ONLINE TV

  • Advertise
  • Privacy & Policy
  • Contact
Saturday, July 12, 2025
  • Login
  • Register
CYBERSECURITY
  • Home
  • CybersecurityUpdates
    • All
    • Data Breaches
    • Jobs
    • Malware & Ransomware
    • News
    • Scammers
    • Threat Intelligence
    • Update and Breaches
    Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network

    Employee Cyber Security Awareness Quiz: Weekend Special

    Fake online stores look real, rank high, and trap unsuspecting buyers

    Beware of Fake Online Stores: How to Spot and Avoid E-Shop Scams

    Train smarter, respond faster: Close the skill gaps in your SOC

    Upskill Your Security Team with TryHackMe’s Advanced Endpoint

    Microsoft Confirms Teams Outage for Users, Investigation Underway – Updated

    Microsoft Teams Outage Disrupts Users Worldwide

    XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

    Strengthening Cybersecurity for Smart Grids and Substations

    Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

    How AI Impersonation Is Reshaping Cybersecurity

    Trending Tags

    • Cybercrime
    • cyber threat prevention
    • cyber fraud
    • cyberattack techniques
    • cyber threat intelligence
    • cybersecurity jobs
    • Cyberattacks
    • Cybersecurity
  • Shop
    • Products
    • Vendors
  • Quick Links
    • Our Profiles
  • Legal Hub
  • Browse
    • News
      • Canada News
      • World News
        • Africa
          • East Africa
          • West Africa
        • Americas
          • US
          • Canada
        • Asia
        • Australia
        • China
        • Europe
        • India
        • Middle East
        • United Kingdom
Live TV Indicator
WATCH ONLINE TV
No Result
View All Result
CYBERSECURITY
Home Menu News
Malicious VS Code Extensions Attacking Windows Solidity Developers to Steal Login Credentials

US critical infrastructure

All-out Cyber Attach : US Experts Warn of Massive Infrastructure Destruction

June 16, 2025
in News
0

Recent remarks from former NSA cybersecurity director Anne Neuberger highlight a concerning reality: if a cyberattack were to target critical US infrastructure today, it might very well cause widespread collapse. Speaking at the AI Expo for National Competitiveness, Neuberger expressed deep concerns over the current state of US cybersecurity resilience, citing reductions in workforce and outdated technology as major vulnerabilities.

 

The Fragile State of US Critical Infrastructure Security

According to Neuberger, the US’s critical infrastructure is dangerously exposed, especially if a sophisticated cyberattack were to occur. She pointed out that recent budget cuts under the Trump administration have severely impacted the Cybersecurity and Infrastructure Security Agency (CISA), leading to a depleted workforce and increased vulnerabilities. This reduction in talent and resources threatens the ability to defend essential systems that power utilities, transportation, and communication networks.

Neuberger emphasized that much of the existing infrastructure relies on outdated technology, much of which was not designed for internet connectivity. For example, operational systems often lag behind IT systems in cybersecurity protections, creating chasms for cybercriminals and nation-states to exploit.

The Role of AI and Digital Twinning in Strengthening Defenses

In light of these vulnerabilities, Neuberger advocates for increased adoption of AI technologies to fortify critical infrastructure. She highlighted that AI could be instrumental in evaluating legacy systems, discovering weak points, and automating threat detection. Digital twinning—creating virtual replicas of physical systems—could also be pivotal for simulating attacks and testing defenses in real time before real-world exploitation occurs.

Neuberger argued that AI-driven solutions could compensate for the staffing shortages caused by budget cuts, providing targeted and efficient security measures. She stressed that deploying AI in critical systems is not just a matter of efficiency but a necessity for resilience against increasingly sophisticated adversaries.

The Impact of Budget Cuts and Workforce Attrition

Since the Trump administration’s efforts to reduce government spending on cybersecurity, CISA has faced widespread layoffs, leading to a “brain drain” of experienced professionals. The agency’s budget has been slashed by approximately 17%, or around $491 million, which resulted in the loss of a third of its staff. This decline hampers the agency’s ability to monitor, detect, and respond to cyber threats effectively.

Neuberger warned that these cuts leave US infrastructure vulnerable to exploitation by hostile nation-states and cybercriminal groups. She underscored that without a robust and well-staffed cybersecurity workforce, the country’s defenses could crumble in the face of a major attack.

Critical Vulnerabilities and Recent Exploits

Amidst this precarious situation, several vulnerabilities remain unpatched and exploitable. For instance, CISA recently added the CVE-2025-3935 vulnerability in ConnectWise’s ScreenConnect to its Known Exploited Vulnerabilities catalog. This flaw, with a CVSS score of 8.1, involves deserialization issues allowing attackers to breach systems.

Other notable vulnerabilities include:

  • CVE-2021-32030 in ASUS routers, with a CVSS score of 9.8, which allows for authentication bypasses.
  • CVE-2024-56145 affecting Craft CMS, leading to remote code execution.
  • Qualcomm chipset vulnerabilities (CVEs 2025-21480 and 21479), which could cause memory corruption and unauthorized command execution.

These vulnerabilities highlight how unpatched systems remain a major threat vector, especially when defense budgets are strained.

Rising Threats from Malware and State-Sponsored Actors

In addition to vulnerabilities, malware campaigns and botnets continue to pose serious threats. The FBI has issued warnings about Badbox 2.0, a revived botnet targeting Android streaming devices and IoT gadgets like digital picture frames. Meanwhile, Kaspersky has detected a new Mirai variant targeting DVRs, exploiting CVE-2024-3721, an OS command injection flaw.

These threats are often exploited to create botnets for malicious activities, including DDoS attacks and data theft. With around 50,000 exposed vulnerable systems, the risk of widespread infections remains high, especially with attackers selling access to compromised devices.

 

Tags: AI cybersecurityCISAcritical infrastructurecyber defense strategiescyberattack preventioncybersecurity vulnerabilitiesgovernment cybersecurityIoT securitymalwarenation-state threats
Share198Tweet124

Related Posts

Red Hat introduces Enterprise Linux for Business Developers
News

Why Human Risk Management Is Critical for Cybersecurity

July 9, 2025
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks
News

Chinese Hacker Arrest Highlights Rising Threats in Cyber Espionage

July 9, 2025
10 Best Network Security Solutions For Chief Security Officer To Consider – 2025
News

10 Best Network Security Solutions for CSOs to Consider in 2025

July 9, 2025
AI built it, but can you trust it?
News

Trust or Risk? Securing AI-Driven Development

July 8, 2025
Subscribe
Notify of
guest
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Donation

Buy our author a coffee

Donate

Follow Us On Facebook

  • Trending
  • Comments
  • Latest
Top Cybersecurity Jobs Available Right Now – May 6, 2025

Top Cybersecurity Jobs Available Right Now – May 6, 2025

May 6, 2025
career

Top Cybersecurity Job Opportunities in 2025

April 30, 2025
ransomware attack

Moldovan Authorities Arrest Ransomware Hacker Linked to DoppelPaymer Attacks

May 13, 2025
Cybersecurity in Healthcare: Understanding The Risk of PC Workstations

The Covert Threat of Cyberattacks: A Look at Vulnerable PC Workstations in Healthcare

0
AI

The AI Trust Gap: Are Security Teams Ready to Hand Over the Reins?

0
vulnerability

Commvault RCE: Critical Vulnerability Exposes Data Systems

0
Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network

Employee Cyber Security Awareness Quiz: Weekend Special

July 12, 2025
Fake online stores look real, rank high, and trap unsuspecting buyers

Beware of Fake Online Stores: How to Spot and Avoid E-Shop Scams

July 11, 2025
Train smarter, respond faster: Close the skill gaps in your SOC

Upskill Your Security Team with TryHackMe’s Advanced Endpoint

July 10, 2025

© 2024 Innocent Michael Network Inc..

 

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

  • Login
  • Sign Up
Live TV Indicator
WATCH ONLINE TV
No Result
View All Result
  • Home
  • Cybersecurity
  • Shop
    • Products
    • Vendors
  • Quick Links
    • Our Profiles
  • Legal Hub
  • Browse
    • News
      • Canada News
      • World News
Subscribe

© 2024 Innocent Michael Network Inc.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply