Welcome to today’s OT, ICS, and IoT security briefing for May 21, 2026. We cover the latest developments in critical infrastructure cybersecurity, highlighting emerging threats, new malware, and legislative efforts to strengthen defenses.
Verizon 2026 DBIR: Vulnerability Exploitation Overtakes Credentials as Top Breach Vector for Critical Infrastructure
The Verizon 2026 Data Breach Investigations Report reveals that exploitation of vulnerabilities now leads initial access methods at 31%, surpassing stolen credentials. With only 26% of CISA Known Exploited Vulnerabilities fully remediated and median patch times rising, ransomware accounts for 48% of breaches. Manufacturing sector breaches are equally split between vulnerability exploitation and stolen credentials at 41% each.
Iranian Hackers Exploit Default Credentials to Breach U.S. Gas Station Tank Gauge Systems
U.S. officials report that Iranian-linked threat actors compromised automatic tank gauge systems at gas stations by exploiting default or absent passwords on internet-exposed devices. The attackers manipulated display data, risking operator unawareness of gas leaks or empty tanks. CISA warns that Iran-affiliated APTIRAN continues to target industrial control systems within U.S. critical infrastructure.
ZionSiphon: New ICS Malware Targets Water Treatment Systems via Industrial Protocols
Darktrace researchers have uncovered ZionSiphon, a sophisticated malware targeting Israeli water treatment and desalination plants. The malware activates only when both geographic and industrial control process conditions are met, communicating over Modbus, DNP3, and S7comm protocols to manipulate chlorine and pressure controls. Experts highlight the growing risk posed by legacy unauthenticated protocols and rapid AI-driven malware development.
UK Guidance Links AI-Accelerated OT Cyber Threats to Operational Weaknesses, Not Open-Source Code
UK cybersecurity authorities emphasize that AI-accelerated OT threats exploit fundamental operational weaknesses such as unpatched systems, default credentials, and inadequate network segmentation—not open-source code. The guidance urges organizations to prioritize security hygiene and risk management to counter rapid weaponization of vulnerabilities enabled by AI, dismissing calls to restrict code publication as ineffective.
Senate Introduces Legislation to Strengthen Cybersecurity of Critical Infrastructure Against State-Sponsored Threats
Senator Rick Scott introduced the Strengthening Cyber Resilience Against State-Sponsored Threats Act, addressing Chinese and other state-backed cyber risks targeting U.S. critical infrastructure. Additional Senate bills focus on enhancing cyber defenses for seaports and other key sectors. The legislation proposes mandatory security standards and reporting requirements for critical infrastructure operators.
Thank you for reading today’s briefing. Stay vigilant and proactive in securing your operational technology environments against evolving cyber threats.