{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/6480da3db47496001150d17e/6a05ebb4efd1f558b02d7a82?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Defending US Critical Infrastructure Against Iranian PLC Attacks","description":"<p>In April 2026 a joint advisory from CISA the FBI and the NSA sent a shockwave through the industrial world. Iranian affiliated threat actors are actively exploiting internet exposed Programmable Logic Controllers (PLCs) across US water energy and government sectors. With nearly 75% of the world's exposed Allen Bradley PLCs located right here in the United States, the risk to critical infrastructure has never been more structural or more urgent.</p><p>In this episode, we dive deep into the technical findings of Advisory AA26097A. We move beyond the immediate headlines to discuss why this isn't just a Rockwell problem but a wake up call regarding the architectural debt of legacy OT systems designed for an era of air gapped networks that no longer exists.</p><p><br></p><p><strong>What you'll learn in this episode:</strong></p><p><strong>The Anatomy of the Attack</strong>: How threat actors use simple authentication bypasses and default credentials to manipulate HMI displays and project files.</p><p><strong>Immediate Mitigation</strong>: The non negotiable steps CISA recommends to secure your current environment today.</p><p><strong>The Future of Secure PLC Selection</strong>: How to evaluate cybersecurity forward controllers using the IEC 62443 standard as a benchmark.</p><p><strong>Hardware Deep Dive</strong>: A look at next generation solutions from WAGO and Turck including the clean sheet design of the PFC300 and the app based security of the ctrlX OS powered Edge Controller 400.</p><p><br></p><p>Whether you are a controls engineer a facility manager or an IT professional tasked with OT security, this episode provides a practical framework for moving from a vulnerable posture to one that is secure by design.</p><p><a href=\"AutomationDistribution.com\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>AutomationDistribution.com</strong></a></p><p>1-888-600-3080</p>","author_name":"Automation Distribution"}