Check Point Threat Map
threatmap.checkpoint.com
Live Cyber Threat Map | Check Point
You need to enable JavaScript to run this app
CISA
cisa.gov › stopransomware › official-alerts-statements-cisa
Official Alerts & Statements - CISA | CISA
Although cyber threats across critical infrastructure sectors are increasing, this advisory does not intend to indicate greater targeting of the WWS Sector versus others. ... CISA, FBI, and NSA published a joint advisory on Conti ransomware with technical details, adversary behavior mapped to MITRE ATT&CK and recommended mitigations. CISA and the FBI have observed the increased use of Conti ransomware in more than 400 attacks on U.S.
Videos
“Our power grids are sixty to seventy years old in some places ...
15:25
Kash Patel Warns a Cyber Attack Could Trigger a National Blackout ...
03:07
Federal agencies warned of "imminent risk" after possible data ...
02:56
Cyberattack concerns grow as Iran retaliates against the US following ...
01:16
Homeland Security warns of heightened threats in U.S. - YouTube
01:50
China Accuses US of Cyberattack on National Time Center | WORLD ...
GovInfo
govinfo.gov › content › pkg › CHRG-112hhrg77380 › html › CHRG-112hhrg77380.htm
- AMERICA IS UNDER CYBER ATTACK: WHY URGENT ACTION IS NEEDED
I now recognize myself for an opening statement. America's computers are under attack and every American is at risk. The United States Government, critical infrastructures, American business institutions, and our personal data are being compromised by nation-states and hacker groups.
Kaspersky Cyberthreat Map
cybermap.kaspersky.com
MAP | Kaspersky Cyberthreat live map
MAP | Find out if you are under cyber-attack here
Radware Threat Map
livethreatmap.radware.com
Live Cyber Threat Map | Radware
Radware’s Live Threat Map presents near real-time information about cyberattacks as they occur, based on our global threat deception network and cloud systems event information.
DNI
dni.gov › files › CTIIC › documents › products › Recent_Cyber_Attacks_on_US_Infrastructure_Underscore_Vulnerability_of_Critical_US_Systems-June2024.pdf pdf
Recent Cyber Attacks on US Infrastructure Underscore ...
REPORTED CYBER ATTACKS ON US ICS, 23 NOVEMBER 2023 THROUGH 22 APRIL 2024
The Hacker News
thehackernews.com
The Hacker News | #1 Trusted Source for Cybersecurity News
That same month, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to the Known Exploited Vulnerabilities (KEV) catalog... Jan 09, 2026 Email Security / Threat Intelligence · Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan.
Imperva
imperva.com › home
Live Threat Map | Real-time View of Cyber Attacks | Imperva
May 4, 2020 - A real-time global view of DDoS attacks, hacking attempts, and bot assaults mitigated by Imperva security services.
DHS
dhs.gov › topics › cybersecurity
Cybersecurity | Homeland Security
The Cyber Safety Review Board (CSRB), an independent public-private advisory body administered by DHS through CISA, brings together public and private sector cyber experts/leaders to review and draw lessons learned from the most significant cyber incidents. Under the leadership of the Board’s Chair, DHS Under Secretary for Policy Robert Silvers, and Deputy Chair, Google VP for Security Engineering Heather Adkins, the CSRB recently published its first report on the Log4j software vulnerability.
CISA
cisa.gov › topics › cyber-threats-and-advisories
Cyber Threats and Advisories | Cybersecurity and Infrastructure Security Agency CISA
CISA diligently tracks and shares information about the latest cybersecurity risks, attacks, and vulnerabilities, providing our nation with the tools and resources needed to defend against these threats. CISA shares up-to-date information about high-impact types of security activity affecting ...
Center for Strategic and International Studies
csis.org › csis programs › strategic technologies program
Significant Cyber Incidents | Strategic Technologies Program | CSIS
October 2024: Iranian agents are increasing their espionage efforts against government agencies in the United Arab Emirates. Attackers deployed a backdoor to exfiltrate sensitive credentials · October 2024: Russian cybercriminals sent information-stealing malware to an unknown number of Ukrainian draft-age men to undermine Ukraine's military recruitment efforts.
KonBriefing
konbriefing.com › en-topics › cyber-attacks-usa.html
Cyber attacks USA 2025, 2024 | KonBriefing.com
August 13, 2025 - Affected industries: 13 Public sector: 8, Education: 4, Finance: 2, Healthcare: 2, Hospital: 2, Municipality: 2, Automotive: 1, Food: 1, IT: 1, Media: 1, Pharmaceutical: 1, Universities: 1, Utility: 1 · Totals may differ because multiple assignments are possible or, conversely, not every entry can be assigned to a country or industry. ... Providence schools superintendent confirms cyberattack. Why they've been silent until now
PortSwigger
portswigger.net › daily-swig › us
Latest cybersecurity news from the US | The Daily Swig
Cyber-attacks in US states have made news in recent years after a wave of ransomware assaults hit the nation.
Wikipedia
en.wikipedia.org › wiki › Cyberwarfare_and_the_United_States
Cyberwarfare and the United States - Wikipedia
3 weeks ago - CVERC said that the attacks did not cause significant damage, and condemned cyberattacks targeting major international events. The allegation were made in the midst of a trade war between the US and China and after the US accused Beijing of carrying out a cyberespionage campaign that targeted US-based critics of Beijing. In June 2019, Russia said that its electrical grid could be under cyber-attack by the United States.
CISA
cisa.gov › news-events › cybersecurity-advisories
Cybersecurity Alerts & Advisories | CISA
Advisories typically cover recent or ongoing cyber threats, state-sponsored cyber activity, cyber trends, and/or actionable insights gleaned from incident response or red team engagements. Use when: You need deep technical insight and guidance on how to defend against or respond to a specific threat. Malware Analysis Report: Provides comprehensive details of malware samples, including a description of the malware’s functionality, as well as malware metadata and detection signatures. Use when: You need in-depth understanding of how a piece of malware works and how to detect or defend against it.
Reddit
reddit.com › r › cybersecurity
cybersecurity
May 22, 2012 - The amount of cybersecurity branches getting gutted is incredible. How quickly do you think a nation state cripples our infastucture? ... https://securityish.com/security_brief/reddit-and-x-users-allegedly-unredact-epstein-files-after-doj-release/ How do orgs run pen tests without accidentally causing real side effects? ... We had a situation recently and I’m trying to understand how this is supposed to work at most orgs.