digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

818
active users

#criticalinfrastructure

10 posts9 participants2 posts today
ITSEC News<p>Blue Locker ransomware hits critical infrastructure – is your organisation ready? - Critical infrastructure organisations are once again being warned of the threat posed by ... <a href="https://www.exponential-e.com/blog/blue-locker-ransomware-hits-critical-infrastructure-is-your-organisation-ready" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">exponential-e.com/blog/blue-lo</span><span class="invisible">cker-ransomware-hits-critical-infrastructure-is-your-organisation-ready</span></a> <a href="https://schleuss.online/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/bluelocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bluelocker</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Erik Jonker<p>"The Scale of Russian Sabotage Operations Against Europe’s Critical Infrastructure" by IISS.<br><a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">iiss.org/research-paper/2025/0</span><span class="invisible">8/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/</span></a><br><a href="https://mastodon.social/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://mastodon.social/tags/eu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eu</span></a> <a href="https://mastodon.social/tags/europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>europe</span></a> <a href="https://mastodon.social/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://mastodon.social/tags/geopolitics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geopolitics</span></a> <a href="https://mastodon.social/tags/iiss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iiss</span></a> <span class="h-card" translate="no"><a href="https://a.gup.pe/u/geopolitics" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>geopolitics</span></a></span></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://weaponx.social/users/vincent" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vincent</span></a></span> granted that's you solving a <em>"personal" problem</em> and not <em>"<a href="https://infosec.space/tags/VibeCoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VibeCoding</span></a>" <a href="https://infosec.space/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CriticalInfrastructure</span></a></em>…</p>
Pyrzout :vm:<p>Local governments struggle to defend critical infrastructure as threats grow <a href="https://www.helpnetsecurity.com/2025/08/22/critical-infrastructure-sltt-cybersecurity-priorities/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/22</span><span class="invisible">/critical-infrastructure-sltt-cybersecurity-priorities/</span></a> <a href="https://social.skynetcloud.site/tags/CenterforInternetSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CenterforInternetSecurity</span></a> <a href="https://social.skynetcloud.site/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://social.skynetcloud.site/tags/cyberresilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberresilience</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/GenerativeAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenerativeAI</span></a> <a href="https://social.skynetcloud.site/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://social.skynetcloud.site/tags/cyberrisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberrisk</span></a> <a href="https://social.skynetcloud.site/tags/report" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>report</span></a> <a href="https://social.skynetcloud.site/tags/survey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>survey</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a></p>
Jeff Schlentz<p>The International Institute for Strategic Studies</p><p>The Scale of Russian Sabotage Operations Against Europe’s Critical Infrastructure</p><p>19 August 2025</p><p>"IISS has created the most comprehensive open-source database of suspected and confirmed Russian sabotage operations targeting Europe."</p><p>site: <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">iiss.org/research-paper/2025/0</span><span class="invisible">8/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/</span></a></p><p>pdf: <a href="https://www.iiss.org/globalassets/media-library---content--migration/files/research-papers/2025/08/pub25-095-the-scale-of-russian-sabotage-operations.pdf" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">iiss.org/globalassets/media-li</span><span class="invisible">brary---content--migration/files/research-papers/2025/08/pub25-095-the-scale-of-russian-sabotage-operations.pdf</span></a></p><p><a href="https://mastodon.opencloud.lu/tags/sabotage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sabotage</span></a> <a href="https://mastodon.opencloud.lu/tags/IISS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IISS</span></a> <a href="https://mastodon.opencloud.lu/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a></p>
Pyrzout :vm:<p>Russian threat actors using old Cisco bug to target critical infrastructure orgs <a href="https://www.helpnetsecurity.com/2025/08/21/cve-2018-0171-cisco-cyber-espionage/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/21</span><span class="invisible">/cve-2018-0171-cisco-cyber-espionage/</span></a> <a href="https://social.skynetcloud.site/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://social.skynetcloud.site/tags/RussianFederation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RussianFederation</span></a> <a href="https://social.skynetcloud.site/tags/cyberespionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberespionage</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> <a href="https://social.skynetcloud.site/tags/USA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USA</span></a></p>
Pyrzout :vm:<p>Russia’s FSB-Linked Hackers Targeting Cisco Network Gear Used in Critical Infrastructure <a href="https://thecyberexpress.com/russia-targeting-cisco-network-gear/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/russia-tar</span><span class="invisible">geting-cisco-network-gear/</span></a> <a href="https://social.skynetcloud.site/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2018-0171 <a href="https://social.skynetcloud.site/tags/EnergeticBear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnergeticBear</span></a> <a href="https://social.skynetcloud.site/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberWarfare</span></a> <a href="https://social.skynetcloud.site/tags/StaticTundra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StaticTundra</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/Espionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Espionage</span></a> <a href="https://social.skynetcloud.site/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a></p>
Pyrzout :vm:<p>Russia-linked European attacks renew concerns over water cybersecurity <a href="https://www.csoonline.com/article/4042449/russia-linked-european-attacks-renew-concerns-over-water-cybersecurity.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/4042449/</span><span class="invisible">russia-linked-european-attacks-renew-concerns-over-water-cybersecurity.html</span></a> <a href="https://social.skynetcloud.site/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CriticalInfrastructure</span></a> <a href="https://social.skynetcloud.site/tags/Cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattacks</span></a></p>
Pyrzout :vm:<p>Federal Agency Makes Steampunk Appearance at Black Hat 2025 – Source: www.cyberdefensemagazine.com <a href="https://ciso2ciso.com/federal-agency-makes-steampunk-appearance-at-black-hat-2025-source-www-cyberdefensemagazine-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/federal-agency-m</span><span class="invisible">akes-steampunk-appearance-at-black-hat-2025-source-www-cyberdefensemagazine-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a> <a href="https://social.skynetcloud.site/tags/maliciouscyberactivity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>maliciouscyberactivity</span></a> <a href="https://social.skynetcloud.site/tags/CyberDefenseMagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefenseMagazine</span></a> <a href="https://social.skynetcloud.site/tags/cyberdefensemagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefensemagazine</span></a> <a href="https://social.skynetcloud.site/tags/electioninterference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electioninterference</span></a> <a href="https://social.skynetcloud.site/tags/cyberdefensemagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefensemagazine</span></a> <a href="https://social.skynetcloud.site/tags/cyberinvestigations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberinvestigations</span></a> <a href="https://social.skynetcloud.site/tags/USDepartmentofState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USDepartmentofState</span></a> <a href="https://social.skynetcloud.site/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/RewardsforJustice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RewardsforJustice</span></a> #$10millionreward</p>
M. Ní Sídach<p>How the U.S. Just Handed the <a href="https://sfba.social/tags/Renewable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Renewable</span></a> Future to China<br><a href="https://sfba.social/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> <a href="https://sfba.social/tags/CN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CN</span></a> <a href="https://sfba.social/tags/Politics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Politics</span></a> <a href="https://sfba.social/tags/Economics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Economics</span></a> <a href="https://sfba.social/tags/Project2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Project2025</span></a> <a href="https://sfba.social/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CriticalInfrastructure</span></a> <a href="https://sfba.social/tags/Energy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Energy</span></a><br><a href="https://www.youtube.com/watch?v=2tNp2vsxEzk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=2tNp2vsxEzk</span><span class="invisible"></span></a></p>
SOC Goulash<p>It's been a busy 24 hours in the cyber world with significant updates on recent breaches, a flurry of actively exploited vulnerabilities, evolving threat landscapes, and some interesting shifts in data privacy and government cyber initiatives. Let's dive in:</p><p>Recent Cyber Attacks and Threat Actor Activity ⚠️</p><p>- US steel giant Nucor, a critical infrastructure component, halted production at several facilities following a cyber intrusion. While the nature of the attack isn't specified, the disruption suggests a significant impact, potentially from ransomware or extortion, highlighting the ongoing targeting of manufacturing.<br>- The notorious Scattered Spider (aka UNC3944, Octo Tempest) is expanding its focus from UK retail chains to the US retail sector. This group, known for sophisticated social engineering, phishing, SIM swapping, and MFA bombing, is now leveraging the DragonForce ransomware operation. US retailers should be on high alert for these aggressive tactics.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/14/nucor_steel_attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/14/nucor_steel_attack/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/google-scattered-spider-switches-targets-to-us-retail-chains/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/google-scattered-spider-switches-targets-to-us-retail-chains/</span></a></p><p>Actively Exploited Vulnerabilities and Patch Tuesday Rundown 🛡️</p><p>- Ivanti has patched two zero-day vulnerabilities (CVE-2025-4427, CVE-2025-4428) in Ivanti Endpoint Manager Mobile (EPMM) that are being actively chained for Remote Code Execution (RCE). These flaws, affecting large organisations and government entities, are linked to unspecified open-source libraries. Ivanti also patched a critical 9.8 CVSS bug (CVE-2025-22462) in Neurons for ITSM, though it's not yet exploited.<br>- Microsoft's May Patch Tuesday included fixes for five actively exploited flaws (CVSS 7.5-7.8) impacting Windows 10, 11, and Server 2019+. These are high priority for patching. Apple also released numerous fixes, including one actively exploited CoreAudio flaw in watchOS 11.5, suspected to be used by government-level spyware. Adobe and SAP also pushed out their monthly security updates.<br>- Researchers at ETH Zurich have found a new way to bypass Intel's Spectre v2 defences (eIBRS/IBPB) using "Branch Privilege Injection" (BPI) (CVE-2024-45332). This allows unprivileged code to inject kernel-level branch predictions, potentially leading to data leakage from the OS or even hypervisors in cloud environments. Intel has released a microcode update, affecting x86 chips since 9th gen.<br>- Google Chrome is rolling out a security enhancement that will automatically "de-elevate" the browser, preventing it from running with administrator privileges on Windows. This mirrors a similar feature in Microsoft Edge and is a crucial step to mitigate risks, as running a browser as admin can allow malicious downloads to execute with full system access.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/14/ivanti_patches_two_zerodays_and/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/14/ivanti_patches_two_zerodays_and/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/14/patch_tuesday_may/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/14/patch_tuesday_may/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/13/intel_spectre_race_condition/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/13/intel_spectre_race_condition/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/google/google-chrome-to-block-admin-level-browser-launches-for-better-security/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/goog</span><span class="invisible">le/google-chrome-to-block-admin-level-browser-launches-for-better-security/</span></a></p><p>Evolving Threat Landscape 📈</p><p>- SANS Institute warns that ransomware gangs are increasingly targeting "middle systems" between IT and Operational Technology (OT) in critical infrastructure. Attacks on these systems, which manage product integrity or safety, can have more severe operational impacts than IT-only attacks, making victims more likely to pay. Nation-state actors are also shifting from simple outages to persistent manipulation of ICS for long-term destruction.<br>- A session at CYBERUK highlighted a concerning trend: organisations are rapidly deploying generative AI without a clear understanding of the associated security risks. The NCSC warns that by 2027, AI-empowered attackers will significantly reduce time-to-exploitation, making organisations that don't integrate AI into their cyber defences materially riskier. Insecure AI deployments can lead to prompt injection, supply chain attacks, and data misuse.<br>- Gartner analyst Craig Lawson suggests that blindly rushing to implement all Patch Tuesday fixes might not be the most effective strategy. He argues that organisations can't "out-patch" threat actors and should instead focus on understanding their "threat debt" and implementing compensating controls. Attackers often target less critical flaws, and state actors are hesitant to burn zero-days.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/14/ransomware_targets_middle_systems_sans/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/14/ransomware_targets_middle_systems_sans/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/14/cyberuk_ai_deployment_risks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/14/cyberuk_ai_deployment_risks/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/14/improve_patching_strategies/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/14/improve_patching_strategies/</span></a></p><p>Data Privacy and Regulatory Shifts 🔒</p><p>- Privacy advocacy group noyb is challenging Meta's latest plan to train its AI models on EU user data, arguing that Meta's reliance on "legitimate interest" under GDPR is insufficient and requires explicit opt-in consent. This mirrors previous disputes over advertising data and could lead to significant class-action lawsuits, potentially costing Meta billions.<br>- The US Consumer Financial Protection Bureau (CFPB) is set to withdraw a Biden-era rule that would have classified data brokers as consumer reporting agencies, subjecting them to stricter accuracy and compliance standards under the Fair Credit Reporting Act. Privacy advocates are concerned this move will leave consumers vulnerable to fraud, identity theft, and data sales to malicious actors.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/14/metas_still_violating_gdpr_rules/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/14/metas_still_violating_gdpr_rules/</span></a><br>🤫 CyberScoop | <a href="https://cyberscoop.com/cfpb-to-withdraw-rule-targeting-data-brokers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/cfpb-to-withdra</span><span class="invisible">w-rule-targeting-data-brokers/</span></a></p><p>Government Cyber Initiatives and Staffing 🏛️</p><p>- The Department of Homeland Security (DHS) is refusing to disclose the number of employees cut or pushed out from CISA, raising concerns among Congress members about the agency's ability to defend against daily cyberattacks from adversaries like China. This comes amidst proposed budget cuts and administrative leave for staff working on mis/disinformation.<br>- The DHS also cancelled a $2.4 billion cybersecurity contract with Leidos intended to support CISA, following a legal challenge from rival bidder Nightwing. Nightwing alleged unfair advantage due to Leidos hiring a former DHS IT specialist with inside information. While DHS cited "changed priorities," the incident highlights ongoing issues with government contracting and potential conflicts of interest.<br>- The Common Vulnerability and Exposures (CVE) program, a global bedrock for vulnerability management, narrowly avoided a shutdown due to a contract lapse between CISA and MITRE. This near-crisis has spurred the formation of a new CVE Foundation, aiming for private-sector and multi-government funding by December to reduce reliance on a single source, though it faces criticism over potential conflicts of interest.</p><p>🤫 CyberScoop | <a href="https://cyberscoop.com/dhs-wont-tell-congress-how-many-people-its-cut-from-cisa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/dhs-wont-tell-c</span><span class="invisible">ongress-how-many-people-its-cut-from-cisa/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/05/14/dhs_leidos_contract/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/05/14/dhs_leidos_contract/</span></a><br>🤫 CyberScoop | <a href="https://cyberscoop.com/cve-program-funding-crisis-cve-foundation-mitre/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/cve-program-fun</span><span class="invisible">ding-crisis-cve-foundation-mitre/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CriticalInfrastructure</span></a> <a href="https://infosec.exchange/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> <a href="https://infosec.exchange/tags/Spectre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spectre</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataPrivacy</span></a> <a href="https://infosec.exchange/tags/GDPR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GDPR</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/GovernmentContracts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GovernmentContracts</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>

✈️ The cyberattack on Aeroflot might be the most disruptive hacktivist operation yet and it's tied to the Russia‑Ukraine war. Pro‑Ukrainian group Silent Crow claims it infiltrated the airline’s systems for nearly a year, then wiped 7,000 servers, possibly exposing passenger and employee data. Over 100 flights have been canceled and the Kremlin is publicly rattled. These aren’t nuisance hacks. They’re long dwell‑time, infrastructure‑level takedowns with strategic targets. 🇷🇺 🇺🇦

TL;DR
⚠️ 7,000 servers wiped, 100+ flights canceled
🧠 Year‑long access by Silent Crow and Belarusian allies
🔓 Potential data breach of Aeroflot systems
📉 Russian government calls the attack “alarming”

reuters.com/en/pro-ukrainian-h
#Cyberwarfare #Hacktivism #CriticalInfrastructure #Aeroflot #backup #DR #BC #security #privacy #cloud #infosec #cybersecurity #cyberwar

A cyberattack hit St. Paul, Minnesota so hard the city pulled all networks offline and called in the National Guard. 😳 Not just IT, but cyber units. The FBI’s in, so are private firms, and still no attribution. This isn’t just ransomware, it’s about how cities function when tech goes dark. And it shows that municipal defenses alone aren’t enough when threat actors attack.

TL;DR
⚠️ Coordinated digital attack disrupted St. Paul’s city systems
🛡️ Entire network shut down to prevent spread
🧠 National Guard cyber team, FBI, and private firms investigating
🔌 Libraries, Wi‑Fi, internal ops down — 911 stayed online

reuters.com/world/us/minnesota
#Cybersecurity #MunicipalIT #CriticalInfrastructure #IncidentResponse #security #privacy #cloud #infosec