“DHS’s voice is vital around the Situation Room table,” says Edelman “Looking ahead, as we consider issues like national security controls over AI, or limits to foreign investment, DHS is going to be more crucial than ever—and their absence of leadership could lead to some very skewed outcomes.”.
From that foothold, it appeared, the hackers had spread through the power companies’ networks and eventually compromised a VPN the companies had used for remote access to their network—including the highly specialized industrial control software that gives operators remote command over equipment like circuit breakers.
(Like other open source code, though, expect it to have some bugs.) Joyce also noted that the NSA views the release of Ghidra as a sort of recruiting strategy, making it easier for new hires to enter the NSA at a higher level, or for cleared contractors to lend their expertise without needing to first come up to speed on the tool.
“It’s like working on a car with its engine running.” Sungjin Kim/Getty Images Cybersecurity experts have sounded the alarm for years: Hackers are ogling the U.S. power grid. Peters’s group thinks that a utility company could use quantum-encrypted data to communicate with their hardware.
He previously held counterterrorism and intelligence roles for the US government overseas and domestically.As government-backed hackers in Russia, China, Iran, and North Korea continue to infiltrate and attack American companies, it’s often private cybersecurity firms, rather than the US government, that are publicly assigning blame.
Regardless of the impact on the alleged SamSam hackers specifically, the Justice Department made a statement that should resound among cybercriminals who rely on bitcoin and the dark web for anonymity.“It absolutely adds a chilling effect,” Jarvis says.
Security News This Week: Japan's Top Cybersecurity Official Has Never Used a ComputerTOSHIFUMI KITAMURA/AFP/Getty ImagesThe US refused to join a new global cybersecurity agreement this week—maybe because it was created by French president Emmanuel Macron, with whom President Trump isn’t on great terms with.On the same day, internet traffic that was supposed to route through Google’s cloud servers instead went haywire, traveling through unplanned servers based in the likes of Russia and China.
After failures plague Utility B, Utility A then needs to step in, restarting to offer redundant power to that same critical customer.In order to interact and safely share electricity, utilities also need to get their electromagnetic frequencies in tune at around 60 hertz, so part of the exercise involved not just getting Utility A and B running, but syncing them."We had 18 substations, two utilities, two command centers, and we had two generation sources that we had to bring up a crank path and synchronize," says Stan Pietrowicz, a researcher at Perspecta Labs who is working on a black start network analysis and threat detection tool through RADICS.
“The private sector is now willing to say that we can and we will do more.”"Over the past three or four years, we’ve really seen a groundswell of private leadership."Megan Stifel, Public KnowledgeIn April, Microsoft announced the Cybersecurity Tech Accord, an agreement similar to the Paris Call that was signed by more than 60 technology corporations, which it dubbed a “a Digital Geneva Convention.” In July, the company publicly advocated for the regulation of facial recognition technology and said it was developing its own set of principles for how it should be used.