Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Infrastructure Security"


25 mentions found


WASHINGTON (AP) — The nation’s cybersecurity agency has launched a program aimed at boosting election security in the states, shoring up support for local offices and hoping to provide reassurance to voters that this year's presidential elections will be safe and accurate. Officials with the U.S. Cybersecurity and Infrastructure Security Agency planned to introduce its new election security adviser program Thursday to the National Association of State Election Directors and on Friday to the National Association of Secretaries of State. For state and local election officials, the list of security challenges keeps growing. The CISA program includes 10 new hires, all of whom join the federal agency with extensive election experience. CISA Director Jen Easterly announced plans for the program at a July meeting of the state election directors in South Carolina.
Persons: Jen, Cait Conley, ” Conley, Keith Ingram, Spencer Wood, David Stafford, , , Lori Augino, CISA, Al Schmidt, Karen Brinson Bell, Brinson Bell Organizations: WASHINGTON, U.S, Cybersecurity, Infrastructure Security Agency, National Association of State, National Association of, State, Ohio, State’s, North Carolina State Board Locations: New Hampshire, Fulton County , Georgia, Russia, South Carolina, Texas, Escambia County , Florida, Washington, ,
The report would be the most detailed disclosure yet by the US government of the hackers’ stealthy techniques, one aimed at helping private owners of critical infrastructure spot the Chinese hackers in their networks. The hackers’ presence in critical US networks has sparked a monthslong effort by US national security officials to kick the hackers out. The report, which US officials are set to release this week, makes clear that the Chinese hackers’ activity began much earlier than previously known, with the hackers scoping and accessing IT systems years ago. The Beijing-backed hackers have been probing systems that control heating, cooling and water, access that, if exploited, could allow them to manipulate those systems and cause “significant infrastructure failures,” the report says. Canada’s cybersecurity agency “assesses that the direct threat to Canada’s critical infrastructure” from the Chinese hackers “is likely lower” than that to US infrastructure, but that Canada would still likely still be affected by a disruption to US infrastructure due to “cross-border integration,” the document says.
Persons: Christopher Wray, Canada’s, Organizations: CNN, FBI, US, Embassy, National Security Agency, Cybersecurity, Infrastructure Security Agency Locations: Beijing, China, Taiwan, Washington ,, Guam, Australia, Canada, New Zealand, United Kingdom, Pacific
Share Share Article via Facebook Share Article via Twitter Share Article via LinkedIn Share Article via EmailCompanies need to understand that cyber risk is business risk, says fmr. CISA director Chris KrebsChris Krebs, SentinelOne chief public policy officer and former Cybersecurity and Infrastructure Security Agency director, joins 'Squawk Box' to discuss the growing threat of Chinese cyberattacks, how the U.S. can respond, and more.
Persons: Chris Krebs Chris Krebs, SentinelOne Organizations: Companies, Infrastructure Security Agency Locations: U.S
CNN —FBI Director Christopher Wray on Wednesday warned that Chinese hackers are preparing to “wreak havoc and cause real-world harm” to the US. Chinese government-backed hackers, Wray said, are targeting things like water treatment plants, electrical infrastructure and oil and natural gas pipelines, Wray said. The Chinese hackers are working “to find and prepare to destroy or degrade the civilian critical infrastructure that keeps us safe and prosperous,” Wray said. The hearing comes in the wake of a big push by US and Chinese officials to ease tensions in the relationship between the two superpowers. We have made it easy on them,” Jen Easterly, who leads the US Cybersecurity and Infrastructure Security Agency, told lawmakers.
Persons: Christopher Wray, , ” Wray, Wray, Xi Jinping, Joe Biden, Xi, “ China’s, Jen, Paul Nakasone, ” Nakasone, CNN’s Evan Perez Organizations: CNN, Chinese Communist Party, National Security Agency, Infrastructure Security Agency, FBI, Justice Department Locations: China, Taiwan, America
The Justice Department and FBI identified the attacks and shut down aspects of the Volt Typhoon malware, Wray said. Microsoft in May warned that Volt Typhoon hackers had been active since 2021 and were targeting U.S. cyber infrastructure. The hacks have become increasingly sophisticated, Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, said at the hearing. She explained that Chinese hackers are able to "live within a computer's operating system" in a way that makes them difficult to identify. In July, Chinese hackers also compromised the email accounts of the U.S. ambassador to China and other officials.
Persons: Christopher Wray, Wray, they're, that's, Shou Zi Chew Organizations: FBI, Justice Department, Microsoft, Infrastructure Security Agency, Communist Party, NBC News, British Locations: China, U.S, London, Taiwan
In a meeting this past weekend in Bangkok with Chinese Foreign Minister Wang Yi, US national security adviser Jake Sullivan again brought up the topic. Wang offered Sullivan the same assurance Xi had given Biden months prior — that Beijing would not meddle in the American election this fall, the source said. The White House National Security Council declined to comment on whether election interference came up in the Biden-Xi and Sullivan-Wang meetings. CNN has reached out to the Chinese Foreign Ministry for comment. Last week, a senior National Security Agency official told reporters that the agency had not yet seen signs of any notable new foreign influence operations aimed at the 2024 election.
Persons: Xi Jinping, Joe Biden, Xi, Biden, Wang Yi, Jake Sullivan, Wang, Sullivan, Hillary Clinton’s, , , Chris Krebs, ” Krebs, Brendan Smialowski, Antony Blinken, CNN’s Natasha Bertrand Organizations: CNN, Chinese Foreign, Democratic National Committee, FBI, Justice Department, White House National Security, Biden, Chinese Foreign Ministry, Microsoft, of, National Security Agency, US, Infrastructure Security, Economic Cooperation, APEC, Getty Locations: China, California, Bangkok, Beijing, Taiwan, Russia, Iran, Asia, Woodside , California, AFP, Washington, Chinese
The U.S. Securities and Exchange Commission said on Monday that a SIM swap attack was to blame for the breach of its official account on X (formerly Twitter) earlier this month. With access to the phone number, the unidentified individual then reset the account password. "While multi-factor authentication (MFA) had previously been enabled on the @SECGov X account, it was disabled by X Support, at the staff's request, in July 2023 due to issues accessing the account," the SEC said in the statement. The agency had the ability to switch two-factor authentication back on for their X account and were not reliant on X to do so. X owner and CTO Elon Musk mocked the SEC, an agency he has clashed with for years, after the agency's account on X was breached.
Persons: Elon Musk, Department of Homeland Security's, — CNBC's Lora Kolodny Organizations: U.S . Securities, Exchange, SIM, SEC, X, Twitter, SEC's, Federal Bureau of Investigation, Department of Homeland, Infrastructure Security Agency, Futures Trading Commission, Department of Justice, Enforcement
Microsoft said in a Friday regulatory filing that a Russian intelligence group accessed some of the software maker's top executives' email accounts. The company said a group called Nobelium carried out the attack, which it detected last week. Microsoft and the U.S. government consider Nobelium to be a part of the Russian foreign intelligence service SVR. The hacking group was responsible for one of the most prolific breaches in U.S. history, when it breached government supplier SolarWinds in 2020. It was also implicated alongside another Russian hacking group in the 2016 breach of the Democratic National Committee's systems.
Persons: Amy Hood, Brad Smith, Satya Nadella, Nobelium Organizations: Microsoft, Infrastructure Security Agency, U.S, SolarWinds, Department of Defense, Democratic National Locations: Russian, U.S
CNN —A Russian hacking group gained access to some email accounts of Microsoft senior leaders, the software giant disclosed in a regulatory filing Friday afternoon. “Microsoft has identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as Nobelium.”Nobelium, notably, is the same group responsible for the infamous SolarWinds breach back in 2020. Microsoft said it is in the process of notifying employees whose email was accessed. There is currently no evidence that the hackers had any access to customer environments or AI systems, Microsoft said. Microsoft systems have been the target of multiple recent high-profile hacking efforts.
Persons: ” Nobelium, SolarWinds, Organizations: CNN, Microsoft, Midnight Blizzard, Hackers, Midnight, Federal Bureau of Investigation, Infrastructure Security Agency Locations: Russian
Washington CNN —Chinese-made drones “continue to pose a significant risk to critical infrastructure and US national security” and companies should be wary of using them, the FBI and Cybersecurity and Infrastructure Security Agency warned in a new memo issued Wednesday. “Our nation’s critical infrastructure sectors, such as energy, chemical and communications, are increasingly relying on [unmanned aerial systems] for various missions that ultimately reduce operating costs and improve staff safety,” said CISA Executive Assistant Director for Infrastructure Security Dr. David Mussington in a statement. The Department of Homeland Security has been warning about the risks posed by Chinese-made drones, which dominate the global market for commercial drones, for years. “CISA and the FBI rightly point out the risk, and more importantly, how to mitigate these known cyber risks. It’s clear that the United States government has deemed Chinese-made drones a threat to security as China’s dominance of the electronics supply chain, including drones, is harming U.S. national security interests.”
Persons: , David Mussington, DJI, Brian Harrell, we’ve, “ CISA Organizations: Washington CNN, FBI, Infrastructure Security Agency, CNN, Infrastructure Security, PRC’s, Civil Fusion, Department of Homeland Security, DHS, US Army, U.S Locations: China, People’s Republic of China, United States, Canada, DJI
Share Share Article via Facebook Share Article via Twitter Share Article via LinkedIn Share Article via EmailFmr. CISA Director Chris Krebs explains the potential AI risks on financial systemsChris Krebs, PinnacleOne president and former Cybersecurity and Infrastructure Security Agency director, joins 'Squawk Box' to discuss the the potential risks of AI on financial systems, after the Treasury Department's Financial Stability Oversight Council flagged the use of AI in financial services as a system vulnerability, what it means for financial organizations going forward, and more.
Persons: Chris Krebs, PinnacleOne Organizations: Infrastructure Security Agency, Treasury
CrowdStrike CEO George Kurtz has had a banner year. The new regulations will likely offer upside for CrowdStrike, Kurtz said. For every dollar companies paid CrowdStrike to respond to hacks, CrowdStrike collected roughly $6 on average in new subscription revenue, Kurtz said. "It's not something we can answer" for companies, Kurtz said. While incident response is good business for CrowdStrike, Kurtz emphasized that CrowdStrike's main focus is "to help customers prevent these sorts of attacks upfront and provide visibility."
Persons: George Kurtz, It's, Kurtz, CrowdStrike, it's, Jen Organizations: Crowdstrike Holdings Inc, Bloomberg Technology, RSA Conference, CNBC, Securities and Exchange, SEC, Caesars Entertainment, MGM Resorts, Caesars, MGM, CrowdStrike, Infrastructure Security Agency Locations: San Francisco , California
What if You Get Hacked?
  + stars: | 2023-12-04 | by ( Eamon Javers | ) www.cnbc.com   time to read: 1 min
Let's face it: You are going to get hacked. The question is, how good are your company's cyber defenses? Good enough to minimize business interruption and potential harm to your employees, customers, and shareholders? We'll get actionable advice and best practices for large firms in a discussion with the head of the U.S. Cybersecurity and Infrastructure Security Agency (CISA).
Organizations: Cybersecurity, Infrastructure Security Agency
HARRISBURG, Pa. (AP) — A small western Pennsylvania water authority was just one of multiple organizations breached in the United States by Iran-affiliated hackers who targeted a specific industrial control device because it is Israeli-made, U.S. and Israeli authorities say. The group targeted the Unitronics devices at least since Nov. 22, it said. The advisory notes that Unitronics devices ship with a default password, a practice experts discourage as it makes them more vulnerable to hacking. It says the hackers likely accessed affected devices by “exploiting cybersecurity weaknesses, including poor password security and exposure to the internet.”Experts say many water utilities have paid insufficient attention to cybersecurity. Americans must know their drinking water and other basic infrastructure is safe from “nation-state adversaries and terrorist organizations,” U.S. Sens.
Persons: Matthew Mottes, CISA, Unitronics —, John Fetterman, Bob Casey, Chris Deluzio, Av3ngers, Sergey Shykevich, Unitronics, Biden Organizations: FBI, Environmental Protection Agency, Infrastructure Security Agency, Directorate, Associated Press, Municipal Water Authority, Islamic Revolutionary Guards Corps, , U.S . Justice Department, U.S . Rep Locations: HARRISBURG, Pa, Pennsylvania, United States, Iran, Israeli, Aliquippa, Israel, Gaza, U.S, Sens, Missouri , Arkansas, Iowa
Share Share Article via Facebook Share Article via Twitter Share Article via LinkedIn Share Article via EmailThe motivations of our adversaries are 'completely different' than they were in 2020: Chris KrebsChris Krebs, PinnacleOne president and former Cybersecurity and Infrastructure Security Agency director, joins 'Squawk Box' to discuss the foreign threat landscape ahead of the 2024 presidential elections, how social media platforms are responding, the underlying theme behind online misinformation, and more.
Persons: Chris Krebs Chris Krebs, PinnacleOne Organizations: Infrastructure Security Agency
The Aliquippa water authority's chairman, Matthew Mottes, said federal officials told him that hackers also breached four other utilities and an aquarium. The device breached in Pennsylvania was made by Israel-based Unitronics, according to the U.S. Cybersecurity and Infrastructure Security Agency. Known as a programmable logic controller, it is used across a wide spectrum of industries including water and sewage-treatment utilities, electric companies and oil and gas producers. Experts say many water utilities have paid insufficient attention to cybersecurity. In Pennsylvania, the hack prompted the water authority to temporarily halt pumping Saturday in a remote station that regulates water pressure for customers in two nearby towns.
Persons: John Fetterman, Bob Casey, Chris Deluzio, , ” Fetterman, Casey, Deluzio, General Merrick Garland, , , Israel ’, Matthew Mottes, We’ve, that’s, ” Mottes, Sergey Shykevich, Unitronics, Crews, Biden Organizations: U.S . Justice Department, U.S . Rep, Municipal Water Authority, Twitter, U.S, Cybersecurity, Infrastructure Security Agency, Environmental Protection Agency Locations: HARRISBURG, Pa, Pittsburgh, Sens, Pennsylvania, United States, Israel, Aliquippa , Pennsylvania, Iran, hacktivism, Gaza, U.S, Missouri , Arkansas, Iowa
Trump’s defense team is asking for information from several past government investigations, including around the election results and about the recent classified documents probe into his former Vice President Mike Pence. Multiple investigations have found no evidence of widespread voter fraud in the 2020 election. The Pence investigation ended with no criminal charges in June. Pence testified to a federal grand jury in the 2020 election investigation in the spring. Pence’s confidential testimony in the Trump 2020 election case, some of his aides testified, was under oath before a federal grand jury, and a judge decided he must answer questions under subpoena.
Persons: Donald Trump’s, Mike Pence, Trump, , , Biden Administration’s, ’ ‘, , ‘ Department of Homeland Security’s, ’ ” It’s, Pence Organizations: CNN, Trump, , , White House Attorneys, Justice Department, Intelligence, ‘ Department of Homeland, Infrastructure Security Agency Locations: Russia
AI threat demands new approach to security designs -US official
  + stars: | 2023-11-27 | by ( ) www.reuters.com   time to read: +2 min
AI (Artificial Intelligence) letters are placed on computer motherboard in this illustration taken, June 23, 2023. REUTERS/Dado Ruvic/Illustration/File Photo Acquire Licensing RightsOTTAWA, Nov 27 (Reuters) - The potential threat posed by the rapid development of artificial intelligence (AI) means safeguards need to be built in to systems from the start rather than tacked on later, a top U.S. official said on Monday. "We've normalized a world where technology products come off the line full of vulnerabilities and then consumers are expected to patch those vulnerabilities. We can't live in that world with AI," said Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency. "We have to look at security throughout the lifecycle of that AI capability," Khoury said.
Persons: Dado Ruvic, Jen, Sami Khoury, Khoury, David Ljunggren, Matthew Lewis Organizations: REUTERS, Rights OTTAWA, U.S, Cybersecurity, Infrastructure Security Agency, Canada's, Cyber Security, Thomson Locations: Ottawa, United States, British
AI (Artificial Intelligence) letters are placed on computer motherboard in this illustration taken, June 23, 2023. The agreement is non-binding and carries mostly general recommendations such as monitoring AI systems for abuse, protecting data from tampering and vetting software suppliers. In addition to the United States and Britain, the 18 countries that signed on to the new guidelines include Germany, Italy, the Czech Republic, Estonia, Poland, Australia, Chile, Israel, Nigeria and Singapore. It does not tackle thorny questions around the appropriate uses of AI, or how the data that feeds these models is gathered. Europe is ahead of the United States on regulations around AI, with lawmakers there drafting AI rules.
Persons: Dado Ruvic, Biden, Raphael Satter, Diane Bartz, Alexandra Alper, Deepa Babington Organizations: REUTERS, Rights, Sunday, Cybersecurity, Infrastructure Security Agency, Congress, White, Thomson Locations: United States, Britain, U.S, Germany, Italy, Czech Republic, Estonia, Poland, Australia, Chile, Israel, Nigeria, Singapore, Europe, France
CNN —A network of hospitals in East Texas has not been able to accept ambulances to emergency rooms since Thanksgiving Day because of a “potential [cyber]security incident,” a hospital spokesperson told CNN on Friday. The hospital network, UT Health East Texas, is operating using “established downtime procedures” as the hospital investigates “a potential security incident” and works to bring computers back online, spokesperson Allison Pollan said in an email. Headquartered in Tyler, Texas, UT Health East Texas operates 10 hospitals and more than 90 clinics in the region, and provides health care to thousands of patients annually, according to its LinkedIn page. The East Texas health care system is just the latest hospital group that has been forced to turn ambulances away because of an apparent cybersecurity incident. The cyber incident at UT Health East Texas began on Thursday when the hospital network “became aware of a network outage” and moved to lock down its network, according to the hospital network’s statement to CNN.
Persons: , , Allison Pollan, Pollan, , CISA, Allan Liska Organizations: CNN, UT Health East, UT Health East Texas, Department of Health, Human Services, Infrastructure Security Agency, FBI, Federal, cyberattacks Locations: East Texas, UT Health East Texas, Tyler , Texas, Connecticut , Florida , Idaho, Pennsylvania
REUTERS/Bridget Bennett/File Photo Acquire Licensing RightsSAN FRANCISCO, Nov 16 (Reuters) - The FBI warned organizations to guard against the Scattered Spider hacking group, which has breached dozens of American organizations over the past year, stealing their sensitive data for extortion. The statement, issued jointly with the U.S. Cybersecurity and Infrastructure Security Agency, sheds new light into how these hackers operate. The FBI and CISA urged critical infrastructure organisations to implement a series of security measures they recommended and urged victim organisations to share information about the hacks with the agencies. Everything from a sample ransom note, communications with the hackers, their cryptocurrency wallet information, or samples of malicious files could be useful, they said. "FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered," they said, adding that ransom payments may embolden the hackers into going after more targets.
Persons: Bridget Bennett, they've, Slack, CISA, Zeba Siddiqui, Nick Zieminski Organizations: MGM, MGM Resorts, REUTERS, FRANCISCO, FBI, MGM Resorts International, Caesars Entertainment, U.S, Cybersecurity, Infrastructure Security Agency, Microsoft, Microsoft Exchange, Thomson Locations: Las Vegas , Nevada, U.S, San Francisco
A Boeing logo is seen at the 54th International Paris Airshow at Le Bourget Airport near Paris, France, June 18, 2023. REUTERS/Benoit Tessier Acquire Licensing RightsCompanies Boeing Co FollowLONDON, Nov 10 (Reuters) - Internal data from Boeing (BA.N), one of the world's largest defence and space contractors, was published online on Friday by Lockbit, a cybercrime gang which extorts its victims by stealing and releasing data unless a ransom is paid. According to a post on Lockbit's website, the data from Boeing was published in the early hours of Friday morning. “We are aware that, in connection with this incident, a criminal ransomware actor has released information it alleges to have taken from our systems," Boeing said. The company said it "remains confident" the event does not pose a threat to aircraft or flight safety, but declined to comment on whether defense or other sensitive data had been obtained by Lockbit.
Persons: Benoit Tessier, Lockbit, Lockbit ransomware, James Pearson, Tim Hepher, Valerie Insinna, Kirsten Donovan, David Evans, Emelia Organizations: Boeing, Paris, REUTERS, Rights, Reuters, Lockbit, Cybersecurity, Infrastructure Security Agency, Industrial, Commercial Bank of China's, U.S . Treasury, Thomson Locations: Le Bourget, Paris, France, United States, India, Brazil, U.S, Washington
It led to a flurry of behind-the-scenes coordination with the affected bank and across the financial sector about the threat. The hackers hit New York-based ICBC Financial Services, a subsidiary of the world’s largest bank by assets and a Chinese state-owned institution. ICBC Financial Services did not respond to CNN’s request for comment on Friday. “If China sees this as a black eye, they may demand action from the Russian government,” Liska told CNN. LockBit ransomware was the most deployed ransomware around the world in 2022, according to US cybersecurity officials.
Persons: , , ” Jon Miller, Halcyon, BNY Mellon, LockBit, Allan Liska, ” Liska, JPMorgan Chase, LockBit ransomware, ” Will Thomas Organizations: CNN, Commercial Bank of, Intelligence, Financial Services, Treasury, ICBC Financial, Reuters, JPMorgan, FBI, Infrastructure Security Agency, Treasury Department Locations: Commercial Bank of China, US, York, China, Russia, United States, Iran, cybersecurity
[1/2] People walk past a booth of ICBC Credit Suisse Asset Management Co at the 2020 China International Fair for Trade in Services (CIFTIS), in Beijing, China September 5, 2020. China's foreign ministry spokesperson Wang Wenbin said that business remained normal at ICBC head office, other branches and subsidiaries across the globe. Some market participants said trades going through ICBC were not settled due to the incident and that market liquidity had been affected. ICBC said it had successfully cleared Treasury trades executed on Wednesday and repurchase agreements (repo) financing trades done on Thursday. While market sources said on Thursday the impact of the ICBC hack appeared limited, the attack underlined how vulnerable systems at large organizations continue to be.
Persons: Tingshu Wang, ICBC, Wang Wenbin, Wang, Jerome Powell, Lockbit, Harry Robertson, Yoruk, Dhara Ranasinghe, Alexander Smith Organizations: Asset Management, Fair for Trade, Services, REUTERS, Industrial, Commercial Bank of China, Global, ICBC's, Authority, Traders, U.S . Treasury, Federal, Treasury, Cybersecurity, Infrastructure Security Agency, Thomson Locations: Beijing, China, China's, ICBC's U.S, Europe, Hong Kong, Shanghai, London, Amsterdam
A once-robust alliance of federal agencies, tech companies, election officials and researchers that worked together to thwart foreign propaganda and disinformation has fragmented after years of sustained Republican attacks. The most recent setback came when the FBI put an indefinite hold on most briefings to social media companies about Russian, Iranian and Chinese influence campaigns. "We're having some interaction with social media companies," Wray said. "The symbiotic relationship between the government and the social media companies has definitely been fractured." Tech companies are still sharing their findings with each other, a Meta spokesperson told NBC News.
Persons: Christopher Wray, Wray, Sen, Mitt Romney, they're, Mark Warner, Warner, Hillary Clinton's, Barack, CISA, Joe Biden, Donald Trump, Hunter, Mark Zuckerburg, Hunter Biden, didn't, Biden, Nina Jankowicz, Jankowicz, Jen, Jim Jordan, Kara Swisher, we're, Elon Musk, wasn't Organizations: U.S, Capitol, Washington , D.C, GOP, FBI, Force, NBC News, Senate Homeland Security Committee, Justice Department, Committee, Republican, Infrastructure Security Agency, Department of Homeland Security, Microsoft, Senate Intelligence, Kremlin, Internet Research Agency, Facebook, Twitter, National Security Agency, Democrats, New, Digital, Republicans, Homeland Security, Wired, Rep, Tech Locations: Washington ,, Silicon Valley, R, Utah, Russia, Iran, China, U.S, Illinois, CISA, New York, Missouri, Louisiana, Ohio, Israel
Total: 25