As the threat of cyberattacks on the United States launched by foreign adversaries grows, the federal government has been slow to respond. But changes announced Tuesday at the Department of Homeland Security, along with a new bipartisan bill aimed at shoring up DHS cybersecurity initiatives, could give newfound purpose to defenses against critical
CS Digest Section: Critical Infrastructure
Security analysts have discovered a new hacking group that has been successful in breaching networks of electric utilities in the United States.
The U.S. government, realizing that a cyberattack on energy utilities would have major repercussions for businesses and citizens alike, this November will test the ability of the nation's power grid to bounce back from a simultaneous cyberattack on electric, oil and natural gas infrastructure.
Hackers working for Russia were able to gain access to the control rooms of US electric utilities last year, allowing them to cause blackouts, federal officials tell the Wall Street Journal.
A new tool will enable grid operators to better detect not only a brutal physical attack, but also a hacker probing for vulnerabilities.
Baltimore's 911 dispatch system was hacked by an unknown actor or actors over the weekend, prompting a temporary shutdown of automated dispatching and an investigation into the breach, Mayor Catherine Pugh's office confirmed Tuesday.
The City of Atlanta's 8,000 employees got the word on Tuesday that they had been waiting for: It was O.K. to turn their computers on. But as the city government's desktops, hard drives and printers flickered back to life for the first time in five days, residents still could not pay their traffic tickets or water bills online, or report potholes or graffiti
The Trump administration accused Russia on Thursday of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.
Schneider Electric said on Thursday that hackers had exploited a flaw in its technology in a watershed incident discovered last month that halted operations at an undisclosed industrial facility.
The attack vector for Triton, the nation state-sponsored malware that attacked industrial sites in the Middle East in December 2017, has been revealed by the hardware manufacturer whose equipment was the target.