• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.s. epa forms task force to protect water systems from

U.S. EPA Forms Task Force to Protect Water Systems from Cyberattacks

You are here: Home / General Cyber Security News / U.S. EPA Forms Task Force to Protect Water Systems from Cyberattacks
March 20, 2024

The U.S. Environmental Safety Company (EPA) said it can be forming a new “Drinking water Sector Cybersecurity Activity Pressure” to devise approaches to counter the threats confronted by the water sector in the place.

“In addition to considering the commonplace vulnerabilities of h2o systems to cyberattacks and the challenges skilled by some devices in adopting most effective procedures, this Undertaking Power in its deliberations would find to develop on existing collaborative products and solutions,” the EPA reported.

In a letter despatched to all U.S. Governors, EPA Administrator Michael Regan and Countrywide Security Advisor Jake Sullivan highlighted the need to safe water and wastewater units (WWS) from cyber attacks that could disrupt obtain to thoroughly clean and harmless consuming water.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

At the very least two menace actors have been joined to intrusions targeting the nation’s water methods, which include these by an Iranian hacktivist group named Cyber Av3ngers as well as the China-linked Volt Typhoon, which has specific communications, electrical power, transportation, and h2o and wastewater units sectors in the U.S. and Guam for at least 5 years.

“Ingesting water and wastewater programs are an attractive concentrate on for cyberattacks mainly because they are a lifeline critical infrastructure sector but typically absence the means and technical ability to undertake demanding cybersecurity techniques,” Regan and Sullivan said.

The advancement coincides with the launch of a new actuality sheet from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), urging critical infrastructure entities to protect from the “urgent risk posed by Volt Storm” by utilizing safe by-design principles, sturdy logging, safeguarding the source chain, and raising consciousness of social engineering methods.

“Volt Storm have been pre-positioning by themselves on U.S. critical infrastructure organizations’ networks to help disruption or destruction of critical companies in the party of amplified geopolitical tensions and/or military services conflict with the United States and its allies,” the agency cautioned.

Cybersecurity

Cybersecurity company SentinelOne, in a report published last thirty day period, discovered how China has released an offensive media method to propagate “unsubstantiated” narratives around U.S. hacking functions for around two a long time.

“Repeating China’s allegations helps the [People’s Republic of China] form international community view of the U.S. China needs to see the earth realize the U.S. as the ’empire of hacking,'” Sentinel One’s China-targeted guide Dakota Cary said.

“The simple fact that China is lodging allegations of US espionage operations is continue to notable, supplying insight into the marriage between the US and China, even if China does not help its promises.”

Discovered this posting exciting? Stick to us on Twitter  and LinkedIn to study more exclusive material we submit.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «apis drive the majority of internet traffic and cybercriminals are APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
Next Post: Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts ukraine arrests trio for hijacking over 100 million email and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.