Critical Infrastructure | News, how-tos, features, reviews, and videos
President Biden issued an executive order to bar data brokers from selling American’s sensitive data to “countries of concern,” ordering a slew of actions by the Justice Department and other government agencies that would deny adver
The US National Institute of Standards and Technology released the 2.0 version of its Cybersecurity Framework, focusing more on governance and supply chain issues and offering resources to speed the framework’s implementation.
The White House announced a new executive order and other actions to strengthen the cybersecurity of the maritime industry and ports while seeking to revive a domestic crane industry and wean America off Chinese-made port cranes.
Lawmakers and experts fear that the use of Chinese storage batteries could threaten the power grid, but few alternatives are in the offing, at least in the short term.
Attackers used more than 300 samples of the malicious tool and more than 100 domains to evade detection.
This year's annual national defense funding bill is chock-full of cybersecurity-related provisions with spending focused on nuclear weapons and systems security, artificial intelligence, digital diplomacy, and much more.
The Iranian CyberAv3ngers group’s simplistic exploitation of Unitronics PLCs highlights the cybersecurity weaknesses in US water utilities, the need to get devices disconnected from the internet, and renewed interest in regulation.
The campaigns exploit Outlook and WinRAR flaws to target government, defense, and other entities, and they represent a change of tactic for the APT28 group.
The Australian federal government released the 2023-2030 cybersecurity strategy, which focuses on protecting households and small businesses and has big expectations from telecommunications providers.
With active kinetic wars in two major global arenas and fears that China is stealthily infiltrating critical infrastructure for future cyber disruption, experts at this year’s Cyberwarcon painted a picture of the growing harm that malicious cyb