Security News > 2023 > April > Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation's Crown Jewels

According to Etay Maor, Senior Director Security Strategy at Cato Networks, "It's interesting to note critical infrastructure doesn't necessarily have to be power plants or electricity. A nation's monetary system or even a global monetary system can be and should be considered a critical infrastructure as well."
Not to mention the infamous Colonial Pipeline attack, which has become the poster child of critical infrastructure attacks.
Supply chain attacks are a key way to attack critical infrastructure.
Just like bombings in WW2 targeted factories that provided supplies to the military, supply chain cyber attacks target the nation's critical infrastructure suppliers.
The potential severity of attacks on critical infrastructure has driven nations to establish a cyber defense organization to defend their critical assets, and prepare for conflicts.
To learn more about how CISA operates and how to prevent supply chain attacks on critical infrastructure, the Cato Networks' Cyber Security Masterclass series is available for your viewing.
News URL
https://thehackernews.com/2023/04/supply-chain-attacks-and-critical.html
Related news
- CISA tags critical Ivanti EPM flaws as actively exploited in attacks (source)
- CISA: Medusa ransomware hit over 300 critical infrastructure orgs (source)
- North Korea targets crypto developers via NPM supply chain attack (source)
- Critical PostgreSQL bug tied to zero-day attack on US Treasury (source)
- CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks (source)
- CISA flags Craft CMS code injection flaw as exploited in attacks (source)
- Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers (source)
- China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access (source)
- US charges Chinese hackers linked to critical infrastructure breaches (source)
- Critical PHP RCE vulnerability mass exploited in new attacks (source)