"The impression is almost unavoidable that the AfD is working through a Kremlin order list with its inquiries," Maier said, adding that the questions had demanded "increasing intensity and depth of detail."
It needs a security mechanism that triggers action automatically, not after collective consultations and individual deliberations. In recent months, a new baseline idea has taken hold in European and United States debates on Ukraine: Article 5like guarantees. In March, Italy's Prime Minister Giorgia Meloni was the first to suggest a mechanism inspired by Article 5 of the NATO Charter, which provides for collective action in the event of an attack on a member.
"If you are willing to go after a small water provider in Littleton, Massachusetts, what other target is off the list?" asked Former National Security Agency Director Gen. Tim Haugh on "60 Minutes."
Why are utilities a prime target for cyberattacks? What can security leaders do to prevent them? What happens when unexpected budget cuts slice your department in half? Tune in to learn how security leaders can simplify complexity, embrace cloud-native platforms, and design scalable, resilient command centers for the future. Protecting Critical Infrastructure With Limited Funding Romero shares common threats towards critical infrastructure and advice for security leaders navigating different challenges.
At stake is a diminished workforce with less capability to analyze and track cyber threats, as well as a bedrock cybersecurity data-sharing law that would expire in tandem with that lapse in appropriations, they told Nextgov/FCW. A shutdown would exacerbate risks to critical infrastructure because staff and resources would be less available for infrastructure owners and operators to access, said Ilona Cohen, chief legal and policy officer at HackerOne and former general counsel at the Office of Management and Budget.
Danish prime minister Mette Frederiksen conceded earlier that there may be more to come, as she laid bare the challenge these hybrid attacks pose for the country in a rare TV address. She conceded that the recent events showed vulnerabilities in Denmark's critical infrastructure, but urged citizens not to give in to insecurity and division they were meant to create.
It can't be understated what this system is capable of doing," said Matt McCool, the special agent in charge of the Secret Service's New York field office. "It can take down cell towers, so then no longer can people communicate, right? .... You can't text message, you can't use your cell phone. And if you coupled that with some sort of other event associated with UNGA, you know, use your imagination there, it could be catastrophic to the city."
The internet was built to connect machines, not people. Its basic architecture maps servers to domain names and uses cryptographic certificates to prove websites are authentic. Yet it lacks a built-in way to bridge the gap between our offline identities - citizen, taxpayer, patient, employee, student - and the digital systems on which we increasingly rely to conduct our economic, civic, and personal lives.
Mplify (formerly MEF), a global alliance of network, cloud, cybersecurity, and enterprise organizations working together to accelerate the AI-powered digital economy, today warned that the $10.5 trillion cybercrime economy (according to Cybersecurity Ventures), weaponized AI, and escalating global conflicts are creating unprecedented risks to IT systems and critical infrastructure. In response, its Enterprise Leadership Council (ELC) has issued a manifesto calling for mandatory SASE certification across all products, services, and solutions under the Mplify framework.
As the U.S.-Japan alliance confronts an era where digital threats increasingly target economic stability and national security, integrating cyber strategy into the relationship is essential. The longstanding pillars of military, trade, and diplomacy have supported peace and prosperity. Still, the rise of cyberspace as a borderless, high-stakes domain demands that both nations make cybersecurity a foundational element of their partnership in the Indo-Pacific and beyond.
The US State Department has put a $10 million bounty on the heads of three Russians accused of being intelligence agents hacking America's critical infrastructure - primarily via old Cisco kit, it seems. The alert directly connects them to reports of the Russian Federal Security Service's (FSB) Center 16 - aka Berserk Bear - accused of using a flaw (CVE-2018-0171) Cisco patched in 2018, but attackers recently exploited it in the Salt Typhoon hacking campaign,
A Deutsche Bahn (DB) spokeswoman told the dpa news agency that the fire appeared to have been fueled by an accelerant. Initial findings indicated cable sheathing had been set on fire near railway switches the mechanisms that let a train move from one track to another. Police described it as a "switch fire" that was large enough to have been noticed by a nearby resident who informed authorities shortly before midnight.
Let's dig into what this really means, why it matters, and where we go from here. But then I thought a bit more. It's not just necessary-it's overdue. And not only for national security systems. This gap in software understanding exists across nearly every enterprise and agency in the public and private sector. The real challenge is not recognizing the problem. It's addressing it early, systemically and sustainably-especially in a DevSecOps context.