Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "cyberattacks"


25 mentions found


The personal information of British military personnel has been hacked in a significant new data breach likely to have been orchestrated by a state, senior British politicians said on Tuesday. The cyberattack, which targeted a third-party payroll system used by Britain’s Ministry of Defense, yielded the names and bank details of some serving members of the armed forces and some veterans, they said, as well as a small number of addresses. The payroll system, which is not connected to the defense ministry’s own internal network, has been taken offline and the government has not publicly blamed anyone for the data breach, or confirmed British media reports pointing a finger at China. In March Britain accused China of cyberattacks that compromised the voting records of tens of millions of people, and said that the Chinese had attempted unsuccessfully to hack email accounts belonging to several members of Parliament. The deputy prime minister, Oliver Dowden, also announced sanctions against two individuals and one company linked to a state-affiliated group implicated in those attacks.
Persons: Oliver Dowden Organizations: Britain’s Ministry of Defense Locations: British, China, Britain
Generative AI is revolutionizing cybersecurity in connected networks. Generative AI has become a double-edged sword for the security of connected networks. On one hand, generative AI can speed up cybersecurity problems, making it easier and cheaper for bad actors to conduct identity attacks. Business Insider spoke with several cybersecurity professionals who attended the annual RSA conference this week in San Francisco about how generative AI is increasingly used in cybersecurity for 5G devices and networks. Now that mobile and Internet of Things devices have become more ubiquitous, they're using even more data, which generative AI can help filter and secure.
Persons: , David Cooper, Cooper, Shaun McAlmont, Chris Novak, David Aviv, Steve Wilson, Ev Kontsevoy, It's, Rohit Ghai, Ghai, Wilson Organizations: Service, Accenture Security, RSA, Verizon Business Locations: cybersecurity, San Francisco
Director of National Intelligence Avril Haines testifies before the Senate Armed Services Committee May 2, 2024 in Washington, DC. The top U.S. intelligence official warned Congress of an alarming rise in cyberattacks at a hearing on global threats Thursday. Director of National Intelligence Avril Haines said the number of ransomware attacks worldwide grew as much as 74% in 2023. The comments from Haines come as various companies, such as UnitedHealth Group , MGM Resorts and Clorox , have been disrupted by cyberattacks in the past year. In 2023, cyberattacks also temporarily shut down MGM's hotel booking system and disrupted production at Clorox.
Persons: National Intelligence Avril Haines, Haines, Sen, Angus King, cyberattacks, They've, That's, King, Andrew Organizations: National Intelligence, Senate Armed Services, UnitedHealth, MGM Resorts, Clorox, cyberattacks, Senate Armed Services Committee, U.S, Healthcare Locations: Washington ,, cyberattacks, U.S, East, Maine, China, Russia, Clorox
Late last year, Poland's national security agency estimated that Russia could attack NATO within three years. AdvertisementBut whether Putin really does intend to attack NATO and what an attack might look like remains unclear. In March, Putin denied having any plans to attack NATO members, describing such claims as "complete nonsense." "So, his ambition in growing is not going to be that he will attack NATO and NATO countries next year. A covert war is already underwayRussia, some point out, is already engaged in a war with NATO, albeit covertly.
Persons: , Donald Tusk, Tusk, Putin, Emmanuel Macron, NATO Putin, Philip Ingram, Ingram, Ruth Deyermond, Bryden Spurling, Robert Dover, Spurling, that's, SERGEY BOBOK, Russia's Organizations: Service, Poland's, Business, Bild, NATO, Germany isn't, Ukraine, King's College London, RAND Corporation, University of Hull, European NATO, RAND, Ukrainian Territorial Defence Forces Locations: Europe, Russia, Ukraine, Eastern Europe, Baltic, Estonia, Lithuania, Latvia, Germany, Washington, Russian, NATO, European, Kharkiv, Soviet Union
Change Healthcare provides payment, revenue management and other solutions like e-prescription software. UnitedHealth told CNBC in April that it paid a ransom to try and protect patient data. Its business unit Optum — which provides care to 103 million customers — and Change Healthcare — which touches one in three patient records — merged in 2022. Committee Chairman Sen. Ron Wyden, D-Ore., said in his opening remarks that the Change Healthcare breach serves as a "dire warning about the consequences of too-big-to-fail mega-corporations." Sen. Michael Bennet, D-Colo., pressed Witty to share how UnitedHealth is working to ensure something like the Change Healthcare breach will not happen again.
Persons: Andrew, UnitedHealth, Sen, Ron Wyden, Wyden, Thom Tillis, they're, Tillis, Blackcat, Michael Bennet Organizations: Senate, Capitol, U.S ., Finance, UnitedHealth, Healthcare, CNBC, U.S . Securities, Exchange Commission, U.S . Department of Justice Locations: Washington , DC
Biden's new policy is largely a rewrite of the Obama administration's rule to safeguard U.S. critical infrastructure called the Presidential Policy Directive, or PPD-21, which was published in 2013. The effort to redraft that Obama-era infrastructure policy began over a year ago, in part to modernize it and keep up with hackers who have benefited from over a decade of technological advancement. The Biden administration has warned China not to help Russia in its invasion of Ukraine, or else the U.S. would be ready to act with sanctions. "We're aware now of the serious Chinese threat to our critical infrastructure, specifically prepositioning to disrupt or destroy critical infrastructure in the event of a major crisis," a senior administration official said. "The presidential policy directive that was created in 2013 didn't mention anything about CISA's role because we weren't created yet," a senior administration official said.
Persons: Joe Biden, Obama, cyberattacks, Christopher Wray, congressmembers, Wray, Biden's, Biden Organizations: White, Washington , D.C, Directive, FBI, Taiwan, of Homeland Security, Infrastructure Security Agency Locations: Washington ,, China, Russia, Ukraine, U.S, Taiwan
CNN —An unnamed woman was denied a top-secret security clearance this year due to being a “close” relative of an authoritarian dictator of an unnamed country, according to a publicly available document from the Defense Department’s Office of Hearings and Appeals. The judge said that Country X “supports international terrorism, and it conducts cyberattacks and espionage against the United States.”“Applicant was born a citizen of Country X,” the record says. “A close family member (cousin, aunt, uncle, niece, or nephew) is the dictator of Country X. Applicant’s parents and their children, including Applicant, immigrated to the United States in the 1990s when she was young. Administrative decisions on security clearance eligibility are regularly posted publicly by the Defense Office of Hearings and Appeals. “One thing people forget is it’s not like you get the keys to the kingdom,” Posard said of a secret clearance, which is the second lowest level security clearance available.
Persons: , , , , Edward Loughran, credibly, Loughran, Marek Posard, Kim Jong, ” Posard, ” Loughran, Posard, it’s, It’s Organizations: CNN, Defense Department’s, Defense, RAND Corporation, The Washington Locations: United States, American, Country, North Korea, DPRK, Cuba, Iran, Syria, The, Loughran
The town of Abernathy also reported a water system hack, and the towns of Lockney and Hale Center said hackers tried to breach their water infrastructure but did not succeed. Unlike how David was ready to take on Goliath, our most vulnerable critical infrastructure systems – including water infrastructure – are ill-prepared. The water attacks we’ve seen so far have not had serious consequences for the people they serve. According to the EPA, 90% of the nation’s community water systems are small, public systems bringing water to 10,000 or fewer customers. If we really want to help water utilities defend against cyber threats, we have to close the resource gap.
Persons: Robert M, Lee Dragos, David, we’ve, , Iran –, Homeland Security’s Organizations: CNN, Cyber Army, Hale Center, Islamic Revolutionary Guard Corps, FBI, Rehabilitation, Government, Department, Homeland, Infrastructure Security Agency, National Security Agency, Environmental Protection Agency, Department of Homeland, Local Locations: Russia, Texas, Muleshoe, Abernathy, Lockney, Aliquippa , Pennsylvania, United States, China, North Korea, Iran, Department of Homeland Security’s State
CNN —Hackers targeted a wastewater treatment plant in Indiana on Friday evening, prompting plant managers to send maintenance personnel to investigate the suspicious activity, a local official told CNN. A Russia-linked hacking group claimed responsibility. The same group claimed credit for a string of hacking incidents against water facilities in Texas earlier this year. On Saturday, Russian-speaking hackers posted a video to social media claiming credit for a cyberattack on a TMU wastewater treatment plant. It’s the latest apparent effort by a group of Russian-speaking hackers to target water facilities in small American towns.
Persons: , Jim Ankrum, “ TMU, ” Ankrum, Ankrum, Department of Homeland Security’s, Jake Sullivan, Mandiant, Ron Fabela, ” Fabela Organizations: CNN, Tipton Municipal Utilities, Tipton, Department of Homeland, Infrastructure Security Agency, US, Telegram, Infinity Squared Locations: Indiana, Russia, Texas, Tipton Municipal, Indianapolis, Muleshoe , Texas, United States, Tipton
Organizations and individuals who delay investing in the latest AI PCs risk falling behind in an increasingly competitive landscape where technological advancements are essential for staying innovative, collaborative, and secure. These AI PCs possess the ability to anticipate and comprehend user requirements, resulting in a highly personalized and responsive interaction. The new Latitude AI PCs can deliver up to 38% less power when running AI-enhanced collaboration features like Zoom.22. Content creators can save time by generating images 1.7 times faster with StabilityAI on their Dell AI PCs or Dell AI workstations with new Intel processors.33. Knowledge workers can optimize their Dell AI PCs by utilizing just 1% of CPU usage, effectively detecting malware with Crowdstrike4.
Persons: cyberattacks, Dell, Read, Forrester Organizations: Forrester, Processing, Dell, Intel, Dell Optimizer, Dell Technologies, Insider Studios, Forrester Consulting, Services Locations: NPU, Argentina, Chile, China, Colombia, Costa Rica, Guatemala, Hong Kong, Korea, Malaysia, Russia, South Africa, Taiwan, Ukraine, Venezuela, Vietnam, Thailand, Philippines
Anne Neuberger, Deputy National Security Advisor for Cyber and Emerging Technology, cited President Biden's signing in February of an executive order to strengthen the cybersecurity of U.S. ports . The nation's port system is the main point of entry for trade, employs 31 million people, and generates over $5.4 trillion for the U.S. economy. One of the key areas of concern for the Biden administration and the executive order is the security of Chinese-manufactured cranes. Biden administration officials recently warned the nation's governors about the threat to water systems. Isles said it is important to identify the critical safety and business systems at the nation's ports.
Persons: Seroka, Gene Seroka, Anne Neuberger, Biden's, Biden cybersecurity, Neuberger, Biden, Christopher Wray, Google's, Mandiant, Adam Isles, order's rulemaking Organizations: Department of Transportation Maritime Administration, Security Operations Center, National, Technology, Biden, Coast Guard, U.S, Mitsui, FBI, Congress, Chertoff Group, American Association of Port Authorities, CNBC, Port Locations: Angeles Harbor, United States, of Los Angeles, of, Angeles, U.S, China, State, Texas, Muleshoe, Cannon, Clovis , New Mexico, Iran, Pennsylvania, cybersecurity, Port of Los Angeles
Iran and Israel have fought a deadly shadow war for decades. The two enemies have relied on proxy forces, assassinations, and strikes abroad to hit each other. AdvertisementA decades-long shadow war between Iran and Israel has been thrust into broad daylight. Iran's unprecedented attack on Israel last weekend has notably changed the dynamics of this conflict, and it's now more dangerous. Any Israeli military response to the attack risks an all-out confrontation with Iran and could plunge the region into even more violence.
Persons: , Alma al, KAWNAT HAJU, Jonathan Lord, Israel, MAHER, MOUNES, Israel —, Joseph Votel, Votel, Christophe Van Der Perre Israel, Josep Borrell, Maj, Hossein, Lord Organizations: Service, Hezbollah, Getty Images Israel, Pentagon, Business, Islamic Revolutionary Guard Corps, Getty, US Central Command, REUTERS Locations: Iran, Israel, Tehran, Lebanon, Hamas, Gaza, Lebanese, Alma, AFP, Iraq, Syria, Israel's, Hormuz, Iranian, Damascus, Syria's, Arad, Spanish
CNN —A hacking group with ties to the Russian government is suspected of carrying out a cyberattack in January that caused a tank at a Texas water facility to overflow, experts from US cybersecurity firm Mandiant said Wednesday. Muleshoe officials replaced the hacked software system and took other steps to secure the network, Sanchez said. “Regulations have not required this low-hanging fruit to be addressed,” Serino told CNN. “I’ve never experienced this before but … we’re aware that those threats are out there,” Poling told CNN by phone. “The haphazardness is part of their pathological emphasis on psychological impact,” Dan Black, a Mandiant analyst, told CNN.
Persons: Mandiant, Jake Sullivan, Sullivan, Ramon Sanchez, Sanchez, , Gus Serino, ” Serino, ” Anne Neuberger, ” The, Harris, Neuberger, Buster Poling, Mike Cypert, Poling, “ I’ve, ” Poling, Nick Conger, Sandworm, ” Dan Black Organizations: CNN, FBI, Environmental Protection Agency, EPA, White, ” The Biden, Hale Center, Russian Embassy, State of, GRU, Locations: Texas, US, Muleshoe, Pennsylvania, Iran, United States, Russian, Ukraine, Lockney’s, Hale, Washington ,, State of Texas
The Paris Olympics’ One Sure Thing: Cyberattacks
  + stars: | 2024-04-16 | by ( Tariq Panja | ) www.nytimes.com   time to read: +1 min
In his office on one of the upper floors of the headquarters of the Paris Olympic organizing committee, Franz Regul has no doubt what is coming. “We will be attacked,” said Mr. Regul, who leads the team responsible for warding off cyberthreats against this year’s Summer Games in Paris. In the Paris operations center, there is even a red light to alert the staff to the most severe danger. So far, Mr. Regul said, there have been no serious disruptions. Unlike companies and governments, though, who plan for the possibility of an attack, Mr. Regul said he knew exactly when to expect the worst.
Persons: Franz Regul, , Regul Organizations: Paris Olympic, Paris . Companies Locations: Paris
The Iranian armed forces are among the biggest in the Middle East, with 580,000 soldiers and officers and also 200,000 reservists. The start of a direct military confrontation between Iran and Israel has brought renewed attention to Iran’s armed forces. Instead, Israel and Iran have been engaged in a long shadow war via air, sea, land and cyberattacks, and Israel has covertly targeted military and nuclear facilities inside Iran and killed commanders and scientists. It’s that they realize any war against Iran is a very serious war.”What sort of military threat does Iran pose? The commander in chief of Iran’s armed forces is the supreme leader, Ayatollah Ali Khamenei, who has the last word on all major decisions.
Persons: , Afshon Ostovar, “ It’s, Ayatollah Ali Khamenei, Fabian Hinz, , Atta Kenare, Ostovar, Ayatollah Khamenei, Shah Mohammed Reza Pahlavi, Will Israel’s Organizations: Naval Postgraduate School, Islamic Revolutionary Guards Corps, International Institute for Strategic Studies, Guards, General Staff of, Armed Forces, Quds Force, Agence France, Phantoms, Iranian Army, Associated Press Locations: Tehran, Iranian, Iran, Israel, Damascus, United States, Washington, Lebanon, Yemen, Syria, Iraq, Jihad, Gaza, Berlin, speedboats, Persian, Hormuz, Russia, Ukraine, Sudan, North Korea
They scuttled House Speaker Mike Johnson’s plan to extend the FISA Section 702 program with minimal tweaks. It is true that the FBI obtained warrants through FISA to wiretap Carter Page, an adviser to Trump’s first presidential campaign. According to the National Security Agency, 60% of what appears in the Presidential Daily Brief has some data that comes from the 702 program. The 702 program has been updated in the years since its inception, including in 2018, to include new protections to minimize Americans’ communications from being accessed without a warrant. Additionally, these proposals would bar the government from sidestepping warrant requirements by simply buying the data of Americans from so-called data brokers.
Persons: CNN —, Donald Trump, , Mike Johnson’s, Carter, Trump’s, Trump, Read, Katie Bo Lillis, Johnson, Christopher Wray, , Leon Panetta Organizations: CNN, Foreign Intelligence, Trump, FISA, Republicans, FBI, Privacy, Civil, National Security Agency, Center for Justice, New York University, Brennan Center, Intelligence Community, National Intelligence, House, CIA, New Locations: Ukraine, Russia, Moscow, New York City
Generative AI video and audio tools are getting deployed, and getting better, quickly. Even as OpenAI limits access to audio and video tools, dark websites have exploded in number in the past few months selling GPT knockoff products. How to identify an AI video imposterThere are many ways to spot an AI imposter, some relatively simple. If the person complies but their head disappears on the video screen, end the call immediately, Hollenbeck said. How to live a multi-factor authentication life offlineEven with more protections techniques, experts predict a spiraling arms race of deepfakes vs. deepfake tools.
Persons: OpenAI, Sora, Froggett, Carl Froggett, , Rupal Hollenbeck, Hollenbeck, Chris Pierson, Pierson, Nirupam Roy, it's, Roy, Eyal Benishti, Benishti, It's Organizations: Industry, University of Maryland Locations: Hong Kong
The Summer Olympics and tensions over the war in Ukraine are likely to make Paris a tempting target for a variety of hacking attempts, including from adversarial countries, France’s top cybersecurity official said on Monday. French officials, including Mr. Strubel, are in Washington this week for consultations with cybersecurity officials. The Paris Olympics will run from July 26 to Aug. 11. The opening ceremony of the 2018 Olympics in Pyeongchang, South Korea, was marred by a cyberattack that caused internet disruptions. Security companies quickly blamed Russia, and the Fancy Bear hacking group tied to Moscow’s intelligence services, for that attack.
Persons: Vincent Strubel, France’s, ransomware, Strubel Locations: Ukraine, Washington, Pyeongchang, South Korea, Russia
State actors have since made routine attacks in various countries to manipulate the outcome of elections, according to cyber experts. "Right now, generative AI can be used for harm or for good and so we see both applications every day increasingly adopted," Meyers told CNBC. "This democratic process is extremely fragile," Meyers told CNBC. "You can train those voice AI models very easily ... through exposure to social [media]," Holmes told CNBC in an interview. It's just one example of many deepfakes that have cybersecurity experts worried about what's to come as the U.K. approaches elections later this year.
Persons: Andrew Brookes, Rishi Sunak, Todd McKinnon, Okta's McKinnon, We're, Adam Meyers, CrowdStrike, Meyers, Dan Holmes, Holmes, Keir Starmer, what's Organizations: Getty, Britain, CNBC, British, U.S, APT, New Zealand, Labour Party, Local, Facebook, Meta, Google Locations: Russian, Moscow, London, Wuhan, U.S, Australia, New, China, cybersecurity, Russia, Iran
Iran may now be compelled to respond despite its unwillingness to enter war with Israel and the United States. And it has increased such attacks since October 7, when Iran-backed Hamas attacked Israel, killing 1,200 people and kidnapping 250, prompting a devastating Israeli war in Gaza. “That would mean that the Israeli attack on Iran has put a target on the backs of American troops in the Middle East,” he said. Washington has, however, tried to distance itself from Monday’s Israeli attack. Attack Israeli interests abroadAfter past attacks on Iran, Israel has often anticipated Iranian retaliation on its interests in foreign countries, and beefed up security at its embassies.
Persons: Donald Trump, Qassem, Israel hasn’t, , Daniel Hagari, Hossein Amir, Abdollahian, ” Amir, Israel, CNN’s Paula Newton, Parsi, Biden, Israel Iran’s, Houthis, Sanam Vakil, Jalal Rashidi, Vakil, Omar Sanadiki, ” Vali Nasr, , Farzan Organizations: CNN, Seven, Revolutionary Guards, Israel Defense Forces, Iran’s, Quincy Institute, Responsible, Islamic, US National Security, Israel, Hezbollah, Chatham House, State Department, Chatham, ” stoke, UN, Global Governance Locations: Iranian, Damascus, Baghdad, Iran, Israel, United States, Syria, Gaza, Quds, Swiss, Tehran, Washington ,, Iraq, Jordan, Washington, Islamic Republic, Lebanon, Iraqi, East, North Africa, London, Argentina, India, Georgia, Thailand, Jalal Rashidi Kochi, Azerbaijan, , Chatham House, , Switzerland
The recent cyberattack on the billing and payment colossus Change Healthcare revealed just how serious the vulnerabilities are throughout the U.S. health care system, and alerted industry leaders and policymakers to the urgent need for better digital security. Hospitals, health insurers, physician clinics and others in the industry have increasingly been the targets of significant hacks, culminating in the assault on Change, a unit of the giant UnitedHealth Group, on Feb. 21. The ransomware attack on the nation’s largest clearinghouse, which handles a third of all patient records, had widespread effects. Fixes and workarounds have alleviated some distress, but providers are still unable to collect billions of dollars in payments. Even now, very little information about the exact nature and scope of the attack has been disclosed.
Persons: UnitedHealth Organizations: Healthcare, UnitedHealth Locations: U.S
Hong Kong CNN —New Zealand has joined the United States and the United Kingdom in accusing China of launching “malicious” cyberattacks through state-backed hackers, as Beijing comes under growing scrutiny in a big election year for democracies around the world. The Chinese embassy in London dismissed the claims as “completely unfounded” and “malicious slander,” calling the sanctions “outright political manipulation.”“China is a major victim of cyberattacks. We have firmly fought and stopped all kinds of malicious cyber activities in accordance with the law, and have never encouraged, supported or condoned cyberattacks,” the embassy said, reiterating Beijing’s long-held stance on the matter. Australia and the European Union has also expressed solidarity with the UK and voiced concerns over China’s alleged malicious cyber activities. Without naming China, the EU said it would continue to monitor and address malicious cyber activities and stand ready to take further action when necessary.
Persons: Judith Collins, , Zealand’s, ” Collins, Wang Xiaolong, Winston Peters, ” Peters, Penny Wong, Clare O’Neil Organizations: Hong Kong CNN —, United, New, UK, Parliamentary, Office, Parliamentary Service, New Zealand, Wellington, European Union, Australia’s Foreign, Home Affairs, Inter, Parliamentary Alliance Locations: Hong Kong, Zealand, United States, United Kingdom, China, Beijing, New Zealand, London, PRC, Australia, EU, Canada
New Zealand has accused China of "malicious cyber activity" linked to Chinese state actors, who targeted its parliament in 2021. The government "expressed concerns today about malicious cyber activity, attributed to groups sponsored by the Chinese Government," New Zealand's Foreign Minister Winston Peters said on Tuesday. New Zealand's intelligence service, the National Cyber Security Centre (NCSC), "completed a robust technical assessment following a compromise of the Parliamentary Counsel Office and the Parliamentary Service in 2021," Collins said. The activity has been attributed to a Chinese state-sponsored group, she added. The Chinese embassy in New Zealand did not immediately respond to a request for comment.
Persons: Winston Peters, " Peters, Judith Collins, Collins Organizations: Government, Zealand's, National Cyber Security, Parliamentary, Office, Parliamentary Service Locations: Zealand, China, U.S, New, New Zealand
The British government is expected to publicly link China to cyberattacks that compromised the voting records of tens of millions of people, another notable hardening of Britain’s stance toward China since its leaders heralded a “golden era” in British-Chinese relations nearly a decade ago. The deputy prime minister, Oliver Dowden, will make a statement about the matter in Parliament on Monday afternoon, and is expected to announce sanctions against state-affiliated individuals and entities implicated in the attacks. The government disclosed the attack on the Electoral Commission last year but did not identify those behind it. It is believed to have begun in 2021 and lasted several months, with the personal details of 40 million voters being hacked. The Electoral Commission, which oversees elections in the United Kingdom, said that the names and addresses of anyone registered to vote in Britain and Northern Ireland between 2014 and 2022 had been accessed, as well as those of overseas voters.
Persons: Oliver Dowden Organizations: Electoral Commission Locations: China, United Kingdom, Britain, Northern Ireland
The Biden administration is preparing to publicly accuse several Chinese hackers of conducting sweeping hacks against US companies on behalf of China’s civilian intelligence service, three people familiar with the matter told CNN. An announcement identifying the hackers with names and photos is expected as soon as Monday, the sources said. The hackers have been using a Chinese technology company as a front to cover their hacking activity, one of the sources said. The British government is also preparing to accuse the hacking group of targeting UK organizations, the sources said. The cybersecurity industry knows the hacking group as APT31 or Judgement Panda, and researchers have found the hackers targeting everything from US law firms to European industrial organizations to international apparel companies.
Persons: Biden, Christopher Wray, Xi Jinping, Joe Biden, Wray Organizations: CNN, of State Security, Embassy, The, Microsoft Locations: Washington ,, China, Beijing, Wuhan, Tibet, Hong Kong
Total: 25