Threat Actors Continue to Exploit OT/ICS through Unsophisticated Means | CISA
- by nlqip
CISA continues to respond to active exploitation of internet-accessible operational technology (OT) and industrial control systems (ICS) devices, including those in the Water and Wastewater Systems (WWS) Sector. Exposed and vulnerable OT/ICS systems may allow cyber threat actors to use default credentials, conduct brute force attacks, or use other unsophisticated methods to access these devices and cause harm.
CISA urges OT/ICS operators in critical infrastructure sectors to apply the recommendations listed in Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity to defend against this activity. To learn more about secure by design principles and practices, visit CISA’s Secure by Design webpage. For more information and guidance on protection against the most common and impactful threats, tactics, techniques, and procedures, visit CISA’s Cross-Sector Cybersecurity Performance Goals.
Source link
lol
CISA continues to respond to active exploitation of internet-accessible operational technology (OT) and industrial control systems (ICS) devices, including those in the Water and Wastewater Systems (WWS) Sector. Exposed and vulnerable OT/ICS systems may allow cyber threat actors to use default credentials, conduct brute force attacks, or use other unsophisticated methods to access these devices and…
Recent Posts
- Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%
- HaloPSA Founder: With $1B Revenue Goal, ‘We Want To Be The World’s Favorite B2B SaaS Platform’
- Timeshare Owner? The Mexican Drug Cartels Want You – Krebs on Security
- CISA: Hackers target industrial systems using “unsophisticated methods”
- Solution Providers Are Helping Customers Navigate Complex AI PC Landscape