On February 28, ships navigating the Strait of Hormuz started appearing on tracking screens in places they couldn't possibly be. They appeared to be sitting on airport runways, parked on Iranian land, and clustered at nuclear power plants. More than 1,100 commercial vessels had their navigation systems scrambled in a single day following US-Israeli airstrikes on Iran, bringing a waterway that handles a fifth of the world's oil exports to a halt.
The reported wiper attack ... may represent a similar dynamic, an early signal of activity that could expand beyond a single target. Organizations need to assume that attackers will gain a foothold and focus on proactively shutting down the attack paths adversaries rely on to escalate privileges, move laterally and expand their impact.
In Kuwait, about 90% of drinking water comes from desalination, along with roughly 86% in Oman and about 70% in Saudi Arabia. The technology removes salt from seawater - most commonly by pushing it through ultrafine membranes in a process known as reverse osmosis - to produce the freshwater that sustains cities, hotels, industry and some agriculture across one of the world's driest regions.
A reported "cyber incident" left the Denmark School District in the Village of Denmark, Wisconsin, without internet access for five school days, forcing teachers and students to rely on paper-based workarounds, according to a local news report.
Free open source software is fundamentally broken. In 2023, Denis Pushkarev, maintainer of the widely used core-js library, vented his frustration with the fact that users of his software seldom offer financial support, highlighting the disconnect between widespread dependency on open source and inadequate financial compensation for developers maintaining critical infrastructure.
In its yearly cybersecurity report, Dragos said state-sponsored crews haven't let up on their attempts to compromise America's critical infrastructure, with three new OT-focused threat groups joining the fray. This brings the total number worldwide to 26, and of these, 11 were active in 2025. Additionally, an existing group that Dragos tracks as Voltzite and is "highly correlated" with Volt Typhoon, according to Dragos CEO Robert M. Lee, kept up its intrusion activities last year.
Unlike traditional software bugs that might crash a server or scramble a database, errors in AI-driven control systems can spill into the physical world, triggering equipment failures, forcing shutdowns, or destabilizing entire supply chains, Gartner warns. "The next great infrastructure failure may not be caused by hackers or natural disasters but rather by a well-intentioned engineer, a flawed update script, or a misplaced decimal," cautioned Wam Voster, VP Analyst at Gartner.
The Indurex platform ingests and correlates data from multiple sources across the cyber-physical stack, with a strong focus on industrial historians, instrumentation and asset management systems (IAMS), alarm management, and OT network and endpoint data. The platform, which can be integrated with third-party OT security solutions, is designed to unify cyber, process, and safety context into a single operational view, using adaptive risk scoring to highlight issues and prioritize response actions.