#infrastructure-sabotage

[ follow ]
Information security
fromSecurityWeek
8 hours ago

'By Design' Flaw in MCP Could Enable Widespread AI Supply Chain Attacks

MCP's architectural flaw allows adversarial takeover of user systems, exposing sensitive data and enabling malware installation.
#cybersecurity
fromTechCrunch
7 hours ago
Russo-Ukrainian War

Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch

Privacy professionals
fromFortune
5 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Information security
fromThe Cipher Brief
3 hours ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Russo-Ukrainian War
fromTechCrunch
7 hours ago

Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch

Russian-linked hackers attempted to disrupt a Swedish thermal power plant, highlighting increasing risks of hybrid attacks beyond cyberspace.
Europe politics
fromwww.thelocal.se
12 hours ago

Pro-Russian group attempted to attack Swedish heating plant

A pro-Russian activist group attempted a destructive attack on a heating facility in Sweden, highlighting a shift in Russia's tactics against critical infrastructure.
Silicon Valley
fromWIRED
2 days ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
5 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Privacy professionals
fromFortune
5 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Information security
fromThe Cipher Brief
3 hours ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
#cyberattack
Europe news
fromSecurityWeek
4 hours ago

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

A pro-Russian group linked to Russian intelligence was behind a failed cyberattack on a Swedish heating plant, part of broader attacks on European infrastructure.
East Bay (California)
fromSFGATE
2 weeks ago

Bay Area city remains paralyzed week after cyberattack

Foster City is experiencing a significant disruption due to a ransomware cyberattack, affecting communication and services for over a week.
SF politics
fromSFGATE
3 weeks ago

Bay Area city government without working phones, email after cyberattack

Foster City is experiencing significant disruptions to services due to a cyberattack, with email and phone systems still down after six days.
Privacy professionals
fromSFGATE
3 weeks ago

Bay Area city paralyzed by cyberattack

A ransomware attack has paralyzed Foster City's government and potentially compromised public data, prompting officials to declare a state of emergency.
Information security
fromMail Online
1 month ago

Iran-linked attack on US 'first drop of blood' as new threat grows

Iran-linked hackers attacked Stryker, signaling potential broader cyberattacks on Western organizations and US infrastructure including data centers, banking systems, and energy facilities.
Information security
fromSecurityWeek
2 months ago

Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Russia-linked hackers breached ICS at roughly 30 Polish energy sites, damaging some devices and targeting monitoring systems without causing power outages.
Europe news
fromSecurityWeek
4 hours ago

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

A pro-Russian group linked to Russian intelligence was behind a failed cyberattack on a Swedish heating plant, part of broader attacks on European infrastructure.
East Bay (California)
fromSFGATE
2 weeks ago

Bay Area city remains paralyzed week after cyberattack

Foster City is experiencing a significant disruption due to a ransomware cyberattack, affecting communication and services for over a week.
SF politics
fromSFGATE
3 weeks ago

Bay Area city government without working phones, email after cyberattack

Foster City is experiencing significant disruptions to services due to a cyberattack, with email and phone systems still down after six days.
Privacy professionals
fromSFGATE
3 weeks ago

Bay Area city paralyzed by cyberattack

A ransomware attack has paralyzed Foster City's government and potentially compromised public data, prompting officials to declare a state of emergency.
Information security
fromMail Online
1 month ago

Iran-linked attack on US 'first drop of blood' as new threat grows

Iran-linked hackers attacked Stryker, signaling potential broader cyberattacks on Western organizations and US infrastructure including data centers, banking systems, and energy facilities.
Information security
fromSecurityWeek
2 months ago

Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Russia-linked hackers breached ICS at roughly 30 Polish energy sites, damaging some devices and targeting monitoring systems without causing power outages.
fromTheregister
5 hours ago

Autovista blames ransomware for service disruption

"We know that getting this resolved quickly is important to you. Our top priority is to securely restore impacted applications, although we do not have a firm timeline on this yet."
EU data protection
UK politics
fromComputerWeekly.com
1 day ago

Flood warning: How citizens' AI agents will swamp public services | Computer Weekly

AI has the potential to transform public services by reducing user friction and improving access for citizens.
fromArchDaily
1 day ago

Mapping the Technosphere: Architecture as an Interface Between Systems and Territories

Architecture can no longer be conceived as an isolated object, detached from the technical networks that sustain contemporary life. This condition calls for new readings and approaches.
Design
fromAdirondack Almanack
2 days ago

NYSDOT announces recognition for emergency bridge projects

"This recognition is a testament to the talent, dedication, and 'can-do' spirit of the professional staff on the NYS Department of Transportation's team," Commissioner Dominguez said. "From bridge strikes in the capital region to catastrophic flooding in the Adirondacks, our team members work tirelessly to restore traffic and critical infrastructure-safely and quickly-with modern and resilient structures along these vital corridors within New York State."
Brooklyn
New York City
fromInsideHook
3 days ago

Can Self-Driving Cars Help Fix the Nation's Potholes?

Pothole repairs are gaining attention, with NYC filling 100,000 potholes and Waymo partnering with Waze to identify potholes using autonomous vehicles.
Information security
fromSecurityWeek
10 hours ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
fromPadailypost
6 days ago

Cheating brazen in new toll lanes

"Is everybody telling the truth? We're not sure," Program Director Kim Comstock told the San Mateo County Transportation Authority on Thursday.
California
UK news
fromComputerWeekly.com
6 days ago

UK Navy deters Russian submarines near critical undersea cables | Computer Weekly

The Royal Navy has deterred Russian submarines near critical undersea infrastructure, emphasizing the importance of undersea communications cables for global trade.
San Francisco
fromMission Local
2 weeks ago

Cell outage blocks San Francisco 911 calls

A cell outage may disrupt 911 calls in San Francisco, prompting residents to use Wi-Fi calling or text 911 for assistance.
#ics-security
Information security
fromSecurityWeek
14 hours ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Gadgets
fromTheregister
2 weeks ago

Engineer sabotaged PC then complained when it didn't work

Ewen faced challenges with a fiber-optic device that produced faulty data, leading to a long drive to troubleshoot the issue.
Miscellaneous
fromwww.theguardian.com
1 month ago

A massive headache': Russians move to walkie-talkies as internet blackouts hit Moscow

Moscow residents face unexplained internet disruptions as the Kremlin implements security measures, with authorities testing a whitelist system that would restrict access to only government-approved websites.
Information security
fromSecurityWeek
1 day ago

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with seven new vulnerabilities, including critical Windows and Adobe flaws.
Information security
fromTechzine Global
1 day ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Miscellaneous
fromComputerWeekly.com
1 month ago

Render Networks unveils synchronised agentic critical infrastructure architecture | Computer Weekly

Render Networks expands ClearWay platform to automate critical infrastructure deployment, reducing capital risk through real-time field verification and audit-grade accountability across complex multi-asset projects.
Information security
fromWIRED
1 week ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
US politics
fromNextgov.com
2 months ago

Tech Bills of the Week: Measures seek to boost cyber posture of utilities

Congressional bills empower the Energy Department to strengthen physical and cyber security of pipelines, LNG facilities, and smaller electric utilities with grants and coordination.
fromSecurityWeek
1 month ago

German Rail Giant Deutsche Bahn Hit by Large-Scale DDoS Attack

Deutsche Bahn, Germany's national rail operator, has been dealing with a large-scale distributed denial-of-service (DDoS) attack that has disrupted some of its IT systems. Regular status updates from Deutsche Bahn indicated that the attack began on February 17 and continued into February 18. According to the rail giant, the attack came in waves and its scale is substantial. The DDoS attack disrupted Deutsche Bahn's information and ticketing systems, including its websites and the DB Navigator app.
Germany news
fromTheregister
2 months ago

Asia-based spies hacked 37 countries' critical networks

While this group might be pursuing espionage objectives, its methods, targets and scale of operations are alarming, with potential long-term consequences for national security and key services,
World news
fromArchitectural Digest
2 months ago

Designing When Your City Is Under Siege

Life doesn't pause for grief or fear. You might be going through something devastating but you're still packing lunches, still driving your kids to baseball practice, still showing up to work. One minute I find myself prepping for a whole home presentation and the next minute I'm checking the news, hoping and praying that no one has been killed on the streets today.
Design
Information security
fromThe Hacker News
6 days ago

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
Information security
fromComputerWeekly.com
2 weeks ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromThe Cipher Brief
4 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Information security
fromTechRepublic
4 weeks ago

Industrial Systems Under Siege: 77% of OT Environments Suffer Cyber Breaches

Industrial sectors lag in cybersecurity despite modernizing operational technologies, creating critical vulnerabilities in manufacturing, utilities, and energy infrastructure.
fromNextgov.com
1 month ago

Stryker hack could set stage for more pro-Iran cyber sabotage

The reported wiper attack ... may represent a similar dynamic, an early signal of activity that could expand beyond a single target. Organizations need to assume that attackers will gain a foothold and focus on proactively shutting down the attack paths adversaries rely on to escalate privileges, move laterally and expand their impact.
Information security
Information security
fromSecurityWeek
1 month ago

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric

Industrial control system manufacturers Siemens, Schneider Electric, Mitsubishi Electric, and Moxa released multiple security advisories addressing critical and high-severity vulnerabilities in their ICS products.
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Information security
fromSecurityWeek
1 month ago

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Trump administration releases comprehensive cyber strategy emphasizing government-private sector coordination, deterrence, regulatory reform, and investment in AI and quantum technologies to strengthen national cybersecurity.
#cyberattacks
Information security
fromSecuritymagazine
1 month ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromSecuritymagazine
1 month ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
#cyberwarfare
Information security
fromComputerworld
2 months ago

AI will likely shut down critical infrastructure on its own, no attackers required

Misconfigured AI controlling cyber-physical systems can unintentionally shut down national critical infrastructure in a G20 country by 2028.
Information security
fromSecuritymagazine
2 months ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
Information security
fromArs Technica
6 years ago

New clues show how Russia's grid hackers aimed for physical destruction

Russian hackers aimed to cause lasting physical destruction to Ukrainian power-grid equipment by using malware designed to damage hardware during recovery, not a brief outage.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
fromThe Hacker News
2 months ago

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

The findings are based on several years of deploying OMICRON's intrusion detection system (IDS) StationGuard in protection, automation, and control (PAC) systems. The technology, which monitors network traffic passively, has provided deep visibility into real-world OT environments. The results underscore the growing attack surface in energy systems and the challenges operators face in securing aging infrastructure and complex network architectures.
Information security
Information security
fromSecurityWeek
2 months ago

ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid

A cyberattack believed to be Russian targeted Poland's distributed energy resources, compromising RTUs and communication systems across about 30 sites and causing permanent ICS damage.
Information security
fromTechzine Global
1 month ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
Information security
fromSecurityWeek
1 month ago

3 Threat Groups Started Targeting ICS/OT in 2025: Dragos

Three new threat groups—Sylvanite, Azurite, and Pyroxene—began targeting ICS and OT in 2025, expanding threats to critical infrastructure globally.
Information security
fromThe Hacker News
1 month ago

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
Information security
fromTheregister
2 months ago

Vulnerability exploits now dominate intrusions

Exploit of disclosed vulnerabilities now causes most intrusions, with attackers weaponizing new flaws within hours while many organizations patch slowly.
[ Load more ]