Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

CISA Alerts: Siemens, AVEVA & PTZOptics Flaws in Industrial Systems

by Jane Doe
June 16, 2025
in Cyber
A A
0
Share on FacebookShare on Twitter

U.S. Senator Maria Cantwell (D-WA) the Ranking Member of the Senate Committee on Commerce, Science, and Transportation, continues to hammer telecommunications giants AT&T and Verizon for transparency. The Senator wants a full accounting of current vulnerabilities after the sustained Chinese state-linked “Salt Typhoon” cyber operation hollowed out major U.S. networks.

Even as AT&T and Verizon told Americans their networks were secure and the threat “mitigated” in December 2024, letters to AT&T CEO John Stankey and Verizon CEO Hans Vestberg from Senator Cantwell indicate cybersecurity experts still have concerns. “Former and current government experts are telling us that Salt Typhoon may be alive in our U.S. networks,” Cantwell expressed, adding that the telecommunications infrastructure exists in a way that opens the possibility of return via multiple routes.

I want to note that the breach around the “Salt Typhoon” vulnerability–while this was the first time the FBI and others publicly confirmed the vulnerability–is an outrageously serious national security problem. The hackers obtained access to valuable geolocation and cell phone usage data on millions of Americans, including American officials and spies, and also extracted copies of information entered into US law enforcement wiretaps. This level of intrusion has sounded alarms around the security of critical infrastructure and the privacy of Americans.

Senator Cantwell has given both companies until June 26, 2025, to submit volumes of detailed documentation. Her demands include full copies of their plans for remediating the attacks, supporting documents listing what has been spent to protect networks from nation-state threats, and third-party check-up information, as well as current customer data encryption policies.

Read Also

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

Black Hat SEO Poisoning Search Engine Results For AI

Away from the critical incidents, Cantwell has expressed to a potential law enforcement audience some broader concerns with policy decisions – such as a potential Republican Reconciliation bill that emanates and is about to be the subject of a vehicle that auctions off vital national security spectrum to private telecom.

Instead, she says, doing so could make it easier for foreign adversaries to meddle and infiltrate, creating new vulnerabilities atop the ones revealed by “Salt Typhoon.” The continued focus highlights the importance of telecom firms further strengthening their defenses and ensuring that they are completely open with customers and government surveillance agencies.

Jane Doe

You May Also Likes!

Iranian-backed hackers go to work after U.S. strikes
Cyber

Cyber is now the third-largest economy in the world – June 2025 Report

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

DHS warns of heightened cyber threat as US enters Iran conflict

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Leak of data belonging to 7.4 million Paraguayans traced back to infostealers

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Billions of login credentials have been leaked online, Cybernews researchers say

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Global cyber alert: Iranian hackers strike U.S. banks, defence and oil firms

by Jane Doe
June 25, 2025
Load More

Recommended

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

June 5, 2025
New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

May 31, 2025
23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

June 23, 2025
Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Iranian-backed hackers go to work after U.S. strikes

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Black Hat SEO Poisoning Search Engine Results For AI

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Cyber is now the third-largest economy in the world – June 2025 Report

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

DHS warns of heightened cyber threat as US enters Iran conflict

June 25, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.