HomeRisk ManagementsCISA Refutes Reports of Change in Stance in Response to Russian Threats

CISA Refutes Reports of Change in Stance in Response to Russian Threats

Published on

spot_img

The US Cybersecurity and Infrastructure Security Agency (CISA) has reiterated its commitment to safeguarding US critical infrastructure against all cyber threats, including those originating from Russia, during the Trump administration’s tenure. Recent reports have surfaced regarding an internal memo outlining new priorities for CISA, with China mentioned while Russia was notably absent.

According to The Guardian, an anonymous source disclosed that CISA analysts were verbally instructed not to track or report on Russian threats. However, Department of Homeland Security (DHS) spokesperson Tricia McLaughlin refuted the claims, stating that the directive attributed to the Trump administration did not originate from them.

McLaughlin affirmed CISA’s unwavering dedication to addressing cyber threats to US critical infrastructure, including those posed by Russia. She emphasized that there had been no change in CISA’s stance or priority towards this issue. This sentiment was echoed in a social media post by CISA on March 3, denouncing any contrary reports as false information undermining national security.

Cybersecurity experts continue to highlight the significance of Russian cyber threats, emphasizing the need for organizations across various sectors to remain vigilant. Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber, emphasized the persistent menace posed by state-sponsored Russian cyber actors targeting both government and private entities. He cited recent reports on the Seashell Blizzard group as a prime example of the ongoing threat.

Rasheen Whidbee, creator of Tech Tales newsletter, warned of the potential repercussions of ignoring Russian cyber advisories, stressing the critical need for robust threat detection capabilities to prevent exploitation of vulnerabilities.

In a separate development, reports indicated that US Defense Secretary Pete Hegseth directed US Cyber Command to halt all offensive actions targeting Russia, effectively suspending digital countermeasures against the country. This directive was relayed to Gen. Timothy Haugh, head of Cyber Command, impacting potentially hundreds to thousands of personnel involved in these operations.

The decision to cease offensive actions against Russia could have far-reaching implications, particularly in regions like Ukraine, where Cyber Command had been actively supporting cybersecurity efforts against Russian threats. The move may significantly impact ongoing defense strategies and intelligence operations in the face of escalating cyber warfare.

Overall, the dynamic landscape of cybersecurity threats underscores the critical importance of maintaining vigilance and cooperation in defending against evolving cyber threats, whether originating from Russia or other hostile entities. CISA’s reaffirmed commitment to protecting US critical infrastructure indicates a steadfast resolve in safeguarding national security interests in the face of cyber adversities.

Source link

Latest articles

Is Security Human Factors Research Biased Towards Western Ideals and Practices? – Source: www.schneier.com

A recent study titled "How WEIRD is Usable Privacy and Security Research?" conducted by...

Winning at SAML roulette: the hacker’s advantage

In a recent development, researchers have unveiled a groundbreaking method to exploit round-trip attacks...

GitHub Data Breach Exposes Thousands of Software Supply Chain Secrets

GitHub Actions, a popular CI/CD service utilized by developers to automate software builds and...

Participation Needed for Wellbeing in the Cybersecurity Sector

In the realm of cybersecurity, a pressing issue looms large - the wellbeing of...

More like this

Is Security Human Factors Research Biased Towards Western Ideals and Practices? – Source: www.schneier.com

A recent study titled "How WEIRD is Usable Privacy and Security Research?" conducted by...

Winning at SAML roulette: the hacker’s advantage

In a recent development, researchers have unveiled a groundbreaking method to exploit round-trip attacks...

GitHub Data Breach Exposes Thousands of Software Supply Chain Secrets

GitHub Actions, a popular CI/CD service utilized by developers to automate software builds and...