WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Supplemental Cyber Highlights – August 8, 2023
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Supplemental Cyber Highlights – August 8, 2023

Author: Jennifer Walker

Created: Tuesday, August 8, 2023 - 18:02

Categories: Cybersecurity, OT-ICS Security, Security Preparedness

The following posts are useful for general awareness of current threats, vulnerabilities, guidance, and other cyber-related news or updates. These resources have been curated by the WaterISAC analyst team as items of broad relevance and benefit that do not need supplemental analysis at this time.

ICS/OT/SCADA Vulnerabilities

  • ICS Patch Tuesday: Siemens Fixes 7 Vulnerabilities in Ruggedcom Products (Security Week)
  • Siemens has 23 Security Advisories on its own site today: Siemens Security Advisories (Siemens)
  • Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI – Part 1 (Nozomi Networks)
  • Dozens of RCE Vulnerabilities Impact Milesight Industrial Router (Security Week)

Critical Infrastructure Resilience

  • Nexus Podcast: Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector (Claroty)
  • DHS more than doubles SLCGP funding to about US$375 million, in bid to boost state and local cybersecurity (Industrial Cyber)
  • Break IT/OT Silos by Expanding SOC Responsibilities (Trend Micro)

IT Vulnerabilities & Threats

  • Another PaperCut: CVE-2023-39143 Remote Code Execution (Huntress)
  • Hackers can abuse Microsoft Office executables to download malware (Bleeping Computer)

Technical Posts (for security analysts, sysadmins, and other nerds)

  • New Microsoft Azure AD CTS feature can be abused for lateral movement (Bleeping Computer)
  • Databases beware: Abusing Microsoft SQL Server with SQLRecon (IBM Security Intelligence)

Ransomware Awareness

  • Ransomware Roundup – DoDo and Proton (Fortinet)
  • Don’t know about rampant, but: Akamai Research: Rampant Abuse of Zero-Day and One-Day Vulnerabilities Leads to 143% Increase in Victims of Ransomware (Akamai)
  • How to manage a mass password reset due to a ransomware attack (Bleeping Computer)

Reports and General Awareness

  • How to Create an Effective GRC Program: 3 Phases (Dark Reading)
  • Key Findings from the 1H 2023 FortiGuard Labs Threat Report (Fortinet)

Related Resources

Members Only

(TLP:GREEN) WaterISAC’s Annual Member Needs Survey – 2026

May 7, 2026 in Cybersecurity, Natural Disasters, Physical Security
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar