Iran Linked Hackers Target US Critical Infrastructure Through PLC Exploits
Iran affiliated hackers target US critical infrastructure by exploiting PLC devices, causing operational disruption and raising cybersecurity concerns.
Iran affiliated hackers target US critical infrastructure by exploiting PLC devices, causing operational disruption and raising cybersecurity concerns.
FBI and U.S. agencies warn of Iran linked cyberattacks targeting operational technology devices, causing disruptions across critical infrastructure sectors.
Pakistan’s National CERT warns of hostile actors exploiting hardware and software supply chains to target power, banking, and defense systems, urging a zero-trust security model.
NCERT issues high priority cyber advisory warning of threats to military networks, banks, government systems, and critical infrastructure amid rising regional tensions.
Federal government forms NCICS to enhance security of critical information infrastructure, assess vulnerabilities, and develop a robust cybersecurity framework for federal ministries and organisations.
National CERT Pakistan unveils Pakistan Information Security Framework 2025, providing a unified approach for cybersecurity, data protection, and digital resilience across government and private sectors.
PTA has unveiled the Critical Telecom Data and Infrastructure Security Regulations 2025, mandating data localization, Zero Trust policies, and strict cybersecurity audits for telecom operators across Pakistan.
Pakistan’s National Computer Emergency Team issues urgent advisory on CVE-2025-20286, a critical vulnerability in Cisco ISE cloud deployments that allows full access without a password.
By: Muhammad Noman Khalid Information security protects various types of information, including digital data, physical records, and intellectual property (IP). Cybersecurity is a subfield of information security focused…
The National Computer Emergency Response Team (NCERT) has unveiled a critical initiative to bolster Pakistan’s cybersecurity defenses. The release of their Critical Information Infrastructure (CII) Guidelines establishes a…