Cybersecurity officials in the United States have issued a serious warning about ongoing threats to Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems—especially those in the oil and gas sector. Agencies including CISA (Cybersecurity and Infrastructure Security Agency), the FBI, the EPA, and the Department of Energy have come together to alert operators about a new wave of cyberattacks. The concern? Hackers are targeting these systems with methods that are surprisingly simple, yet extremely dangerous.
The attackers aren’t using highly sophisticated techniques. Instead, they are exploiting common weaknesses—like default login credentials that were never changed, or remote access systems that aren’t properly secured. These might sound like minor oversights, but in critical infrastructure, the consequences are huge. A successful attack could lead to defaced systems, complete shutdowns of essential services, or even damage to physical equipment that costs millions to replace.
What makes this threat more alarming is how avoidable it is. Agencies are encouraging organizations to take immediate and practical action to secure their systems. One of the first recommendations is disconnecting Operational Technology (OT) systems from the public internet. Public exposure creates unnecessary risk, especially when the systems control things like oil pipelines or refinery operations.
Strong password management is another major step. Using complex, unique passwords—and avoiding default or reused credentials—is crucial. In addition, remote access should only be allowed through secure, private networks. Where remote access is necessary, it should always be protected with phishing-resistant multi-factor authentication.
Another key point is segmentation. ICS and SCADA systems should be separated from the main IT networks using secure demilitarized zones (DMZs). This helps contain any breaches and limits an attacker’s ability to move through connected systems. Organizations should also prepare for the worst by maintaining manual operation capabilities in case digital systems are compromised.
These steps may seem basic, but they are often overlooked. As cybersecurity threats increase, especially in critical sectors like oil and gas, there is no room for neglect. This advisory is a strong reminder that protecting ICS SCADA systems is not optional—it’s a priority.
News Source: cybersecuritynews.com
For deeper coverage on ICS SCADA systems cybersecurity and expert insights on infrastructure threats, visit SOC News.
IBM will invest more than $30 billion in research and development to advance and continue its American manufacturing of mainframe and quantum computers.
IBM today announced a sweeping $150 billion investment plan to strengthen American innovation and leadership in advanced computing over the next five years, including more than $30 billion in research and development to advance and continue its American manufacturing of mainframe and quantum computers.
The move reinforces IBM’s commitment to American manufacturing, with a strong focus on expanding its capabilities in mainframe and quantum computing — two critical pillars for national security and economic competitiveness.
“Technology doesn’t just build the future — it defines it,” said Arvind Krishna, IBM chairman, president, and CEO.
IBM’s legacy of powering major American milestones, from the Social Security system to the Apollo Program, continues today in Poughkeepsie, New York, where Big Blue claims its American-built mainframes underpin more than 70% of the world’s transactional value.
Equally significant is IBM’s commitment to quantum computing, a technology poised to redefine the global technology landscape. IBM operates a large fleet of quantum computers and continues to design, build, and assemble these systems domestically. Quantum advancements promise to solve complex problems beyond the reach of classical computing, with profound implications for national security, cryptography, and industrial innovation.
Stay updated with SOC News for cutting-edge security innovations and expert industry insights!
China accused the United States National Security Agency (NSA) on Tuesday of launching “advanced” cyberattacks during the Asian Winter Games in February, targeting essential industries.
Police in the northeastern city of Harbin said three alleged NSA agents to a wanted list and also accused the University of California and Virginia Tech of being involved in the attacks after carrying out investigations, according to a report by state news agency Xinhua on Tuesday.
The NSA agents were identified by Xinhua as Katheryn A. Wilson, Robert J. Snelling and Stephen W. Johnson. The three were also found to have “repeatedly carried out cyber attacks on China’s critical information infrastructure and participated in cyber attacks on Huawei and other enterprises.”
It did not specify how the two American universities were involved.
Stay updated with SOC News for cutting-edge security innovations and expert industry insights!