
Click Here The other battlefield
16 snips
Mar 20, 2026 A deep dive into Iran-linked cyber intrusions that target critical infrastructure. Stories include water utility and brewery PLC defacements and how default credentials let attackers in. Discussion of a group leaking data and using emotional lures to spread malware. Exploration of how hybrid warfare tactics are reshaping digital conflict.
AI Snips
Chapters
Transcript
Episode notes
Cybersecurity Evangelist Drawn Into Small Plant Incident
- Jennifer Lynn Walker fell into cybersecurity and became an evangelist focused on industrial facilities security.
- She now runs cyber defense at Water ISAC and was pulled into a response meeting after the Aliquippa water alert revealed a PLC defacement from the Cyber Avengers.
Physical Systems Are Exposed Through Internet-Connected PLCs
- Industrial control attacks target access patterns, not company size, by exploiting PLCs that run physical processes like pressure and chemical dosing.
- The Aliquippa hack used a Unitronics PLC with default credentials, showing physical risk from trivial internet exposure.
Remove Defaults And Disconnect Unnecessary PLCs
- Change factory default credentials and remove PLCs from the internet when not needed to prevent trivial scanning-based attacks.
- Cyber Avengers found Unitronics devices by scanning for defaults like password 1111 and exploited those reachable online.
