www.cisa.gov Open in urlscan Pro
2a02:26f0:480:4a5::447a  Public Scan

Submitted URL: http://www.cisa.gov/
Effective URL: https://www.cisa.gov/
Submission: On February 08 via api from IT — Scanned from IT

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   LocallyFaith-Based CommunityExecutives
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub
   2023 Year In Review
   Contact Us

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. 

Share:




SHIELDSUP

Prepare for, respond to, and mitigate the impact of cyberattacks.

learn more
slide 1 of 5


U.S. AND INTERNATIONAL PARTNERS PUBLISH CYBERSECURITY ADVISORY ON PEOPLE’S
REPUBLIC OF CHINA STATE-SPONSORED HACKING OF U.S. CRITICAL INFRASTRUCTURE

U.S. and international government agencies warn of malicious activity by a PRC
state-sponsored cyber actor, known as Volt Typhoon, to compromise critical
infrastructure. Read advisory for actions that should be urgently undertaken by
all organizations

Read the Advisory


JUST LAUNCHED!

Visit cisa.gov/Protect2024 for the most current election resources.

#Protect2024


PEOPLE’S REPUBLIC OF CHINA’S STATE-SPONSORED CYBERSECURITY THREATS

ICYMI: Director Easterly testifies on the People’s Republic of China’s
State-Sponsored Cybersecurity Threats to U.S. Critical Infrastructure.

cisa.gov/china


IDENTIFYING AND MITIGATING LIVING OFF THE LAND TECHNIQUES

Detecting and mitigating “living off the land” malicious cyber activity requires
a multi-faceted and comprehensive approach to discern legitimate behavior from
malicious behavior. 

Read more


WATER AND WASTEWATER CYBERSECURITY TOOLKIT

Jointly developed by CISA and EPA, this toolkit offers guidance on incident
response, vulnerability scanning services, cybersecurity performance goals and
more.

Learn About the Toolkit
PreviousNext
15


NEWS UPDATES

Feb 07, 2024
Press Release


U.S. AND INTERNATIONAL PARTNERS PUBLISH CYBERSECURITY ADVISORY ON PEOPLE’S
REPUBLIC OF CHINA STATE-SPONSORED HACKING OF U.S. CRITICAL INFRASTRUCTURE

Feb 07, 2024
Press Release


CISA AND EPA COLLABORATE ON WATER AND WASTEWATER SECTOR CYBER RESOURCES

Feb 07, 2024
Press Release


CISA LAUNCHES #PROTECT2024 RESOURCES WEBPAGE FOR STATE AND LOCAL ELECTION
OFFICIALS

Feb 06, 2024
Press Release


CISA ANNOUNCES RENEWAL OF THE INFORMATION AND COMMUNICATIONS TECHNOLOGY SUPPLY
CHAIN RISK MANAGEMENT TASK FORCE

Feb 01, 2024
Blog


CISA HOSTS SECOND CYBER RESILIENT 911 SYMPOSIUM

View More News



LATEST OPERATIONAL INFORMATION

Feb 07, 2024
Alert


CISA AND PARTNERS RELEASE ADVISORY ON PRC-SPONSORED VOLT TYPHOON ACTIVITY AND
SUPPLEMENTAL LIVING OFF THE LAND GUIDANCE

Feb 07, 2024
Alert


VMWARE RELEASES SECURITY ADVISORY FOR ARIA OPERATIONS FOR NETWORKS

Feb 07, 2024
Analysis Report | AR24-038A


MAR-10448362-1.V1 VOLT TYPHOON

Feb 07, 2024
Cybersecurity Advisory | AA24-038A


PRC STATE-SPONSORED ACTORS COMPROMISE AND MAINTAIN PERSISTENT ACCESS TO U.S.
CRITICAL INFRASTRUCTURE

Feb 06, 2024
Alert


CISA RELEASES TWO INDUSTRIAL CONTROL SYSTEMS ADVISORIES

View All Alerts & Advisories Subscribe to Updates (link is external)


HOW CAN WE HELP?

All Audiences


FIND HELP LOCALLY

Contact your Region

Assist Visits

Protected Critical Infrastructure Information


INDUSTRY

Information Sharing: A Vital Resource

PCII Program modernized

Joint Cyber Defense Collaborative expands


SMALL AND MEDIUM BUSINESSES

Cyber guidance for small businesses

Supplementing passwords

Doing business with CISA


EDUCATIONAL INSTITUTIONS

School Safety

Cybersecurity for K-12

K-12 School Security Product Suite

Protecting Our Future: Partnering to Safeguard K-12 Organizations from
Cybersecurity Threats

All Audiences

StopRansomware.gov is the U.S. Government's official one-stop location for
resources to tackle ransomware more effectively.

Learn More

The Secure Our World program offers resources and advice to stay safe online.
Each of us has a part to play; it’s easy to do and takes less time than you
think!

Learn More

SAFECOM works to improve emergency communications interoperability across local,
regional, tribal, state, territorial, international borders, and with federal
government entities. 

Learn More


ADDITIONAL CISA RESOURCES


CISA SERVICES CATALOG

A single resource that provides you with access to information on services
across CISA’s mission areas.




CISA PUBLICATIONS

Free cybersecurity tools and resources to help organizations advance their
security capabilities.




CISA REGIONS

CISA provides regional cyber and physical services to support security and
resilience across the United States.




CISA EVENTS

CISA hosts and participates in events throughout the year to engage
stakeholders, seek research partners, and communicate with the public to help
protect the homeland.


Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback