you are live in the cnn newsroom. i m jim acosta in washington. just days after the january 6 committee exposed a president whose actions were a disaster, there is little evidence that donald trump has lost his mojo with the far right of the republican party. in fact, he was greeted with a hero s welcome last night in florida. watch this, complete with video and pyrotechnics. ladies and gentlemen, please welcome the 45th president of the united states of america, donald j. trump! and i m proud to be an american where at least i know i m free and i won t forget the men who died who gave that right to me and i gladly stand up next to you and remember still today but unlike the lyrics to that lee greenwood song, trump didn t gladly stand up to defend the country on january 6. he sat watching tv fo 187 minutes while the insurrection happened and even last night he wasn t letting go of his bogus election grievances. if i stayed home, if i announce that
isn t the kind of place you d think would be at the heart of an international cyber attack suspected of being carried carried out by hackers that have cooperated with a sophisticated russian military intelligence unit but a new report says, this city s water treatment facility computer system was attacked by suspected russian hackers in january, causing a water tank to overflow the city manager said it overflowed for about 30 to 45 minutes. the question that comes to mind is, why a water treatment facility and why in a place like mule shoe, texas, right? it s a great question. gas serena is a cybersecurity expert focused on the vulnerability of public water systems an organization may think we re kind of too small. we re not high enough strategic value for some nation-state adversary to come after us. however victims are finding that they are affected simply because of the technology that they have that s sitting unprotected on the internet and findable and exploitable in the repor
may think we re kind of too small. we re not high enough strategic value for some nation-state adversary to come after us. however, victims are finding that they are affected simply because of the technology that they have. that s sitting unprotected on the internet and findable and exploitable in the report published by the cybersecurity firm mandiant cyber experts say that a russian intelligence unit known as sand worm is involved in an online persona called the cyber army of russia reborn. that claimed credit for the attack on mule shoe. there was also suspicious activity targeting public water systems in three other west texas cities abernathy hale center, and lock knee according to officials, but a west texas know-how i guess so buster pulling is the city manager and lock me. he says officials noticed unusual activity in the computer system and made security changes to keep the hackers from taking control what was your reaction when you found out that it might have been a russian
a new report says this city s water treatment facility computer system was attacked by suspected russian hackers in january causing a water tank to overflow city manager said it overflowed for about 30 to 45 minutes. the question that comes to mind is why a water treatment facility and why in a place like mules do texas, right? it s a great question. gas serena is a cybersecurity expert focused on the vulnerability of public water systems in organization may think we re kind of too small. we re not high enough strategic value for some nation-state adversary to come after us. however, victims are finding that they are affected simply because because of the technology that they have, that s sitting unprotected on the internet and findable and exploitable in the report published by the cybersecurity firm mandiant, cyber experts say that a russian intelligence unit known as sand worm is involved in an online persona called the cyber army of russia reborn that claimed credit for
for their financial motivations and ultimately has told us that that s what their motivations are in issuing statements and have been very communicative with their victims because ultimately they want to get paid. for them, this is a business model. this is a well-known attacker who we understand their methodology and what their aims are. unlike nation states and hopefully from their perspective they wouldn t want to be uncovered at all. night and day from this particular hacker who s financially motivated and a nation state adversary. we had warnings from some states where driver s licenses were compromised. this is important for folks who might think they might be vulnerable, concretely, what steps can they take out there to protect themselves? so, unfortunately, they truly are the ultimate victims. that s the nature of these