CISA continues to respond to active exploitation of internet-accessible operational technology (OT) and industrial control systems (ICS) devices, including those in the Water and Wastewater Systems (WWS) Sector. Exposed and vulnerable OT/ICS systems may allow cyber threat actors to use default credentials, conduct brute force attacks, or use other unsophisticated methods to access these devices and cause harm.  Â

CISA urges OT/ICS operators in critical infrastructure sectors to apply the recommendations listed in Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity to defend against this activity. To learn more about secure by design principles and practices, visit CISA’s Secure by Design webpage. For more information and guidance on protection against the most common and impactful threats, tactics, techniques, and procedures, visit CISA’s Cross-Sector Cybersecurity Performance Goals.

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

Ransomware used in attack that disrupted US hospitalsÂ

May 13, 2024 0 Comments 0 tags

A cyberattack that disrupted operations at one of the United States’s largest health care systems last week was carried out using ransomware, the company that was targeted said on Saturday.Â

CISA Adds One Known Exploited Vulnerability to Catalog

May 28, 2024 0 Comments 0 tags

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-5274 Google Chromium V8 Type Confusion Vulnerability These types of vulnerabilities are frequent

Ransomware group releases screenshots in attempted extortion of Port of Seattle

September 16, 2024 0 Comments 0 tags

The cybercriminals responsible for the attempted extortion of the Port of Seattle posted on Monday a 100-bitcoin ransom demand and images of purported documents stolen from the organization. The images