Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Infrastructure Security Agency"


25 mentions found


Emergent 5G technology is faster and more secure than ever. "There's a huge amount of intellectual property and corporate data that sits on mobile devices," Ghai said. 5G networks are very, very dynamic. The other change is using identity and access governance to make sure privileged access to IT and OT [operational technology] networks is managed. That same pattern follows in 5G networks.
Persons: Rohit Ghai, Ghai, , It's Organizations: Service, RSA, Infrastructure Security, 5G Locations: San Francisco, cybersecurity
Pro-Russia hackers are targeting infrastructure systems in the US and Europe, says a security advisory. Hackers have infiltrated infrastructure sectors in water, dams, energy, and agriculture. NEW LOOK Sign up to get the inside scoop on today’s biggest stories in markets, tech, and business — delivered daily. AdvertisementInfrastructure systems in the US and Europe are vulnerable targets for pro-Russia hackers, numerous security agencies cautioned in a May 1 advisory statement. The agencies observed pro-Russia hackers compromise the operational technology of infrastructure such as "Water and Wastewater Systems (WWS), Dams, Energy, and Food and Agriculture Sectors."
Persons: , Sandworm Organizations: Service, FBI, Infrastructure Security Agency, Wastewater Systems, Energy, Food, Agriculture, Google, Department of Justice Locations: Russia, Europe, North America, Dams, Texas, Ukraine, South Korea
Biden's new policy is largely a rewrite of the Obama administration's rule to safeguard U.S. critical infrastructure called the Presidential Policy Directive, or PPD-21, which was published in 2013. The effort to redraft that Obama-era infrastructure policy began over a year ago, in part to modernize it and keep up with hackers who have benefited from over a decade of technological advancement. The Biden administration has warned China not to help Russia in its invasion of Ukraine, or else the U.S. would be ready to act with sanctions. "We're aware now of the serious Chinese threat to our critical infrastructure, specifically prepositioning to disrupt or destroy critical infrastructure in the event of a major crisis," a senior administration official said. "The presidential policy directive that was created in 2013 didn't mention anything about CISA's role because we weren't created yet," a senior administration official said.
Persons: Joe Biden, Obama, cyberattacks, Christopher Wray, congressmembers, Wray, Biden's, Biden Organizations: White, Washington , D.C, Directive, FBI, Taiwan, of Homeland Security, Infrastructure Security Agency Locations: Washington ,, China, Russia, Ukraine, U.S, Taiwan
The town of Abernathy also reported a water system hack, and the towns of Lockney and Hale Center said hackers tried to breach their water infrastructure but did not succeed. Unlike how David was ready to take on Goliath, our most vulnerable critical infrastructure systems – including water infrastructure – are ill-prepared. The water attacks we’ve seen so far have not had serious consequences for the people they serve. According to the EPA, 90% of the nation’s community water systems are small, public systems bringing water to 10,000 or fewer customers. If we really want to help water utilities defend against cyber threats, we have to close the resource gap.
Persons: Robert M, Lee Dragos, David, we’ve, , Iran –, Homeland Security’s Organizations: CNN, Cyber Army, Hale Center, Islamic Revolutionary Guard Corps, FBI, Rehabilitation, Government, Department, Homeland, Infrastructure Security Agency, National Security Agency, Environmental Protection Agency, Department of Homeland, Local Locations: Russia, Texas, Muleshoe, Abernathy, Lockney, Aliquippa , Pennsylvania, United States, China, North Korea, Iran, Department of Homeland Security’s State
CNN —Hackers targeted a wastewater treatment plant in Indiana on Friday evening, prompting plant managers to send maintenance personnel to investigate the suspicious activity, a local official told CNN. A Russia-linked hacking group claimed responsibility. The same group claimed credit for a string of hacking incidents against water facilities in Texas earlier this year. On Saturday, Russian-speaking hackers posted a video to social media claiming credit for a cyberattack on a TMU wastewater treatment plant. It’s the latest apparent effort by a group of Russian-speaking hackers to target water facilities in small American towns.
Persons: , Jim Ankrum, “ TMU, ” Ankrum, Ankrum, Department of Homeland Security’s, Jake Sullivan, Mandiant, Ron Fabela, ” Fabela Organizations: CNN, Tipton Municipal Utilities, Tipton, Department of Homeland, Infrastructure Security Agency, US, Telegram, Infinity Squared Locations: Indiana, Russia, Texas, Tipton Municipal, Indianapolis, Muleshoe , Texas, United States, Tipton
download the appSign up to get the inside scoop on today’s biggest stories in markets, tech, and business — delivered daily. Read previewChina and Russia keep finding ways to get past Microsoft's security systems. Advertisement"Midnight Blizzard's successful compromise of Microsoft corporate email accounts and the exfiltration of correspondence between agencies and Microsoft presents a grave and unacceptable risk to agencies," CISA wrote in its emergency directive. AdvertisementLast week, the US Department of Homeland Security released a report from the Cyber Safety Review Board (CSRB) detailing a "cascade" of "avoidable errors" in the company's security systems. A Microsoft spokesperson told BI of the latest Russian attack: "As we discover secrets in our exfiltrated email, we are working with our customers to help them investigate and mitigate.
Persons: , CISA, Jen Organizations: Service, Infrastructure Security Agency, Microsoft, Business, Blizzard, Midnight Blizzard, US Department of Homeland Security Locations: China, Russia, Russian, U.S
Share Share Article via Facebook Share Article via Twitter Share Article via LinkedIn Share Article via EmailMicrosoft needs to prioritize security over feature development: Former CISA Director Chris KrebsChris Krebs, SentinelOne chief public policy officer and former Cybersecurity and Infrastructure Security Agency director, joins 'Squawk Box' to discuss the new U.S. Cyber Safety Review Board report that blames Microsoft over its handling of a Chinese hack involving the breach of emails of U.S. officials, what Microsoft can do to respond to future cybersecurity threats, and more.
Persons: Chris Krebs Chris Krebs, SentinelOne Organizations: Microsoft, Infrastructure Security Agency
Tugboats guide the Maersk Atlanta container ship at the Port of Newark in Newark, New Jersey, US, on Saturday, March 30, 2024. As the Dali container ship neared the Francis Scott Key Bridge after losing power and with no ability to navigate, there were no tug boats to guide it. It is unclear if the tugs remained with the Dali, a collision could have been averted. But maritime experts say that new tugboat regulation would be a reasonable response for the government to consider. The next day, the Coast Guard referred CNBC to the Joint Information Center (JIC) for the Key Bridge Casualty 2024 incident in Baltimore.
Persons: Dali, Francis Scott Key Organizations: Maersk, Port, Francis Scott Key Bridge, CNBC, Infrastructure Security Agency, Department of Homeland Security, Department of Transportation, U.S . Coast Guard, Coast Guard, Joint Information Center, U.S . Immigration, Customs, . Customs, Border Patrol Locations: Maersk Atlanta, Newark, Newark , New Jersey, US, Port of Baltimore, Baltimore
Recovery efforts are now underway for the missing people, who are presumed dead. People from El Salvador, Guatemala and Mexico among the missing: Miguel Luna, an immigrant from El Salvador, has been identified as one of the missing, according to the nonprofit Miguel Luna, an immigrant from El Salvador, has been identified as one of the missing, according to the nonprofit CASA . Ship blacked out before crash: Just minutes before impact, there was a “total blackout” of engine and electrical power on the ship, according to Clay Diamond, executive director of the American Pilots Association. Eight construction workers were believed to be mending potholes on the bridge when it fell, according to officials. A specialized team will also determine who was controlling the vessel and who was on the ship’s bridge at the time of the crash, she said.
Persons: Francis Scott Key, James Wallace, Wes Moore, “ We’re, Jennifer Homendy, Richard Worley, Miguel Luna, Petén, Clay Diamond, Diamond, “ It’s, , Pete Buttigieg, Joe Biden, US Sen, Chris Van Hollen, Buttigieg, Luna, DALI, , ” Moore, Dali, Tasos Katopodis, Moore, CNN’s Melissa Alonso, Flora Charner, Sarah Engel, Jack Forrest, Allison Gordon, Elise Hammond, Jennifer Henderson, Betsy Klein, Jamiel Lynch, Sean Lyngaas, Mary Kay Mallonee, Lauren Mascarenhas, Pete Muntean, Tori B, Powell, Rachel Ramirez, Amy Simonson, Aditi Sangal, Michael Williams Organizations: CNN, US Coast Guard, Baltimore City Fire, Divers, Maryland Gov, Guard, Transportation Safety, National Transportation Safety, Baltimore Police, CASA, The Ministry of Foreign Affairs, Mexican Embassy, American Pilots Association, Reconstruction, Vital, Transportation, El, Maritime, Port Authority of, Infrastructure Security Agency, Coast Guard, for Disease Control, Gov, Association of Maryland Pilots, , NTSB Locations: Baltimore, , El Salvador, Guatemala, Mexico, San Luis, Camotán, Washington, US, Patapsco, El Salvadoran, Maryland, Port Authority of Singapore
A loss of propulsion would have had an effect on the rudder's ability to steer effectively, Lipian told BI. Related stories"There's no brakes on a ship," Lipian added. Instead of building bridges strong enough to withstand a direct impact from a ship, engineers focus on deflecting a wayward vessel from its path. AdvertisementIn fact, engineers would struggle to design a bridge capable of stopping a ship as large as the Dali, she said. Newer bridges, built with heavier cargo ships in mind, may include larger gaps between the supporting piers, Broyd said.
Persons: , Dali, Wes Moore, Henry Lipian, Lipian, Moore, Tim Broyd, Francis Scott Key, Broyd, Lorna Wharton, Rick Geddes, Mark Richards Organizations: Service, National Transportation Safety Board, Business, FBI, NBC, Forensics, US Coast Guard, Port, Maryland Association of Pilots, Gov, Infrastructure Security Agency, ABC News, University College London, UK's, of Civil Engineers, COWI, Cornell University Infrastructure Policy, BI Locations: Maryland
Share Share Article via Facebook Share Article via Twitter Share Article via LinkedIn Share Article via EmailFormer CISA Dir. Krebs on cyber threats: Microsoft and others are 'hanging on by a thread' right nowChris Krebs, SentinelOne chief public policy officer and former Cybersecurity and Infrastructure Security Agency director, joins 'Squawk Box' to discuss the ongoing cyberattacks on Microsoft, whether the hacks have any connections to the upcoming elections,
Persons: Krebs, Chris Krebs, SentinelOne Organizations: Microsoft, Infrastructure Security Agency
Hackers are threatening to leak stolen Trump court documents unless they get a ransom. LockBit is a Russia-based ransomware group that's made millions already by hacking victims. AdvertisementLockBit, a group of notorious Russian hackers, is threatening to release court documents it claims it stole from Georgia officials unless it gets paid a ransom. It's the latest scheme from a group that's frustrated international authorities and dodged shutdown attempts. LockBit is threatening to release Trump court documents it stole from the Fulton County, Georgia, election interference case unless the county paid up.
Persons: Trump, LockBit, , Biden, that's, It's, aren't, Donald Trump's Organizations: Service, Trump, US Department of, Treasury, Treasury Department, Justice Department, Infrastructure Security Agency, Boeing, National Health Service, Royal Mail, Commercial Bank of China, Business, Fulton, FBI, Crime Agency Locations: Russia, Georgia, Fulton County , Georgia
New York CNN —AT&T is reimbursing customers for the nearly 12-hour network outage on Thursday, the company announced in a news release. The mobile network will issue a $5 credit to “potentially impacted” AT&T Wireless customers, which it says is the “average cost of a full day of service.”“We recognize the frustration this outage has caused and know we let many of our customers down,” the company said late Saturday. The network outage, which was first reported on Thursday at 3:30 a.m. AT&T had encountered sporadic service interruptions in the days leading up to the outage, including a temporary 911 outage in some parts of the southeast. While regional disruptions to wireless service happen occasionally, prolonged nationwide outages are rare.
Persons: Organizations: New, New York CNN —, T Wireless, AT, T’s, Cricket Wireless, Cricket, Federal Communications Commission, Infrastructure Security Agency, CNN Locations: New York, United States
Change Healthcare's systems are down for a fourth straight day after parent company UnitedHealth Group disclosed that a suspected cybersecurity threat actor gained access to part of its information technology network on Wednesday. UnitedHealth, the biggest health-care company in the U.S. by market cap, owns the health-care provider Optum, which merged with Change Healthcare in 2022. Optum services more than 100 million patients in the U.S., according to its website, and Change Healthcare offers solutions for payment and revenue cycle management. ET Saturday, Change Healthcare said the disruption is expected to continue "at least" through the day. The AHA declined to comment on the Change Healthcare cyberattack.
Persons: UnitedHealth, We're, CISA Organizations: UnitedHealth Group, Healthcare, U.S . Securities, Exchange Commission, CNBC, CVS Health, CVS, American Hospital Association, AHA, Department of Health, Human Services, FBI, Infrastructure Security Agency, HHS Locations: U.S
It is only the latest in long list of hacking incidents that have roiled the health care sector in the last few years. Mara FurlichPrescription insurance processing at big university health systems in Indiana and California have also been disrupted, according to internal email correspondence at the health systems reviewed by CNN. In a regulatory filing Thursday, Change Healthcare’s parent firm said “suspected nation-state associated” hackers had breached some of their computer systems. The Change Healthcare spokesperson declined to comment when asked on what information the company based its assessment that foreign government-linked hackers could be responsible. The FBI and CISA did not respond for requests for comment on whether they agreed with Change Healthcare’s assessment on who was responsible for the hack.
Persons: Mara Furlich, Furlich, ” Furlich, Camp Pendleton, Luke Bonczyk, Abi, , , CISA, Max Henderson Organizations: CNN, FDA, Healthcare, Naval Hospital, American Hospital Association, FBI, Infrastructure Security Agency, Department of Health, Human Services, HHS, Optum, Locations: United States, Detroit, Camp Pendleton, Southern California, Indiana, California
Opinion: What the AT&T outage reveals
  + stars: | 2024-02-23 | by ( Opinion Bob Kolasky | ) edition.cnn.com   time to read: +6 min
CNN —The news Thursday morning of the AT&T service outage — affecting tens of thousands, if not hundreds of thousands of customers — was yet another reminder of the importance of critical infrastructure resilience. By a few minutes after 3 pm ET, about 11 hours after customers’ initial reports of the outage, AT&T said it had restored service to all affected customers. For communications, it can be conceptualized in two different ways: What is the scope and scale of the service outage and what are the cascading consequences of the outage? In a connected world, a widespread communications outage can have a contagion effect. Infrastructure outage incidents can’t be addressed by stove-piping information.
Persons: Bob Kolasky, , it’s Organizations: Infrastructure Security, Risk Management, CNN, Bob Kolasky Department of Homeland, Federal Communications Commission, White, Communications, AT, Rogers Communications, Chinese Communist Party, Telecommunications, Carnegie Endowment, International Peace Locations: Exiger, Canada, France, Paris, Puerto Rico, Southeast, Gulf
An executive order to be signed by President Biden will bolster maritime cybersecurity by making sure all critical port infrastructure that is owned and operated adheres to international and industry recognized safety regulations. The Biden official said that the new Supply Chain Resilience Center, announced last November, will be included in efforts to enhance port security. In addition to the new rules and regulations, $20 billion will be used to strengthen U.S. port infrastructure through the Investing in America Agenda. These cranes have been a focus of debate among national security experts and port officials in recent years. Over the long term, senior Biden administration officials said they would like to invest in the onshoring of port crane manufacturing.
Persons: Biden Organizations: Coast Guard Cyber Command, Coast Guard, & Infrastructure Security Agency, CNBC, Biden, Chain Resilience, Shanghai Zhenhua Heavy Industries, Capitol, Port, Reshoring, American Association of Port Authorities Locations: U.S, China, Shanghai, Beijing, Capitol Hill, America, Japan, Austria, Finland, Germany, Nagoya
But the blog does offer insight into how U.S. geopolitical rivals have been using large-language models to expand their ability to more effectively breach networks and conduct influence operations. But criminals and offensive hackers use it as well, and the introduction of large-language models led by OpenAI's ChatGPT upped that game of cat-and-mouse. — Iran's Revolutionary Guard has used large-language models to assist in social engineering, in troubleshooting software errors, and even in studying how intruders might evade detection in a compromised network. “Of course bad actors are using large-language models — that decision was made when Pandora’s Box was opened," said Amit Yoran, CEO of the cybersecurity firm Tenable. Some cybersecurity professionals complain about Microsoft's creation and hawking of tools to address vulnerabilities in large-language models when it might more responsibly focus on making them more secure.
Persons: , OpenAI, , OpenAI's ChatGPT, Malaysia —, Amit Yoran, Gary McGraw, Edward Amoroso Organizations: BOSTON, — Microsoft, Microsoft, Korean, Guard, Cybersecurity, Infrastructure Security Agency, Google, Meta, Berryville Institute of Machine Learning, NYU, T Locations: Iran, North Korea, Russia, China, Redmond, Washington, OpenAI, Russian, Ukraine, France, Malaysia
Former CISA director Chris Krebs on vote-by-mail process
  + stars: | 2024-02-13 | by ( ) www.cnbc.com   time to read: 1 min
Share Share Article via Facebook Share Article via Twitter Share Article via LinkedIn Share Article via EmailFormer CISA director Chris Krebs on vote-by-mail processChris Krebs, SentinelOne chief public policy officer and former Cybersecurity and Infrastructure Security Agency director, joins CNBC's 'Squawk Box' to discuss his insights into recent efforts to boost the security of U.S. elections and infrastructure.
Persons: Chris Krebs, SentinelOne Organizations: Infrastructure Security Agency Locations: U.S
Carolyn Kaster/AP/FileUS national security officials have to weigh whether publicly calling attention to disinformation might inadvertently amplify the very message they’re trying to bat down. In both scenarios, federal officials favored a muted public response, largely choosing to let state and local governments take the lead. State and local officials run elections and are more trusted voices in their communities, but how can federal officials act decisively to support them? “It’s a trick box,” said Adam Hickey, who worked on election security issues for the Justice Department’s National Security Division. “[W]e prioritize tabletop exercises that integrate the range of cyber, physical, and operational threats election officials may encounter,” Conley said in a statement to CNN.
Persons: , , , Carolyn Kaster, there’s, Biden, Xi Jinping, Kevin Lamarque, Joe Biden, deepfakes, ” Sen, Mark Warner, Kevin Dietsch, Francisco Aguilar, ” Aguilar, Donald Trump’s, Adam Hickey, Hickey, Cait Conley, DHS’s, ” Conley, , ” CNN’s Evan Perez, Natasha Bertrand, Donie O’Sullivan, Katie Bo Lillis Organizations: Washington CNN, CNN, FBI, CIA, Homeland Security, Biden White, Jeffersonville Masonic, New Hampshire, Foreign Ministry, , Senate, Committee, White, Senate Intelligence, Virginia Democrat, Republican, Trump, Capitol, Justice Department’s National Security, , Justice Department, Department of Homeland, National Security Council, US Army, DHS’s Cybersecurity, Infrastructure Security Agency Locations: China, Jeffersonville, Jeffersonville , Ohio, American, Woodside , California, Nevada, Russia, Iran, Russian, Iranian
(AP) — One state lawmaker wants Nebraska to take measures to protect it from cyberattacks. State Sen. Loren Lippincott presented a bill Thursday to the Legislature's government committee that would give the Nebraska State Patrol $200,000 to hire “an ethical hacker.” The hacker would spend his or her days trying to break into the state’s computer network, as well as election equipment and software, to find any vulnerabilities in those systems. His bill also would allow hiring a security company that provide hackers to find weaknesses in the state's system. Lippincott presented the bill on the heels of FBI Director Christopher Wray's warning that Chinese government hackers are targeting critical U.S. infrastructure, including water treatment plants, the electrical grid and transportation systems. If advanced, they would have to survive three rounds of debate to be passed in Nebraska's unique one-chamber Legislature.
Persons: LINCOLN, cyberattacks, Sen, Loren Lippincott, Lippincott, ” Lippincott, Christopher Wray's, Organizations: Nebraska State Patrol, Security, Cybersecurity, Infrastructure Security Agency, cybersecurity Locations: Neb, Nebraska, Missouri, Georgia
WASHINGTON (AP) — The nation’s cybersecurity agency has launched a program aimed at boosting election security in the states, shoring up support for local offices and hoping to provide reassurance to voters that this year's presidential elections will be safe and accurate. Officials with the U.S. Cybersecurity and Infrastructure Security Agency planned to introduce its new election security adviser program Thursday to the National Association of State Election Directors and on Friday to the National Association of Secretaries of State. For state and local election officials, the list of security challenges keeps growing. The CISA program includes 10 new hires, all of whom join the federal agency with extensive election experience. CISA Director Jen Easterly announced plans for the program at a July meeting of the state election directors in South Carolina.
Persons: Jen, Cait Conley, ” Conley, Keith Ingram, Spencer Wood, David Stafford, , , Lori Augino, CISA, Al Schmidt, Karen Brinson Bell, Brinson Bell Organizations: WASHINGTON, U.S, Cybersecurity, Infrastructure Security Agency, National Association of State, National Association of, State, Ohio, State’s, North Carolina State Board Locations: New Hampshire, Fulton County , Georgia, Russia, South Carolina, Texas, Escambia County , Florida, Washington, ,
The report would be the most detailed disclosure yet by the US government of the hackers’ stealthy techniques, one aimed at helping private owners of critical infrastructure spot the Chinese hackers in their networks. The hackers’ presence in critical US networks has sparked a monthslong effort by US national security officials to kick the hackers out. The report, which US officials are set to release this week, makes clear that the Chinese hackers’ activity began much earlier than previously known, with the hackers scoping and accessing IT systems years ago. The Beijing-backed hackers have been probing systems that control heating, cooling and water, access that, if exploited, could allow them to manipulate those systems and cause “significant infrastructure failures,” the report says. Canada’s cybersecurity agency “assesses that the direct threat to Canada’s critical infrastructure” from the Chinese hackers “is likely lower” than that to US infrastructure, but that Canada would still likely still be affected by a disruption to US infrastructure due to “cross-border integration,” the document says.
Persons: Christopher Wray, Canada’s, Organizations: CNN, FBI, US, Embassy, National Security Agency, Cybersecurity, Infrastructure Security Agency Locations: Beijing, China, Taiwan, Washington ,, Guam, Australia, Canada, New Zealand, United Kingdom, Pacific
Share Share Article via Facebook Share Article via Twitter Share Article via LinkedIn Share Article via EmailCompanies need to understand that cyber risk is business risk, says fmr. CISA director Chris KrebsChris Krebs, SentinelOne chief public policy officer and former Cybersecurity and Infrastructure Security Agency director, joins 'Squawk Box' to discuss the growing threat of Chinese cyberattacks, how the U.S. can respond, and more.
Persons: Chris Krebs Chris Krebs, SentinelOne Organizations: Companies, Infrastructure Security Agency Locations: U.S
CNN —FBI Director Christopher Wray on Wednesday warned that Chinese hackers are preparing to “wreak havoc and cause real-world harm” to the US. Chinese government-backed hackers, Wray said, are targeting things like water treatment plants, electrical infrastructure and oil and natural gas pipelines, Wray said. The Chinese hackers are working “to find and prepare to destroy or degrade the civilian critical infrastructure that keeps us safe and prosperous,” Wray said. The hearing comes in the wake of a big push by US and Chinese officials to ease tensions in the relationship between the two superpowers. We have made it easy on them,” Jen Easterly, who leads the US Cybersecurity and Infrastructure Security Agency, told lawmakers.
Persons: Christopher Wray, , ” Wray, Wray, Xi Jinping, Joe Biden, Xi, “ China’s, Jen, Paul Nakasone, ” Nakasone, CNN’s Evan Perez Organizations: CNN, Chinese Communist Party, National Security Agency, Infrastructure Security Agency, FBI, Justice Department Locations: China, Taiwan, America
Total: 25