Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    More And More Games Are Asking A Question Even Philosophers Haven't Been Able To Answer

    May 6, 2026

    Red (2024) by Brillante Mendoza

    May 6, 2026

    Ford Bronco coming to Australia, but not the one you expected

    May 6, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Canadian government claims hacktivists are attacking water and energy facilities
    Canadian government claims hacktivists are attacking water and energy facilities
    Tech Reviews

    Canadian government claims hacktivists are attacking water and energy facilities

    gvfx00@gmail.comBy gvfx00@gmail.comOctober 31, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    • Hacktivists targeted Canadian ICS, disrupting water, oil, and agricultural infrastructure
    • ICS vulnerabilities stem from unclear roles and poor asset protection
    • Canada urges VPNs, 2FA, and threat detection to secure ICS environments

    The Canadian government has issued a new security alert warning of so-called hacktivists targeting Industrial Control Systems (ICS).

    The report says the Cyber Centre and the Royal Canadian Mounted Police has received “multiple reports” of incidents involving internet-accessible ICS.

    Among the reports were an attack on a water facility, in which the miscreants tampered with water pressure valves and degraded the service for the community.


    You may like

    Table of Contents

    Toggle
    • How to secure the assets
      • Related posts:
    • Xbox CEO called Game Pass 'too expensive for players' in a leaked memo
    • Minisforum’s new MS-02 Ultra mini PC offers desktop power for serious multitasking workloads
    • Monday Night Football: How to Watch Rams vs. Falcons Tonight for Free

    How to secure the assets

    The report also mentions a Canadian oil and gas company, in which an Automated Tank Gauge (ATG) was manipulated into triggering false alarms.

    Finally, there was an attack on a grain drying silo in a Canadian farm, where the attackers changed temperature and humidity levels. Luckily, the attack was caught on time, otherwise it could have resulted in “potentially unsafe conditions.”

    ICS are computer-based systems used to monitor and control industrial processes and critical infrastructure, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC).

    By gaining access, cybercriminals can disrupt power grids, water supplies, manufacturing lines, or transportation networks, causing widespread damage and safety risks. For hacktivists, exploiting ICS is a way to gain media attention, discredit organizations, and “undermine Canada’s reputation,” the report further stated.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The problem with ICS systems is in “unclear division of roles and responsibilities,” the Canadian government stressed in the report, saying they often create gaps which leave critical systems unprotected.

    To tackle the problem, businesses operating ICS systems need “effective communication and collaboration.”

    That communication implies proper inventory, documentation, and protection of internet-connected assets, as well as making sure managed services are “implemented securely, maintained throughout their lifecycle and based on clearly defined requirements.”


    You may like

    It also means businesses should implement Virtual Private Networks (VPNs), two-factor authentication (2FA), and a strong active threat detection system.

    Regular penetration testing and continuous vulnerability management are also advised.


    Best antivirus software header

    The best antivirus for all budgets

    Our top picks, based on real-world testing and comparisons

    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.



    Related posts:

    Meta offers EU users ad-light option in push to end investigation

    Alphabet will pay $22 million to settle President Trump’s YouTube lawsuit

    A TikTok US power outage caused a 'cascading systems failure' leading to multiple bugs

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNebius AI Studio Unveils Enterprise-Grade Image Generation—And It Might Just Change How Businesses Create Visuals Forever
    Next Article 7 Free Remote MCPs You Must Use As A Developer
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    World Cup 2026: Peacock Adds New Streaming Features for Spanish-Language Coverage

    May 6, 2026
    Tech Reviews

    12+ compact accessories that’ll turn your phone into the perfect video and photo tool for travel — from $10 / £10

    May 6, 2026
    Tech Reviews

    TP-Link RE653BE Review: A Versatile and Solid Wi-Fi 7 Extender

    May 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202568 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202568 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.