·

What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/6/26

Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week.

Featured Analysis

Iran-linked Hackers Disrupt U.S. Critical Infrastructure via PLC Attacks / 4,000 U.S. Industrial Devices Exposed.

The recent escalation in cyber-physical attacks targeting Programmable Logic Controllers (PLCs) across U.S. water and energy sectors represents a critical shift in the threat landscape. By exploiting Unitronics Vision Series PLCs through default credential sets and direct internet exposure, the Iran-affiliated group “Cyber Av3ngers” has successfully moved beyond mere data exfiltration into the realm of operational technology (OT) disruption. This incident highlights a systemic failure in securing industrial control systems (ICS), where legacy hardware is often connected to the public internet without the robust perimeter defenses typically found in enterprise IT environments.

Technically, the vulnerability lies in the lack of multi-factor authentication (MFA) and the persistence of default “1111” administrative passwords on internet-facing controllers. Once access is gained, attackers utilize the PCOM protocol to manipulate the device’s logic, change setpoints, or completely disable the human-machine interface (HMI). These actions can lead to physical consequences, such as altering chemical levels in water treatment or disrupting pressure valves in gas pipelines. The exposure of nearly 4,000 similar devices across the United States underscores a massive surface area for state-sponsored actors to conduct non-kinetic warfare with high-impact results.

For CISOs and OT security managers, this campaign serves as a definitive wake-up call regarding the convergence of IT and OT. Securing these environments requires a transition from “security by obscurity” to a zero-trust architecture specifically tailored for industrial protocols. Immediate remediation steps must include the removal of PLCs from the public internet, the implementation of robust VPNs with MFA for remote access, and the mandatory rotation of all factory-default credentials. Failure to segment these critical assets will continue to leave national infrastructure vulnerable to geopolitical tensions played out in cyberspace.

Projects

Articles

, , , , , , , ,