portal, to enhance national cyber resilience and make digital safety knowledge widely accessible. The platform offers tailored resources for various groups, including individuals, businesses, and gov...
Read More » -
Google Exposes Internal Security Threats
The profile of cybercriminals is shifting from state-sponsored actors to individuals, including teenagers in Western nations, who pose a growing internal threat. Groups like Scattered Spider, composed of minors from allied countries, engage in diverse criminal activities from sextortion to ransom...
Read More »