Countering New-Age, State-Sponsored Industrial Hackers

Security Breach

Security Breach
Countering New-Age, State-Sponsored Industrial Hackers
May 14, 2026
Eric Sorensen

Send us Fan Mail

Cybersecurity is unlike any other Industry or environment I’ve ever covered. But more than the technology, the intriguing players and the somewhat spooky elements surrounding it, is how the things we discuss on this podcast impact nearly every element of our day-to-day lives. 

It’s not just how artificial intelligence is impacting email phishing schemes, but how clicking on that link could let a state-sponsored hacker steel login credentials for obtaining access to an industrial control system that is not only used by a power tool manufacturer, but by a defense contractor or water treatment facility.

The interconnected nature of the industrial sector makes an appreciation for cybersecurity vital to the ongoing safety and success of manufacturing – which, again, impacts nearly every facet of every person’s daily life.

That’s why I enjoy talking to people like Aaron Shraberg, Senior Team Lead at Flashpoint – a leading provider of threat landscape intelligence. The stuff Aaron talks about is frightening, which is another challenge of covering cybersecurity – balancing education with data sharing without fear mongering. 

But I’d encourage you to really wach/listen as Aaron talks about the evolution of threats from China, Russia and Iran, and how cyber threats are converging with physical battlefields to fuel threats thousands of miles from where the missiles are flying. 

The bottom line is – we’re all connected and we’re all impacted, so we need to be prepared - regardless of how far removed you think you are. There's also good news in terms of solutions, which can start with sharing some of this scary information. 

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Episode Artwork Countering New-Age, State-Sponsored Industrial Hackers 35:25 Episode Artwork Taking Down of a North Korean Remote Access Scam 36:41 Episode Artwork Multiple Paths to Zero Trust - Channeling D&D, LOTR and It's Always Sunny in Philadelphia 44:01 Episode Artwork The Bad Guy's Different Set of Rules 29:01 Episode Artwork Finding the Soul of a Pirate 37:35 Episode Artwork Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks 36:38 Episode Artwork Hybrid Warfare is Upon You 31:34 Episode Artwork Security Breach: Strengthening Your Weakest Links 32:58 Episode Artwork Clarifying the Big-Picture Impacts of CMMC 41:23 Episode Artwork Shiny Objects and the Power of Preparation 44:22 Episode Artwork You Don't Have to Out-Tech the Hacker 40:55 Episode Artwork Speaking the Right Language 46:39 Episode Artwork Why People Are Not the Biggest Risk 49:03 Episode Artwork Preserving Uptime in the Face of Evolving Attacks 31:05 Episode Artwork New Patching Strategies for Old Vulnerabilities 26:12 Episode Artwork The Wild & Weird of Industrial Cybersecurity 30:33 Episode Artwork Using AI to Stay Ahead of the Hack 31:41 Episode Artwork Threat Landscape Update 49:32 Episode Artwork Cure Me or Kill Me - The Little Things That Escalate Attacks 43:18 Episode Artwork Being 'Proactively Paranoid, Not Paralyzed' 36:54 Episode Artwork Why More Hackers Are Logging On Than Breaking In 32:27 Episode Artwork You Think You Know Me 35:06 Episode Artwork Avoiding the Ostrich Approach 50:46 Episode Artwork 'We've Made Our Own Prison' 42:19 Episode Artwork Dark AI Speeding Hacker Evolution 36:11