Wireless networks unprotected as threats to critical infrastructure escalate

The latest Nozomi Networks Labs OT & IoT Security Report finds wireless networks woefully unprotected as threat actors continue to gain deep access into critical infrastructure. In the 2nd half of last year, critical infrastructure organizations in the United States saw the highest number of attacks, with manufacturing at highest risk.

  • Thursday, 27th February 2025 Posted 2 months ago in by Phil Alsop

Wireless Networks a High Security Risk

In the latest report from Nozomi Networks Labs, an analysis of more than 500,000 wireless networks worldwide found only 6% are adequately protected against wireless deauthentication attacks. This means most wireless networks, including those in mission-critical environments, remain highly exposed. In healthcare, for example, vulnerabilities in wireless networks could lead to unauthorized access to patient data, or interference with critical systems. Similarly, in industrial environments, these attacks could disrupt automated processes, halt production lines, or create safety hazards for workers.

Cyber Threat Activity Poses High Risk Across Industries

According to the report, In the 2nd half of last year, nearly half (48.4%) of the observed cyber threat alerts occur in the Impact phase of the cyber kill chain. This was true across various industries, particularly in Manufacturing, Transportation, Energy, Utilities, and Water/Wastewater. Command and Control (C&C) techniques followed closely (25% of all observed alerts). The Labs’ findings demonstrate the presence of adversaries deep within critical infrastructure systems and their intent to persist and maintain control over access.

Vulnerability Insights

Researchers also discovered, among 619 newly published vulnerabilities in the 2nd half of 2024, 71% are classified as critical. Additionally, 20 vulnerabilities have high Exploit Prediction Scoring System (EPSS) scores, indicating a high likelihood of future exploitation. Furthermore, four vulnerabilities have already been observed being actively exploited in the wild (KEV). These findings point to an urgent need for organizations to promptly address and mitigate the most critical and dangerous vulnerabilities.

Additionally, of all ICS security advisories released by CISA over the past six months, critical manufacturing topped the list, accounting for 75% of all Common Vulnerabilities and Exposures (CVEs) reported in the past six months. Manufacturing was followed by Energy, Communications, Transportation and Commercial Facilities.

Security Insights and Recommendations to Protect Critical Infrastructure

“Cyberattacks on the world’s critical infrastructure are on the rise,” said Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks. “The systems we design and defend must not only withstand a barrage of threats in today’s multipolar world but also balance the need to operate safely at scale, where human lives are at stake. By understanding these evolving threats and leveraging actionable insights, we can defend our critical infrastructure systems to ensure resilience, safety and operational continuity in an increasingly uncertain world.”

Data streaming enables AI product innovation

Posted 3 days ago by Phil Alsop
In the largest global report on data streaming, 89% say DSPs make AI adoption easier.
73% are investing in AI-specific security tools with either new or existing budgets.
Public sector organizations recognize the potential of AI for enhancing decision making, improving service delivery and driving operational...

AI calls for cyber resilience rethink

Posted 1 week ago by Phil Alsop
Unveiled at the RSAC™ Conference, the 2025 LevelBlue Futures Report finds only 29% of executives are prepared for AI-powered threats, despite...
New study reveals average 29 point gap in sentiment between business and the public across all technologies.
55% of businesses admit wrong decisions in making employees redundant when bringing AI into the workforce.

Research reveals key observability trends

Posted 1 week ago by Phil Alsop
Observability programme maturity is uneven across data quality, data pipelines, and AI/ML models, as unstructured data adoption grows.

Majority of companies exploring quantum AI

Posted 1 week ago by Phil Alsop
Quantum computing and related technologies like quantum AI are regarded as the next big wave after AI. A global survey of 500 business leaders across...