Why secure OT protocols still struggle to catch on

Help Net Security

Overview

Industrial control systems are still relying on outdated communication protocols that prioritize reliability over security features like authentication and data integrity. This leaves networks vulnerable, allowing attackers to impersonate devices, send unauthorized commands, or alter messages without being detected. A new guidance document from the Cybersecurity and Infrastructure Security Agency (CISA) explains the reasons behind the slow adoption of more secure versions of these industrial protocols. Despite their availability, many organizations are hesitant to implement them, which raises serious concerns about the security of critical infrastructure. The continued use of legacy systems could lead to significant risks for industries that depend on these technologies.

Key Takeaways

  • Affected Systems: Industrial control systems, legacy communication protocols
  • Action Required: Organizations should consider upgrading to secure versions of industrial protocols and implement stronger authentication measures.
  • Timeline: Newly disclosed

Original Article Summary

Industrial control system networks continue to run on legacy communication protocols that were built for reliability and uptime, not authentication or data integrity. In many environments, malicious actors with access to the OT network can impersonate devices, issue unauthenticated commands, or modify messages in transit without detection. A new guidance document from the Cybersecurity and Infrastructure Security Agency (CISA) explains why secure versions of common industrial protocols remain underused, even though they have existed since … More → The post Why secure OT protocols still struggle to catch on appeared first on Help Net Security.

Impact

Industrial control systems, legacy communication protocols

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Newly disclosed

Remediation

Organizations should consider upgrading to secure versions of industrial protocols and implement stronger authentication measures.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Critical.

Related Coverage

Cyberattacks increasingly caused by unchecked AI agents

SCM feed for Latest

A report from Infosecurity Magazine warns that organizations are increasingly vulnerable to cyberattacks due to a lack of effective strategies for managing AI agents. As companies adopt AI technologies without appropriate oversight, the risk of these systems being exploited by attackers rises. This situation poses a significant threat to data security and system integrity, as poorly governed AI can facilitate malicious activities. Organizations that fail to implement clear guidelines for AI use may find themselves facing increased incidents of cybersecurity breaches. Addressing this issue is crucial for protecting sensitive information and maintaining trust in digital systems.

Apr 22, 2026

Agoda refutes claims of massive data breach

SCM feed for Latest

Agoda, a popular booking platform in Asia, has denied rumors of a significant data breach that allegedly compromised 82 million user records. This denial comes shortly after its parent company, Booking Holdings, reported a data breach affecting Booking.com, which exposed sensitive user reservation information. The claims about Agoda's breach were fueled by concerns over the recent vulnerability at Booking.com, raising alarms about the security of user data across these platforms. While Agoda insists that no such breach occurred, the situation highlights ongoing concerns over data security in the travel industry. Users should remain vigilant about their personal information, especially in light of recent incidents affecting major companies.

Apr 22, 2026

Over 6,400 Apache ActiveMQ servers at risk of ongoing attacks

SCM feed for Latest

A severe vulnerability in Apache ActiveMQ, identified as CVE-2026-34197, has put over 6,400 servers at risk of exploitation. This widely used open-source message broker is utilized globally, with 6,476 instances exposed to the internet. Attackers could potentially execute code remotely, which could lead to significant security breaches. Organizations using ActiveMQ should take immediate action to assess their systems and implement protective measures. The urgency of this situation highlights the need for timely updates and monitoring of server configurations to prevent unauthorized access.

Apr 22, 2026

Extensive Citizens Financial Group, Frost Bank breaches claimed by Everest ransomware

SCM feed for Latest

Citizens Financial Group and Frost Bank, two significant U.S. banks, have reportedly fallen victim to the Everest ransomware group. This operation has claimed to have stolen large volumes of sensitive data from both institutions and is threatening to release this information by April 26. The breach is concerning not only for the banks but also for their customers, as it raises fears about the exposure of personal and financial information. Ransomware attacks on financial institutions can lead to severe consequences, including financial loss and damage to customer trust. As the situation develops, both banks will need to respond quickly to mitigate the impact of this breach and reassure their clients.

Apr 22, 2026

House Republicans roll out national privacy bill

CyberScoop

House Republicans have introduced a new national privacy bill aimed at regulating data collection and usage across the United States. This legislation appears to draw inspiration from existing privacy laws in states like Virginia and Kentucky. However, experts warn that the bill may struggle to gain sufficient bipartisan support, which could hinder its passage. The bill's introduction comes amid growing concerns over data privacy and consumer protection, making it a significant topic in the current political landscape. If passed, this legislation could set a new standard for how companies handle personal data, impacting both businesses and consumers nationwide.

Apr 22, 2026

New Mirai campaign exploits RCE flaw in EoL D-Link routers

BleepingComputer

A new campaign linked to the Mirai malware is exploiting a serious command-injection vulnerability in D-Link DIR-823X routers, identified as CVE-2025-29635. This vulnerability allows attackers to take control of the routers and integrate them into a botnet. Users of these routers are at risk as their devices can be hijacked for malicious purposes, including launching distributed denial-of-service (DDoS) attacks. This situation is particularly concerning since the affected routers are at the end of their life cycle, meaning they are unlikely to receive security updates. It’s crucial for users to be aware of this exploit and take necessary precautions to secure their networks.

Apr 22, 2026