Hybrid Warfare is Upon You

Security Breach

Security Breach
Hybrid Warfare is Upon You
Feb 18, 2026
Eric Sorensen

Send a text

Last December the Cybersecurity and Infrastructure Security Agency, or CISA, issued an advisory warning manufacturers, operators of critical infrastructure, and really anybody associated with industrial control systems about the threats being presented by pro-Russian hacktivist groups.

The advisory, issued in conjunction with numerous federal and international agencies, called out groups like the Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057 and Sector16 for taking advantage of insecure connection points and other vulnerabilities that allowed these state-sponsored actors to infiltrate, shut down, and ransom their targets in the United States.

Historically, many manufacturers would find it hard to believe that their mid-size business in the heartland of America would be on the radar of foreign terrorist groups, but as our guest for today’s episode explains, that is exactly the case.

Will Dixon is a senior executive of Government & Law Enforcement at Intel 471 – a leading authority on the OT threat landscape. Watch/listen as he explains:

  • How these group’s initial plans to disrupt water treatment and other critical infrastructure has evolved into the strategic targeting of the U.S. manufacturing sector.
  • Why hacktivist no longer applies to these "strategically aligned state groups."
  • Why AI will not be as impactful for either side as many think.
  • How these groups are part of Russia's bigger plans against the West.
  • The important role vendors and suppliers can play in establishing cyber defenses.
  • The ongoing challenges of breaking down IT-OT silos, and how hackers are using this dynamic against you.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Episode Artwork Hybrid Warfare is Upon You 31:34 Episode Artwork Security Breach: Strengthening Your Weakest Links 32:58 Episode Artwork Clarifying the Big-Picture Impacts of CMMC 41:23 Episode Artwork Shiny Objects and the Power of Preparation 44:22 Episode Artwork You Don't Have to Out-Tech the Hacker 40:55 Episode Artwork Speaking the Right Language 46:39 Episode Artwork Why People Are Not the Biggest Risk 49:03 Episode Artwork Preserving Uptime in the Face of Evolving Attacks 31:05 Episode Artwork New Patching Strategies for Old Vulnerabilities 26:12 Episode Artwork The Wild & Weird of Industrial Cybersecurity 30:33 Episode Artwork Using AI to Stay Ahead of the Hack 31:41 Episode Artwork Threat Landscape Update 49:32 Episode Artwork Cure Me or Kill Me - The Little Things That Escalate Attacks 43:18 Episode Artwork Being 'Proactively Paranoid, Not Paralyzed' 36:54 Episode Artwork Why More Hackers Are Logging On Than Breaking In 32:27 Episode Artwork You Think You Know Me 35:06 Episode Artwork Avoiding the Ostrich Approach 50:46 Episode Artwork 'We've Made Our Own Prison' 42:19 Episode Artwork Dark AI Speeding Hacker Evolution 36:11 Episode Artwork Why Ransomware, Credential Theft and Phishing Schemes Persist 39:22 Episode Artwork Unsecure Webcam Was All a Ransomware Group Needed 31:23 Episode Artwork IABs, Dark Web Fueling Ransomware Surge 38:41 Episode Artwork Manufacturing’s Internal Cyber Struggles 27:18 Episode Artwork Observations of an Ethical Hacking Researcher 35:35 Episode Artwork The Evolution of OT Vulnerabilities 36:47