Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks

Security Breach

Security Breach
Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks
Mar 05, 2026
Eric Sorensen

Send a text

Although discussing the military activities currently taking place in Iran runs the risk or bringing up polarizing political views, the cybersecurity realities simply can’t be ignored. And they absolutely have to be discussed. 

One of these realities is that Iran has a legacy of supporting organizations involved with cyberattacks on networks, infrastructure and companies in Israel and the United States. Companies that utilize industrial control systems. Companies like yours. 

In light of current events, there is absolutely no question that these groups will escalate their efforts. Although the bombs are falling thousands of miles beyond U.S. borders, know that U.S. manufacturing is a primary target. 

Historically, many of the groups carrying out these types of cyberattacks were hacktivists or outliers, operating independent of any government or country. They followed their own agenda in realizing personal or political goals. 

However, as highlighted by the war in Ukraine, these groups have begun to pick sides. They’re embracing financial support from nation states and successfully executing attacks meant to shut down, steal data, extort money and/or disrupt critical production or infrastructure operations – regardless of size, sector or location. 

Thankfully, there are also guys like our guest for today’s episode. JP Castellanos is the Director of Threat Intelligence at Binary Defense. Watch/listen as he discusses:

  • The evolving hacktivist community and what recent events could mean for industrial cybersecurity.
  • How manufacturers can prepare and respond to an inevitable uptick in attacks.
  • How IT/OT silos perpetuate these attacks and make manufacturing a more lucrative and appealing target.
  • The motives and operational strategies of state-sponsored Iranian hacker groups.
  • The soft spots in your defenses that these groups take advantage of in targeting the industrial sector.
  • The simple solutions that can have far-reaching and extremely positive impacts on your defenses.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Episode Artwork Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks 36:38 Episode Artwork Hybrid Warfare is Upon You 31:34 Episode Artwork Security Breach: Strengthening Your Weakest Links 32:58 Episode Artwork Clarifying the Big-Picture Impacts of CMMC 41:23 Episode Artwork Shiny Objects and the Power of Preparation 44:22 Episode Artwork You Don't Have to Out-Tech the Hacker 40:55 Episode Artwork Speaking the Right Language 46:39 Episode Artwork Why People Are Not the Biggest Risk 49:03 Episode Artwork Preserving Uptime in the Face of Evolving Attacks 31:05 Episode Artwork New Patching Strategies for Old Vulnerabilities 26:12 Episode Artwork The Wild & Weird of Industrial Cybersecurity 30:33 Episode Artwork Using AI to Stay Ahead of the Hack 31:41 Episode Artwork Threat Landscape Update 49:32 Episode Artwork Cure Me or Kill Me - The Little Things That Escalate Attacks 43:18 Episode Artwork Being 'Proactively Paranoid, Not Paralyzed' 36:54 Episode Artwork Why More Hackers Are Logging On Than Breaking In 32:27 Episode Artwork You Think You Know Me 35:06 Episode Artwork Avoiding the Ostrich Approach 50:46 Episode Artwork 'We've Made Our Own Prison' 42:19 Episode Artwork Dark AI Speeding Hacker Evolution 36:11 Episode Artwork Why Ransomware, Credential Theft and Phishing Schemes Persist 39:22 Episode Artwork Unsecure Webcam Was All a Ransomware Group Needed 31:23 Episode Artwork IABs, Dark Web Fueling Ransomware Surge 38:41 Episode Artwork Manufacturing’s Internal Cyber Struggles 27:18 Episode Artwork Observations of an Ethical Hacking Researcher 35:35