• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    CSAM

    Child Safety at Risk as EU CSAM Detection Law Lapses, Reporting Concerns Rise

    REvil ransomware gang

    Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs

    FortiClientEMS

    FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE

    FBI Internet Crime Report 2025

    $20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report

    phishing emails cyberattacks

    75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says

    Drift Protocol, Drift hacked, Solona, Nonces

    North Korea Spent 6 Months Infiltrating Drift Protocol Only to Drain $285M in 12 Mins

    Massachusetts Emergency Cyberattack

    Cyberattack Disrupts Massachusetts Emergency Dispatch, 911 Services Remain Active

    European Commission cloud breach

    A Compromised Tool Opened the Door to a 91GB European Commission Data Leak

    Voxbeam robocall case

    FCC Moves to Fine Voxbeam $4.5M in Robocall Case Linked to Foreign Traffic

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    phishing emails cyberattacks

    75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says

    AVrecon, AVrecon Malware, Home Router, FBI, SocksEscort, Proxy Network

    FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries

    Axios npm Supply Chain Attack, Supply Chain Attack, Axios, npm Package, GTIG, CTI, North Korea, Lazarus Group, Lazarus

    North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack

    CERT-UA, AGEWHEEZE, RAT, Remote Access Trojan, Government, Hospitals

    Hackers Impersonate Ukrainian CERT to Plant a RAT on Government, Hospital Networks

    Russian information operation

    Latvia Warns of Disinformation Campaign Targeting Baltic States

    Black Friday discounts

    30% of Retailers Fail to Show Accurate Discounts, EU Probe Reveals

    DSA child protection investigation

    Snapchat Faces EU Child Safety Probe Under Digital Services Act

    Foreign-Made Router, FCC Ban, FCC

    The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

    Iran Telegram malware

    Iran-Linked Hackers Use Messaging Platform to Target Dissidents and Journalists

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    CSAM

    Child Safety at Risk as EU CSAM Detection Law Lapses, Reporting Concerns Rise

    REvil ransomware gang

    Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs

    FortiClientEMS

    FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE

    FBI Internet Crime Report 2025

    $20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report

    phishing emails cyberattacks

    75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says

    Drift Protocol, Drift hacked, Solona, Nonces

    North Korea Spent 6 Months Infiltrating Drift Protocol Only to Drain $285M in 12 Mins

    Massachusetts Emergency Cyberattack

    Cyberattack Disrupts Massachusetts Emergency Dispatch, 911 Services Remain Active

    European Commission cloud breach

    A Compromised Tool Opened the Door to a 91GB European Commission Data Leak

    Voxbeam robocall case

    FCC Moves to Fine Voxbeam $4.5M in Robocall Case Linked to Foreign Traffic

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    phishing emails cyberattacks

    75% of Cyberattacks Start with Phishing Emails, UAE Cyber Council Says

    AVrecon, AVrecon Malware, Home Router, FBI, SocksEscort, Proxy Network

    FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries

    Axios npm Supply Chain Attack, Supply Chain Attack, Axios, npm Package, GTIG, CTI, North Korea, Lazarus Group, Lazarus

    North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack

    CERT-UA, AGEWHEEZE, RAT, Remote Access Trojan, Government, Hospitals

    Hackers Impersonate Ukrainian CERT to Plant a RAT on Government, Hospital Networks

    Russian information operation

    Latvia Warns of Disinformation Campaign Targeting Baltic States

    Black Friday discounts

    30% of Retailers Fail to Show Accurate Discounts, EU Probe Reveals

    DSA child protection investigation

    Snapchat Faces EU Child Safety Probe Under Digital Services Act

    Foreign-Made Router, FCC Ban, FCC

    The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

    Iran Telegram malware

    Iran-Linked Hackers Use Messaging Platform to Target Dissidents and Journalists

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber News

Drinking Water Systems for 27 Million Americans Have High-Risk Security Vulnerabilities

Paul Shread by Paul Shread
November 19, 2024
in Cyber News, Firewall Daily
0
drinking water systems security

Source: Freepik

777
SHARES
4.3k
VIEWS
Share on LinkedInShare on Twitter

Nearly 27 million Americans are served by drinking water systems that have high-risk or critical cybersecurity vulnerabilities, according to a new report from the U.S. Environmental Protection Agency’s Office of the Inspector General (OIG).

An additional 83 million Americans are served by systems that have medium or low-severity vulnerabilities, defined as “having externally visible open portals,” the EPA OIG report said.

The OIG investigation is the latest effort to bolster inadequate cybersecurity in U.S. water systems, following a Government Accountability Office (GAO) report in August, an EPA warning in May, and warnings from security researchers that Russian threat groups and other foreign adversaries are targeting water systems.

Water and wastewater systems are some of the most vulnerable critical infrastructure sectors to cyberattacks – communities are generally unprepared for outages that could last for days or longer. Fortunately, recent cyberattacks on American Water Works and Arkansas City, Kansas did not appear to reach operational technology (OT) networks.

“If malicious actors exploited the cybersecurity vulnerabilities we identified in our passive assessment, they could disrupt service or cause irreparable physical damage to drinking water infrastructure,” the OIG report said.

Water Systems Networks Scanned for Vulnerabilities

The OIG investigation looked at drinking water systems serving 50,000 or more people, 1,062 systems in all, covering 193 million people or about 56% of the U.S. population. The Oct. 8 vulnerability scans identified 97 high-risk water systems and 211 moderate risk ones.

report-ad-banner

The vulnerability tests “consisted of a multilayered, passive assessment tool to scan the public-facing networks” of the drinking water systems, the report said.

“The results identified cybersecurity vulnerabilities that an attacker could exploit to degrade functionality, cause loss or denial of service, or facilitate the theft of customer or proprietary information,” OIG said.

A non-linear scoring algorithm was used to prioritize the highest risk findings that should be addressed first, OIG said. The findings are ranked by a score that considers the impact of the problem, the risk to the organization, and the number of times the problem has been observed. Risks were grouped by five categories: email security; IT hygiene; vulnerabilities; adversarial threats, and malicious activity.

The report noted the complexity of drinking water systems, which “can be comprised of many components, or facilities, that are located throughout a geographic area. Those facilities can include buildings and infrastructure used for the collection, pumping, treatment, storage, or distribution of drinking water.”

As a result of that complexity, more than 75,000 IPs and 14,400 domains were analyzed for potential vulnerabilities.

Reporting and Incident Response Issues Also Found

The OIG investigation also found weaknesses in reporting and coordinating responses to cybersecurity incidents at the water systems.

“While attempting to notify the EPA about the cybersecurity vulnerabilities, we found that the EPA does not have its own cybersecurity incident reporting system that water and wastewater systems could use to notify the EPA of cybersecurity incidents,” the report said.

Instead, the agency relies on the Cybersecurity and Infrastructure Security Agency (CISA) for incident reporting.

“Moreover, we were unable to find documented policies and procedures related to the EPA’s coordination with the Cybersecurity and Infrastructure Security Agency and other federal and state authorities involved in sector-specific emergency response, security plans, metrics, and mitigation strategies,” OIG said.

Water Infrastructure Act Compliance Challenges

The report also looked at the challenging history of achieving compliance with the America’s Water Infrastructure Act of 2018 (AWIA), a comprehensive revision of the Safe Drinking Water Act.

Section 2013 of AWIA requires community water systems that serve more than 3,300 people to develop or update risk and resilience assessments and emergency response plans, including the resilience of physical and cyber infrastructure, monitoring practices, and strategies for responding to malevolent acts or natural hazards. Section 2013 also requires water systems to certify to the EPA that the system completed its risk and resilience assessment and emergency response plan.

However, findings in the last two years both from the OIG and the EPA have found that compliance with those requirements remains lacking.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: critical infrastructureCyberattacks on Water UtilitiesDrinking WaterEPAThe Cyber ExpressThe Cyber Express NewsVulnerabilities
Previous Post

AI Startup Founder Indicted for Multi-Million Investor Fraud

Next Post

New Cyble Report Highlights Critical Vulnerabilities and Rising Cyber Threats in ANZ for 2024

Next Post
Threat Landscape Report 2024

New Cyble Report Highlights Critical Vulnerabilities and Rising Cyber Threats in ANZ for 2024

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

CSAM
Firewall Daily

Child Safety at Risk as EU CSAM Detection Law Lapses, Reporting Concerns Rise

April 7, 2026
REvil ransomware gang
Cyber News

Germany Names Suspected Leader of REvil and GandCrab Ransomware Gangs

April 7, 2026
FortiClientEMS
Firewall Daily

FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE

April 7, 2026
FBI Internet Crime Report 2025
Cyber News

$20 Billion Lost to Cybercrime as AI and Investment Scams Surge: FBI Report

April 7, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information