critical infrastructure

Czech Government Condemns Chinese Hack on Critical Infrastructure

Czech Government Condemns Chinese Hack on Critical Infrastructure 2025-05-28 at 18:51 By Ryan Naraine The Czech government issues a blunt warning to China after APT31 hackers linked to intrusion at critical infrastructure network. The post Czech Government Condemns Chinese Hack on Critical Infrastructure appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View […]

React to this headline:

Loading spinner

Czech Government Condemns Chinese Hack on Critical Infrastructure Read More »

How AI agents reshape industrial automation and risk management

How AI agents reshape industrial automation and risk management 2025-05-27 at 08:33 By Mirko Zorz In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the cybersecurity implications of deploying AI agents in industrial environments. He talks about the risks that come with AI agents making

React to this headline:

Loading spinner

How AI agents reshape industrial automation and risk management Read More »

Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors

Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors 2025-05-23 at 11:31 By Ionut Arghire A Chinese espionage group has been chaining two recent Ivanti EPMM vulnerabilities in attacks against organizations in multiple critical sectors. The post Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Read More »

Southwest Airlines CISO on tackling cyber risks in the aviation industry

Southwest Airlines CISO on tackling cyber risks in the aviation industry 2025-05-14 at 08:33 By Mirko Zorz In this Help Net Security interview, Carrie Mills, VP and CISO, Southwest Airlines talks about the cybersecurity challenges facing the aviation industry. She explains how being part of critical infrastructure, a major consumer brand, and an airline each

React to this headline:

Loading spinner

Southwest Airlines CISO on tackling cyber risks in the aviation industry Read More »

UNIDIR Intrusion Path: New framework to analyze ICT environment activities

UNIDIR Intrusion Path: New framework to analyze ICT environment activities 2025-05-13 at 07:37 By Help Net Security Malicious activity in the ICT environment is growing. However, a non-technical audience often struggle to understand these threats, either because technical explanations are too complex or because media coverage oversimplifies the issues. To help understand and analyze these

React to this headline:

Loading spinner

UNIDIR Intrusion Path: New framework to analyze ICT environment activities Read More »

Review: Hands-On Industrial Internet of Things

Review: Hands-On Industrial Internet of Things 2025-04-17 at 07:10 By Mirko Zorz Hands-On Industrial Internet of Things is a practical guide designed specifically for professionals building and securing industrial IoT (IIoT) systems. About the authors Giacomo Veneri brings deep expertise in telecommunications and AI, shaped by over 25 years in IoT and AI applications within

React to this headline:

Loading spinner

Review: Hands-On Industrial Internet of Things Read More »

China Admitted to US That It Conducted Volt Typhoon Attacks: Report

China Admitted to US That It Conducted Volt Typhoon Attacks: Report 2025-04-11 at 13:14 By Eduard Kovacs In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure. The post China Admitted to US That It Conducted Volt Typhoon Attacks: Report appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

China Admitted to US That It Conducted Volt Typhoon Attacks: Report Read More »

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure 2025-04-11 at 13:14 By Jennifer Leggio Very few people in the cybersecurity industry do not know, or know of, Bryson Bort. Yes, he’s the CEO/Founder of SCYTHE, but he’s also the co-founder of ICS Village (the next one at RSA Conference

React to this headline:

Loading spinner

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure Read More »

Cyberattacks on water and power utilities threaten public safety

Cyberattacks on water and power utilities threaten public safety 2025-04-08 at 07:33 By Help Net Security 62% of utility operators were targeted by cyberattacks in the past year, and of those, 80% were attacked multiple times, according to Semperis. 54% suffered permanent corruption or destruction of data and systems. (Source: Semperis) Utilities face rising cyber

React to this headline:

Loading spinner

Cyberattacks on water and power utilities threaten public safety Read More »

Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days 

Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days  2025-03-11 at 21:03 By Ryan Naraine Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in the wild. The post Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days  appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days  Read More »

OT/ICS cyber threats escalate as geopolitical conflicts intensify

OT/ICS cyber threats escalate as geopolitical conflicts intensify 2025-02-28 at 17:03 By Help Net Security Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors

React to this headline:

Loading spinner

OT/ICS cyber threats escalate as geopolitical conflicts intensify Read More »

Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge: The security trade-offs and how to manage them 2025-01-31 at 07:34 By Mirko Zorz Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new attack surfaces. Adversaries could intercept models in transit, manipulate inputs to degrade performance, or even reverse-engineer

React to this headline:

Loading spinner

Deploying AI at the edge: The security trade-offs and how to manage them Read More »

Addressing the intersection of cyber and physical security threats

Addressing the intersection of cyber and physical security threats 2025-01-21 at 07:05 By Mirko Zorz In this Help Net Security, Nicholas Jackson, Director of Cyber Operations at Bitdefender, discusses how technologies like AI, quantum computing, and IoT are reshaping cybersecurity. He shares his perspective on the new threats these advancements bring and offers practical advice

React to this headline:

Loading spinner

Addressing the intersection of cyber and physical security threats Read More »

How nation-states exploit political instability to launch cyber operations

How nation-states exploit political instability to launch cyber operations 2024-10-15 at 07:37 By Mirko Zorz In this Help Net Security interview, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry, discusses the impact of geopolitical tensions on the frequency and sophistication of cyberattacks. He explains how nation-states and politically motivated groups exploit unrest

React to this headline:

Loading spinner

How nation-states exploit political instability to launch cyber operations Read More »

American Water shuts down systems after cyberattack

American Water shuts down systems after cyberattack 2024-10-08 at 13:16 By Zeljka Zorz American Water, the largest water and wastewater utility company in the US, has shut down some of its systems following a cyberattack. While the company confirmed that none of its water or wastewater facilities or operations have been negatively affected by the

React to this headline:

Loading spinner

American Water shuts down systems after cyberattack Read More »

UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt Controversy

UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt Controversy 2024-09-13 at 15:01 By Kevin Townsend The designation of UK data centers as Critical National Infrastructure strengthens cyber defenses, but a proposed £3.75B data center on protected Green Belt land sparks debate. The post UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt

React to this headline:

Loading spinner

UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt Controversy Read More »

Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense

Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense 2024-09-12 at 07:01 By Mirko Zorz In this Help Net Security, Erica Banks, VP and a leader in Booz Allen’s civilian services business, discusses the Federal Cybersecurity Strategy’s role in safeguarding national assets. Banks outlines key areas for improvement, including funding, talent retention, and

React to this headline:

Loading spinner

Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense Read More »

Tech stack uniformity has become a systemic vulnerability

Tech stack uniformity has become a systemic vulnerability 2024-09-10 at 07:31 By Help Net Security Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability and tendency to disrupt the organization’s day-to-day operations. Zero-days are also an old phenomenon. In the past, due to a

React to this headline:

Loading spinner

Tech stack uniformity has become a systemic vulnerability Read More »

Protecting national interests: Balancing cybersecurity and operational realities

Protecting national interests: Balancing cybersecurity and operational realities 2024-09-04 at 07:31 By Mirko Zorz With cyber threats becoming increasingly sophisticated and targeting critical infrastructure, in this Help Net Security interview, David Ferbrache, managing director of Beyond Blue, discusses the current state of cybersecurity readiness and resilience. Ferbrache talks about the complexities of managing both traditional

React to this headline:

Loading spinner

Protecting national interests: Balancing cybersecurity and operational realities Read More »

Food security: Accelerating national protections around critical infrastructure

Food security: Accelerating national protections around critical infrastructure 2024-08-21 at 06:31 By Help Net Security In this Help Net Security video, Mike Lexa, CISO and Global VP of IT Infrastructure and Operations at CNH, discusses how the federal government is taking food security more seriously and what steps must be taken to prioritize security measures.

React to this headline:

Loading spinner

Food security: Accelerating national protections around critical infrastructure Read More »

Scroll to Top