National Security Strategy stresses fortification of cyber defenses, paints Russia as malicious actor
The National Security Strategy document released by the Trump administration on Monday calls for the reinforcement of cyber defenses to protect government systems and critical infrastructure, as well as an improved response to attacks against such assets.
Local voting officials have officially adopted a charter for the newly formed Elections Government Sector Coordinating Council (GCC) - a key step following DHS' designation of elections systems as critical infrastructure.
Banks face a new hybrid threat from hackers that has already netted criminals a cool £30 million, according to a new report.
Last Thursday saw the official launch of the International Operation Technology Security Association (Iotsa) where John Noble, director of network management at the UK's NCSC called for industry cooperation and incident reporting.
Eight members of the National Infrastructure Advisory Council said Trump had given "insufficient attention" to cybersecurity threats.
The hackers responsible for breaching the systems of multiple U.S. energy operators since May 2017 employed a phishing scheme that used malicious attachments to download a template file via an SMB connection, in order to silently harvest credentials, according to a blog post from Cisco Talos.
Since May, foreign hackers have breached computer networks at 12 or more U.S. power plants, including nuclear facilities, prompting the FBI and DHS to issue an urgent amber warning to utility companies, according to reports.
Kaspersky further reported that 60 percent of NotPetya infections took place in Ukraine, while Russia experienced just over 30 percent.
The Lithuanian, Latvian and Estonian power grids have all been targeted by Russia undergoing a series of limited Distributed Denial of Service (DDoS) over the last few years that may be probing for weaknesses.
Approximately 3,000 unique industrial sites per year are randomly infected with generic malware, while attacks involving malware specifically designed to target industrial control systems are far less common, according to a study.
It's estimated that power companies in Russia suffered more than 350 serious cyber-attacks in 2016, a 50 percent increase on the previous year.
Researchers may have found a tenuous link between a cyberespionage organization's credentials-stealing trojan and the Shamoon hacking group that's been targeting Saudi energy companies with Disttrack disk-wiping malware.
Secretary of Homeland Security Jeh Johnson on Friday officially declared the U.S. electoral system as critical infrastructure.
The KillDisk disk-wiper program that was used in conjunction with BlackEnergy malware to attack Ukrainian energy utilities now includes a ransomware component, according to researchers at CyberX.
A network breach risk assessment of over 20 organizations found that 100 percent showed signs of traffic tunneling, DNS-related exfiltration and malformed protocols in outbound traffic - all indicators of attackers using evasion and exfiltration techniques.
Professional hackers infiltrated the systems of Germany-based industrial conglomerate ThyssenKrupp earlier this year, stealing intellectual property, research and secrets.
One of the best ways to test incident readiness is a tabletop exercise, a mock incident administered for senior leadership, IT, security, legal, corporate communications and business line readiness.
The BlackNurse DOS attack uses ICMP messages to clog up firewalls with traffic.
Officials with the Lansing Board of Water & Light publicly acknowledged on Tuesday that the utility paid $25,000 to regain control of its accounting and email systems in the days following an April 25 ransomware attack.
The DDoS attacks that shuttered the Dyn DNS service on Oct. 21 set a precedent that could disrupt the presidential election next week, according to a report from Imperva Incapsula.
International Atomic Energy Agency's (IAEA) director Yukiya Amano said there was a successful cyberattack of a nuclear power plant two to three years ago.
Eugene Kaspersky, CEO of Kaspersky Lab speaks at IP EXPO Europe 2016 and explains why he believes cyber-attackers are now turning their attention to critical national infrastructure.