IT infrastructure has traditionally focused on managing electrical power supply adequacy. The item warns that cyberattackers are now exploiting voltage fluctuations as a new attack methodology, extending the threat landscape beyond traditional cyber vectors.