Headlines
The Alarming Rise of Undetected Chinese Hackers in US and Guam Critical Infrastructurecybersecurity,China,hacking,US,Guam,criticalinfrastructure

The Alarming Rise of Undetected Chinese Hackers in US and Guam Critical Infrastructure

Perimeter 81’s Network Security Platform In today’s world, cybersecurity is of growing concern for individuals and businesses alike. Cyber attacks are becoming more frequent and sophisticated, and as such, network security is crucial to protect online data and assets. Perimeter 81’s network security platform is an efficient solution that can help IT managers save time…

Read More
How the Chinese-backed APT group 'Volt Typhoon' infiltrated US critical infrastructure organizationscybersecurity,APT,VoltTyphoon,Chinese-backed,US,criticalinfrastructure,infiltration

How the Chinese-backed APT group ‘Volt Typhoon’ infiltrated US critical infrastructure organizations

Microsoft Warns of China-Backed APT Infiltrating US Critical Infrastructure Microsoft has reported an active threat group, dubbed “Volt Typhoon,” sponsored by China that has gained persistent access to telecom and other critical infrastructure networks in the US with a focus on espionage and potentially, cyber warfare. The group, which has previously been observed in cyber…

Read More
US and Guam's critical infrastructure under attack by Chinese-linked hackerscybersecurity,US,Guam,criticalinfrastructure,Chinesehackers,cyberattack

US and Guam’s critical infrastructure under attack by Chinese-linked hackers

Chinese-linked hackers have been discovered by Microsoft and US intelligence agencies targeting critical infrastructure entities in the United States and Guam. The hacking campaign, which has been active since mid-2021, has been dubbed “Volt Typhoon” by Microsoft, who assess that the attacks could lay the groundwork for disrupting communications between the US and Asia in…

Read More
"The Implications of Chinese .Gov Hackers' Targeting of Guam Critical Infrastructure Caught by Microsoft"cybersecurity,China,hacking,Guam,criticalinfrastructure,Microsoft

“The Implications of Chinese .Gov Hackers’ Targeting of Guam Critical Infrastructure Caught by Microsoft”

Microsoft Catches Chinese .Gov Hackers in Guam Critical Infrastructure Orgs As per a recent statement released by Microsoft, the company has caught Chinese government hackers siphoning data from critical infrastructure organizations in Guam, a U.S. territory in the Pacific Ocean. These cyberespionage activities by the Chinese government-sponsored group raises concerns as it could have the…

Read More
BianLian Ransomware Poses Threat to Critical Infrastructure Organizationsransomware,cybersecurity,criticalinfrastructure,BianLian,threat,organizations

BianLian Ransomware Poses Threat to Critical Infrastructure Organizations

Cybersecurity experts from the US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and the Australian Cyber Security Centre (ACSC) have issued a warning to critical infrastructure organizations about the threats posed by the BianLian ransomware group. This malicious group has been active since at least June 2022, with a recent…

Read More
"Red Stinger Emerges: APT Group Poses New Threat to Eastern Europe's Military and Critical Infrastructure"cybersecurity,APTgroup,threat,EasternEurope,military,criticalinfrastructure,RedStinger

“Red Stinger Emerges: APT Group Poses New Threat to Eastern Europe’s Military and Critical Infrastructure”

As the world continues to rely more and more on digital technologies, cybersecurity has become a paramount concern. Threats from APT groups, especially those with links to hostile governments in Eastern Europe and elsewhere, are a constant threat to both military and critical infrastructure systems. In this regard, it is essential for IT managers to…

Read More
The Power of Identity: How Prioritizing Identity Protection Can Prevent Critical Infrastructure Attacksidentityprotection,criticalinfrastructure,cybersecurity,dataprivacy,riskmanagement

The Power of Identity: How Prioritizing Identity Protection Can Prevent Critical Infrastructure Attacks

## Critical Infrastructure Attacks: A Growing Threat In recent years, critical infrastructure attacks have become more frequent and sophisticated. According to Xage CEO Duncan Greatwood, the Colonial Pipeline attack in 2018 was a turning point, highlighting the vulnerability of both information and operational technologies. In this report, we will explore Greatwood’s insights into how organizations…

Read More
"US Critical Infrastructure Remains Vulnerable to Ransomware Attacks Two Years After Colonial Pipeline"cybersecurity,ransomware,criticalinfrastructure,UnitedStates,ColonialPipeline,vulnerability

“US Critical Infrastructure Remains Vulnerable to Ransomware Attacks Two Years After Colonial Pipeline”

US Critical Infrastructure Remains Vulnerable to Ransomware Attacks, Experts Warn As the second anniversary of the massive ransomware attack on Colonial Pipeline nears, experts warn that efforts to thwart the potentially debilitating threat to US critical infrastructure have not been enough. The cyberattack on its IT infrastructure forced Colonial Pipeline to shut down its entire…

Read More
InsightCyber Unveils Global Platform for Critical Infrastructure Cybersecuritycybersecurity,criticalinfrastructure,InsightCyber,globalplatform

InsightCyber Unveils Global Platform for Critical Infrastructure Cybersecurity

InsightCyber Launches Innovative AI-Driven Cybersecurity Platform RESEARCH TRIANGLE PARK, N.C. – InsightCyber, a cybersecurity solution provider, has launched its signature offering, the InsightCyber Platform, an AI-driven cybersecurity platform that continuously updates and monitors a complete inventory of assets within an enterprise’s environment, providing protection against a wide range of cyber threats. The platform detects operational…

Read More