home.social

#waterutilities — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #waterutilities, aggregated by home.social.

  1. Russia Targets Polish Water Utilities in Hybrid Warfare Campaign

    Poland's Internal Security Agency has uncovered a concerning trend: five cyber intrusions into water utilities have been linked to a pro-Russian hybrid campaign, part of a broader Kremlin strategy to target NATO's eastern flank.

    osintsights.com/russia-targets

    #HybridWarfare #Russia #WaterUtilities #CriticalInfrastructure #IndustrialControlSystems

  2. According to Dragos, Volt Typhoon continues active operations inside U.S. utilities, shifting toward direct OT interaction and sensor data theft in 2025.

    Notable elements:
    • Pre-positioning in ICS environments
    • Exploitation of Ivanti & Trimble Cityworks vulnerabilities
    • GIS data harvesting for infrastructure mapping
    • Access broker activity attributed to SYLVANITE
    • Long-term persistence objectives
    CEO Rob Lee stated some compromised sites may never be identified.

    Technical question:
    If adversaries maintain low-and-slow OT access, how should defenders adapt detection engineering?
    – Network baselining?
    – Sensor telemetry validation?
    – Asset-level anomaly detection?
    – Zero trust for OT?

    Drop your technical analysis below.
    Follow @technadu for advanced threat coverage.

    #ICSsecurity #OTsecurity #ThreatHunting #DetectionEngineering #VoltTyphoon #InfrastructureDefense #CyberResilience #EnergyGrid #WaterUtilities #NationalSecurity #BlueTeam #CyberThreatIntel

  3. According to Dragos, Volt Typhoon continues active operations inside U.S. utilities, shifting toward direct OT interaction and sensor data theft in 2025.

    Notable elements:
    • Pre-positioning in ICS environments
    • Exploitation of Ivanti & Trimble Cityworks vulnerabilities
    • GIS data harvesting for infrastructure mapping
    • Access broker activity attributed to SYLVANITE
    • Long-term persistence objectives
    CEO Rob Lee stated some compromised sites may never be identified.

    Technical question:
    If adversaries maintain low-and-slow OT access, how should defenders adapt detection engineering?
    – Network baselining?
    – Sensor telemetry validation?
    – Asset-level anomaly detection?
    – Zero trust for OT?

    Drop your technical analysis below.
    Follow @technadu for advanced threat coverage.

    #ICSsecurity #OTsecurity #ThreatHunting #DetectionEngineering #VoltTyphoon #InfrastructureDefense #CyberResilience #EnergyGrid #WaterUtilities #NationalSecurity #BlueTeam #CyberThreatIntel

  4. According to Dragos, Volt Typhoon continues active operations inside U.S. utilities, shifting toward direct OT interaction and sensor data theft in 2025.

    Notable elements:
    • Pre-positioning in ICS environments
    • Exploitation of Ivanti & Trimble Cityworks vulnerabilities
    • GIS data harvesting for infrastructure mapping
    • Access broker activity attributed to SYLVANITE
    • Long-term persistence objectives
    CEO Rob Lee stated some compromised sites may never be identified.

    Technical question:
    If adversaries maintain low-and-slow OT access, how should defenders adapt detection engineering?
    – Network baselining?
    – Sensor telemetry validation?
    – Asset-level anomaly detection?
    – Zero trust for OT?

    Drop your technical analysis below.
    Follow @technadu for advanced threat coverage.

    #ICSsecurity #OTsecurity #ThreatHunting #DetectionEngineering #VoltTyphoon #InfrastructureDefense #CyberResilience #EnergyGrid #WaterUtilities #NationalSecurity #BlueTeam #CyberThreatIntel

  5. According to Dragos, Volt Typhoon continues active operations inside U.S. utilities, shifting toward direct OT interaction and sensor data theft in 2025.

    Notable elements:
    • Pre-positioning in ICS environments
    • Exploitation of Ivanti & Trimble Cityworks vulnerabilities
    • GIS data harvesting for infrastructure mapping
    • Access broker activity attributed to SYLVANITE
    • Long-term persistence objectives
    CEO Rob Lee stated some compromised sites may never be identified.

    Technical question:
    If adversaries maintain low-and-slow OT access, how should defenders adapt detection engineering?
    – Network baselining?
    – Sensor telemetry validation?
    – Asset-level anomaly detection?
    – Zero trust for OT?

    Drop your technical analysis below.
    Follow @technadu for advanced threat coverage.

    #ICSsecurity #OTsecurity #ThreatHunting #DetectionEngineering #VoltTyphoon #InfrastructureDefense #CyberResilience #EnergyGrid #WaterUtilities #NationalSecurity #BlueTeam #CyberThreatIntel

  6. Tapping into risk in America's drinking water

    Researchers at Carnegie Mellon developed the first publicly accessible Drinking Water Utilities Climate Risk Index for the United States, a comparative tool that measures the risks drinking water systems face from climate events like droughts, floods, and extreme heat. By cross-referencing 1,455 medium and large water utilities across the country with what those utilities reported in their bond disclosures, or financial documents that show investors the risks associated with lending money to these utilities, the study finds a gap between the actual climate risk and the risk reported in their disclosures.

    #water #drought #WaterUtilities

    phys.org/news/2026-01-america.

  7. OK, #introduction time!

    #AssistantProfessor of #DataScience for #PopulationHealth at Leiden University Medical Center.

    I am an #extronomer: I used to do #astrophysics for a living. Did data science for a decade in #HealthcareInsurance, #consultancy, #WaterUtilities, and policy and strategy in #HigherEducation. #python FTW!

    In my spare time, I still enjoy doing #astro #science. I also play the board game #Go (or #baduk) and enjoy #puzzles and #CraftBeer (see @tastingcraftbeer). I have 4 kids.