IWS

INFOCON NEWS

Colonial Pipeline Cyberattack Highlights Need for Better Federal and Private-Sector Preparedness (infographic)

Colonial Pipeline Cyberattack Highlights Need for Better Federal and Private-Sector Preparedness (infographic)
Categories: Cyber Security

The recent cybersecurity attack on the Colonial Pipeline Company has led to temporary disruption in the delivery of gasoline and other petroleum products across much of the southeast United States.In today’s WatchBlog post, we look at this attack and the federal government and private-sector response. We here at GAO have been warning of cybersecurity threats to critical infrastructure for many years, and …

FTC Data Shows Huge Spike in Cryptocurrency Investment Scams

FTC Data Shows Huge Spike in Cryptocurrency Investment Scams
Categories: Cyber Crime

New data spotlight points to more than ten-fold increase in reported losses in last 12 monthsSince October 2020, consumers have reported losing more than $80 million to cryptocurrency investment scams, an increase of more than ten-fold year-over-year, according to a new data analysis from the Federal Trade Commission.In a new consumer protection data spotlight, the FTC breaks down the contents of …

Maloney, Thompson Statement on Staff Briefing with Colonial Pipeline

Maloney, Thompson Statement on Staff Briefing with Colonial Pipeline
Categories: Cyber Crime

(WASHINGTON)—Today, Rep. Carolyn B. Maloney, the Chairwoman of the Committee on Oversight and Reform, and Rep. Bennie G. Thompson, the Chairman of the Committee on Homeland Security, issued the following statement after today’s joint staff briefing with Colonial Pipeline: “Following today’s briefing from Colonial Pipeline, we remain extremely concerned about the rise in ransomware attacks and the threat to our nation …

In Cyber, Differentiating Between State Actors, Criminals Is a Blur

In Cyber, Differentiating Between State Actors, Criminals Is a Blur
Categories: Information Operations

By C. Todd Lopez, DOD NewsWho's hacking the U.S.? It's not an easy question to answer, defense leaders told lawmakers, as determining if a malicious cyber attacker is a foreign government, a cyber criminal or a cyber criminal supported by a foreign government is never clear."The line between nation-state and criminal actors is increasingly blurry as nation-states turn to criminal …

Subcommittee on Cyber, Innovative Technologies, and Information Systems Hearing: “Operations in Cyberspace and building Cyber Capabilities Across the Department of Defense”

Subcommittee on Cyber, Innovative Technologies, and Information Systems Hearing: “Operations in Cyberspace and building Cyber Capabilities Across the Department of Defense”
Categories: Information Operations

Purpose: The subcommittee will meet to receive testimony on military operations in cyberspace and building cyber capabilities across the Department of Defense. The hearing will provide members an opportunity to examine the strategy, policy, and programs for operations in cyberspace and U.S. Cyber Command.Additionally, the witnesses will provide testimony on major legislative initiatives and policy issues related to cyber. The …

Long Awaited DHS & DOJ Domestic Terrorism Data Report Finally Released

Categories: Homeland Security
Read more

Committee on Homeland Security Chairman Thompson Announces Bipartisan Agreement with Ranking Member Katko to Create Commission to Investigate the January 6 Attack on the Capitol

Categories: Homeland Security
Read more

DHS Issues a National Terrorism Advisory System (NTAS) Bulletin

Categories: Homeland Security
Read more

Cleaver, Thompson, Katko, and 12 Homeland Security Committee Members Introduce Bipartisan Pipeline Security Legislation

Categories: Cyber Security
Read more

CISA Releases Eviction Guidance to Help Organizations Remove Russian State-Sponsored Threats from Compromised Networks

Categories: Cyber Security
Read more
Citizen Cyber

Key Documents


Homeland Security

Information Operations

Space Operations

IWS_Artwork
website linkedin facebook