Volt Typhoon is positioning itself to physically disrupt and cripple US critical infrastructure by gaining access to operational technology networks in the energy, water, communications, and transportation sectors, according to CISA.
Follow Dark Reading:
 February 08, 2024
LATEST SECURITY NEWS & COMMENTARY
China's Cyberattackers Maneuver to Disrupt US Critical Infrastructure
Volt Typhoon is positioning itself to physically disrupt and cripple US critical infrastructure by gaining access to operational technology networks in the energy, water, communications, and transportation sectors, according to CISA.
Linux Distros Hit by RCE Vulnerability in Shim Bootloader
However, not everyone agrees with the NVD's assessment of CVE-2023-40547 being a near-maximum severity bug.
Fulton County Court System Still Hobbled by Cyberattack
Even clients are having a difficult time searching for information on cases online.
Patch Now: Critical TeamCity Bug Allows for Server Takeovers
Cyberattackers can exploit a vulnerability in JetBrain's continuous integration and delivery (CI/CD) server (a popular APT target) to gain administrative control.
IoT Networks Face Advancing Adversaries, Bug Barrage
Cyberattacks on critical infrastructure targeting IoT and OS networks are increasing in sophistication, while ICS vulnerabilities surge, new data shows.
How to Prepare for Elevated Cybersecurity Risk at the Super Bowl
Super Bowl 2024 in Las Vegas is a magnet for cybercrime. Here are a few things businesses should consider to minimize their risk.
UAE Banks Conduct Cyber War Games Exercise
The exercises are aimed at finding security gaps in the nation's banking infrastructure.
(Sponsored Article) Security Via Consensus: Developing the CIS Benchmarks™
Understand the CIS Benchmarks'™ community-consensus development process that helps ensure they provide comprehensive guidance on Internet security.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Critical Bugs in Canon Small Office Printers Allow Code Execution, DDoS
A grouping of serious printer bugs, unveiled at last summer's Pwn2Own, were patchless for months, but are finally fixed now.

How Neurodiversity Can Help Fill the Cybersecurity Workforce Shortage
Many people with ADHD, autism, dyslexia, and other neurodiverse conditions bring new perspectives that can help organizations solve cybersecurity challenges.

Twin Max-Severity Bugs Open Fortinet's SIEM to Code Execution
Full 10s on the CVSS vulnerability severity scale have been assigned to two flaws discovered in Fortinet's FortiSIEM cybersecurity operations platform.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Verizon Employee Data Exposed in Insider Threat Incident
Tens of thousands of workers are effected by a fellow employee dipping into files that include everything from SSNs and names to union status and compensation data.
LATEST FROM THE EDGE

As Smart Cities Expand, So Do the Threats
The systems that make up a smart city ecosystem are not easily secured and require better design and better policy to ensure they are not vulnerable.
LATEST FROM DR TECHNOLOGY

Managed Everything? Vendors Shift Focus to Services
More companies are opting for managing complex security capabilities, such as data detection and response.
LATEST FROM DR GLOBAL

Q&A: Tel Aviv Railway Project Bakes In Cyber Defenses
How a light railway in Israel is fortifying its cybersecurity architecture amid an increase in OT network threats.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.