|
|
|
|
INFOCON NEWS
|
|
|
|
|
Colonial Pipeline Cyberattack Highlights Need for Better Federal and Private-Sector Preparedness (infographic)
|
|
Categories: Cyber Security
|
The recent cybersecurity attack on the Colonial Pipeline Company has led to temporary disruption in the delivery of gasoline and other petroleum products across much of the southeast United States.In today’s WatchBlog post, we look at this attack and the federal government and private-sector response. We here at GAO have been warning of cybersecurity threats to critical infrastructure for many years, and …
|
|
|
|
|
|
FTC Data Shows Huge Spike in Cryptocurrency Investment Scams
|
|
New data spotlight points to more than ten-fold increase in reported losses in last 12 monthsSince October 2020, consumers have reported losing more than $80 million to cryptocurrency investment scams, an increase of more than ten-fold year-over-year, according to a new data analysis from the Federal Trade Commission.In a new consumer protection data spotlight, the FTC breaks down the contents of …
|
|
|
|
|
|
Maloney, Thompson Statement on Staff Briefing with Colonial Pipeline
|
|
(WASHINGTON)—Today, Rep. Carolyn B. Maloney, the Chairwoman of the Committee on Oversight and Reform, and Rep. Bennie G. Thompson, the Chairman of the Committee on Homeland Security, issued the following statement after today’s joint staff briefing with Colonial Pipeline: “Following today’s briefing from Colonial Pipeline, we remain extremely concerned about the rise in ransomware attacks and the threat to our nation …
|
|
|
|
|
|
In Cyber, Differentiating Between State Actors, Criminals Is a Blur
|
|
Categories: Information Operations
|
By C. Todd Lopez, DOD NewsWho's hacking the U.S.? It's not an easy question to answer, defense leaders told lawmakers, as determining if a malicious cyber attacker is a foreign government, a cyber criminal or a cyber criminal supported by a foreign government is never clear."The line between nation-state and criminal actors is increasingly blurry as nation-states turn to criminal …
|
|
|
|
|
|
Subcommittee on Cyber, Innovative Technologies, and Information Systems Hearing: “Operations in Cyberspace and building Cyber Capabilities Across the Department of Defense”
|
|
Categories: Information Operations
|
Purpose: The subcommittee will meet to receive testimony on military operations in cyberspace and building cyber capabilities across the Department of Defense. The hearing will provide members an opportunity to examine the strategy, policy, and programs for operations in cyberspace and U.S. Cyber Command.Additionally, the witnesses will provide testimony on major legislative initiatives and policy issues related to cyber. The …
|
|
|
|
|
|
Long Awaited DHS & DOJ Domestic Terrorism Data Report Finally Released
|
Categories: Homeland Security
|
|
|
|
|
Committee on Homeland Security Chairman Thompson Announces Bipartisan Agreement with Ranking Member Katko to Create Commission to Investigate the January 6 Attack on the Capitol
|
Categories: Homeland Security
|
|
|
|
|
DHS Issues a National Terrorism Advisory System (NTAS) Bulletin
|
Categories: Homeland Security
|
|
|
|
|
Cleaver, Thompson, Katko, and 12 Homeland Security Committee Members Introduce Bipartisan Pipeline Security Legislation
|
Categories: Cyber Security
|
|
|
|
|
CISA Releases Eviction Guidance to Help Organizations Remove Russian State-Sponsored Threats from Compromised Networks
|
Categories: Cyber Security
|
|
|
|
|
|
Key Documents
|
|
|
|