US warns hidden radios may be embedded in solar-powered highway infrastructure - Reuters

The US government has issued a warning about the potential cybersecurity risks posed by hidden radios embedded within solar-powered highway infrastructure. These concealed devices could be exploited by malicious actors to conduct unauthorized surveillance or disrupt critical transportation networks. The integration of advanced technology in public infrastructure, while beneficial for energy efficiency and smart city initiatives, introduces new attack surfaces that require vigilant security measures. This development highlights the growing intersection of cybersecurity and physical infrastructure, emphasizing the need for comprehensive risk assessments and proactive defense strategies. Stakeholders in the transportation and energy sectors must collaborate to ensure the resilience of these systems against emerging threats. The warning serves as a call to action for policymakers, engineers, and cybersecurity professionals to prioritize security in the design and deployment of innovative infrastructure solutions. As the adoption of solar-powered and smart highway technologies accelerates, continuous monitoring and threat intelligence will be crucial to safeguard national security and public safety.

This Cyber News was published on www.reuters.com. Publication date: Wed, 10 Sep 2025 22:29:04 +0000


Cyber News related to US warns hidden radios may be embedded in solar-powered highway infrastructure - Reuters

US warns hidden radios may be embedded in solar-powered highway infrastructure - Reuters - The US government has issued a warning about the potential cybersecurity risks posed by hidden radios embedded within solar-powered highway infrastructure. These concealed devices could be exploited by malicious actors to conduct unauthorized ...
4 weeks ago Reuters.com
46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings - Researchers have uncovered critical security flaws in global solar power infrastructure that could potentially allow malicious actors to seize control of solar inverters and manipulate power generation at scale. Research indicates over half of solar ...
6 months ago Cybersecuritynews.com
EFF Helps News Organizations Push Back Against Legal Bullying from Cyber Mercenary Group - For the last several months, there has emerged a campaign of bullying and censorship seeking to wipe out stories about the mercenary hacking campaigns of a less well-known company, Appin Technology, in general, and the company's cofounder, Rajat ...
1 year ago Eff.org
Exclusive: OpenAI researchers warned board of AI breakthrough ahead of CEO ouster, sources say - Nov 22 - Ahead of OpenAI CEO Sam Altman's four days in exile, several staff researchers wrote a letter to the board of directors warning of a powerful artificial intelligence discovery that they said could threaten humanity, two people familiar with ...
1 year ago Reuters.com
Embedded Linux IoT Security: Defending Against Cyber Threats - Embedded Linux IoT systems are now essential parts of many different kinds of products, from industrial machinery and smart appliances to medical equipment and automobile systems. As Embedded Linux is being used widely, it has attracted the attention ...
1 year ago Securityboulevard.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
The Embedded Systems and The Internet of Things - The Internet of Things is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This concept is gaining its popularity amongst the embedded systems that exist - let's say - 10 or ...
1 year ago Cyberdefensemagazine.com
CALISTO doxxing: Sekoia.io findings concurs to Reuters' investigation on FSB-related Andrey Korinets - The USA and UK government announced sanctions against two Russian nationals, Ruslan Peretyatko and Andrey Korinets, accused to be actively involved into CALISTO operations. One year ago, on 6 January 2023, Sekoia.io distributed to our customers a ...
1 year ago Blog.sekoia.io
5 Critical Steps to Prepare for AI-Powered Malware in Your Connected Asset Ecosystem - Voice synthesis has already been used in a few fake kidnap extortion attempts and possibly in one or two Business Email Compromise attacks as well, but that's about it. AI-powered malware represents a new frontier in the ever-expanding portfolio of ...
1 year ago Securityweek.com
U.S. officials Investigating Rogue Communication Devices in Solar Power Inverters - According to security experts familiar with the matter, these unauthorized components create secondary communication channels that may allow remote access to critical energy infrastructure without detection, potentially enabling foreign actors to ...
4 months ago Cybersecuritynews.com
Renewable Energy Technology: Powering the Future - Engage in the discussion on how renewable energy technology is set to revolutionize our world and reshape the energy landscape for future generations. From rooftop solar panels to large solar farms, this renewable technology is leading us towards ...
1 year ago Securityzap.com
Trump Revenge Tour Targets Cyber Leaders, Elections – Krebs on Security - Incredibly, the president’s memo seeking to ostracize Krebs stands reality on its head, accusing Krebs of promoting the censorship of election information, “including known risks associated with certain voting practices.” Trump also ...
5 months ago Krebsonsecurity.com Hunters
MITRE Debuts ICS Threat Threat Modeling for Embedded Systems - MITRE, in collaboration with researchers from three other organizations, this week released a draft of a new threat-modeling framework for makers of embedded devices used in critical infrastructure environments. The goal with the new EMB3D Threat ...
1 year ago Darkreading.com
How an Indian startup hacked the world - Reuters previously named Appin in a story about Indian cyber mercenaries published last year. This report paints the clearest picture yet of how Appin operated, detailing the world-spanning extent of its business, and international law enforcement's ...
1 year ago Reuters.com
A Startup Allegedly 'Hacked the World.' Then Came the Censorship-and Now the Backlash - Techdirt founder Mike Masnick says that, beyond defeating the censorship of the Appin Technology story, he hopes their public response to that censorship effort will ultimately bring even more attention to the group's past. Neither Appin Training ...
1 year ago Wired.com
Rivian Up To $5 Billion Investment From Volkswagen - Rivian has entered into a joint venture with Volkswagen, which will see the German car giant invest billions of dollars into the electric vehicle firm. In the equally controlled and owned joint venture, Volkswagen will invest an initial $1 billion in ...
1 year ago Silicon.co.uk
CISOs Respond to Surge in AI-Powered Attacks with Advanced Defense Strategies - As AI becomes central to both attack and defense strategies, organizations must invest in building specialized expertise within their security teams. Unlike traditional attacks, which often rely on manual effort or simple automation, AI-powered ...
5 months ago Cybersecuritynews.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 year ago Cyberdefensemagazine.com Akira
Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry - Threat actors have been utilizing a modified version of the SharpHide tool to create hidden registry values, significantly complicating detection and deletion efforts. [+] SharpDelete by Andrew Petrus - Tool to delete hidden registry values ...
7 months ago Cybersecuritynews.com
A Plan to Protect Critical Infrastructure from 21st Century Threats - On April 30th, the White House released National Security Memorandum-22 on Critical Infrastructure Security and Resilience, which updates national policy on how the U.S. government protects and secures critical infrastructure from cyber and ...
1 year ago Cisa.gov
CVE-2023-46254 - capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by `capsule-proxy` gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind ...
1 year ago
This tiny device is sending updated iPhones into a never-ending DoS loop - One morning two weeks ago, security researcher Jeroen van der Ham was traveling by train in the Netherlands when his iPhone suddenly displayed a series of pop-up windows that made it nearly impossible to use his device. "My phone was getting these ...
1 year ago Arstechnica.com
Investing in Africa's Clean Energy Transition - Among our vision, we see the transition to clean energy not just as a necessity, but as a catalyst for inclusive growth and digital innovation. Africa's energy landscape is confronting a critical shortfall, with roughly 600 million people in ...
1 year ago Feedpress.me
Twitter/X Content Moderation Law In California - Elon Musk's X loses bid to block California law that requires social media to publicly disclose their content moderation practices. The legal attempt by Elon Musk's X to undo a California state law on content moderation, has failed. Reuters reported ...
1 year ago Silicon.co.uk

Cyber Trends (last 7 days)