<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>OT/ICS Monitor</title><description>Operational Technology &amp; Industrial Control System Security Intelligence</description><link>https://ot-ics-monitor.pages.dev/</link><language>en-us</language><item><title>Water Sector Cyber Threats 2026 — From Oldsmar to Nation-State Pre-Positioning</title><link>https://ot-ics-monitor.pages.dev/articles/water-sector-cyber-threats-2026/</link><guid isPermaLink="true">https://ot-ics-monitor.pages.dev/articles/water-sector-cyber-threats-2026/</guid><description>Water and wastewater systems face a growing and diverse cyber threat — from opportunistic attacks exploiting internet-exposed HMIs to sophisticated nation-state pre-positioning campaigns. This briefing covers the current threat landscape, attack vectors, and sector-specific defensive priorities.</description><pubDate>Fri, 22 May 2026 00:00:00 GMT</pubDate><category>water</category><category>wastewater</category><category>SCADA</category><category>HMI</category><category>Volt-Typhoon</category><category>critical-infrastructure</category><category>ICS</category><category>OT-security</category><category>water</category></item><item><title>CISA ICS Advisory: Siemens RUGGEDCOM and SCADABr Remote Code Execution</title><link>https://ot-ics-monitor.pages.dev/articles/cisa-ics-advisory-ruggedcom-scadabr-rce/</link><guid isPermaLink="true">https://ot-ics-monitor.pages.dev/articles/cisa-ics-advisory-ruggedcom-scadabr-rce/</guid><description>CISA has released a critical ICS advisory covering unauthenticated remote code execution vulnerabilities in Siemens RUGGEDCOM network devices and SCADABr SCADA software, both widely deployed in energy and manufacturing environments.</description><pubDate>Thu, 14 May 2026 00:00:00 GMT</pubDate><category>cisa</category><category>siemens</category><category>ruggedcom</category><category>scadabr</category><category>rce</category><category>ics-advisory</category><category>energy</category><category>manufacturing</category></item><item><title>Volt Typhoon Pre-Positioning in US and UK OT Networks</title><link>https://ot-ics-monitor.pages.dev/articles/volt-typhoon-ot-network-pre-positioning/</link><guid isPermaLink="true">https://ot-ics-monitor.pages.dev/articles/volt-typhoon-ot-network-pre-positioning/</guid><description>China-nexus threat actor Volt Typhoon has systematically infiltrated operational technology networks across US and UK critical infrastructure sectors, establishing persistent footholds in energy, water, and communications systems for potential future disruption.</description><pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate><category>volt-typhoon</category><category>china</category><category>apt</category><category>living-off-the-land</category><category>critical-infrastructure</category><category>energy</category><category>water</category><category>communications</category></item><item><title>OT Network Segmentation: Purdue Model, DMZ Design, and Historian Isolation</title><link>https://ot-ics-monitor.pages.dev/articles/purdue-model-ot-network-segmentation/</link><guid isPermaLink="true">https://ot-ics-monitor.pages.dev/articles/purdue-model-ot-network-segmentation/</guid><description>A practical guide to network segmentation in OT environments, covering the Purdue Reference Model, industrial DMZ architecture, data historian isolation, and the tradeoffs between operational access and security posture.</description><pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate><category>network-segmentation</category><category>purdue-model</category><category>dmz</category><category>historian</category><category>architecture</category><category>defense-in-depth</category><category>energy</category><category>manufacturing</category><category>water</category></item><item><title>TRITON/TRISIS: The Malware Designed to Kill</title><link>https://ot-ics-monitor.pages.dev/articles/triton-trisis-malware-safety-systems/</link><guid isPermaLink="true">https://ot-ics-monitor.pages.dev/articles/triton-trisis-malware-safety-systems/</guid><description>TRITON is the only publicly known malware explicitly engineered to disable Safety Instrumented Systems—the last line of defense against industrial catastrophes. An analysis of its architecture, targeting of Schneider Electric Triconex controllers, and what it means for safety system cybersecurity.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>triton</category><category>trisis</category><category>safety-systems</category><category>sis</category><category>schneider-electric</category><category>triconex</category><category>petrochemical</category><category>nation-state</category><category>energy</category><category>petrochemical</category></item><item><title>Modbus and DNP3: Inherent Security Weaknesses in Legacy Industrial Protocols</title><link>https://ot-ics-monitor.pages.dev/articles/modbus-dnp3-protocol-security-weaknesses/</link><guid isPermaLink="true">https://ot-ics-monitor.pages.dev/articles/modbus-dnp3-protocol-security-weaknesses/</guid><description>Modbus and DNP3 were designed for reliability and interoperability, not security. An analysis of the structural security weaknesses in both protocols—unauthenticated commands, lack of encryption, spoofing, and replay attacks—and the compensating controls available to practitioners.</description><pubDate>Sun, 05 Apr 2026 00:00:00 GMT</pubDate><category>modbus</category><category>dnp3</category><category>industrial-protocols</category><category>scada</category><category>protocol-security</category><category>authentication</category><category>energy</category><category>water</category></item><item><title>The OT Asset Inventory Problem: Visibility Gaps, Passive Discovery, and Unmanaged Devices</title><link>https://ot-ics-monitor.pages.dev/articles/ot-asset-inventory-visibility-gap/</link><guid isPermaLink="true">https://ot-ics-monitor.pages.dev/articles/ot-asset-inventory-visibility-gap/</guid><description>Most industrial operators cannot accurately enumerate the devices on their OT networks. This visibility gap is the foundational barrier to OT security—you cannot protect what you cannot see. A practical look at passive discovery tools, the limits of vendor inventories, and strategies for building actionable asset visibility.</description><pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate><category>asset-inventory</category><category>visibility</category><category>passive-discovery</category><category>ot-security</category><category>network-monitoring</category><category>unmanaged-devices</category><category>energy</category><category>manufacturing</category><category>water</category></item></channel></rss>