Important Cybersecurity Advisory

03/16/26

An important Cybersecurity Advisory has been issued. U.S. cybersecurity agencies, including CISA, are reporting elevated, but still largely opportunistic, cyber activity connected to ongoing Middle East tensions. While this activity has not shown signs of coordinated, large‑scale campaigns, it has included real incidents and active exploitation of known vulnerabilities. For manufacturers, distributors, and any organization operating in a regulated environment, these developments reinforce a familiar truth: strong cyber hygiene remains your most reliable defense.

Recent reports show attackers leaning on the same tactics that have worked for years, phishing emails, denial‑of‑service attempts, and the exploitation of unpatched systems. One publicly reported incident involved a pro‑Iran group claiming responsibility for a disruption at a U.S. medical technology company. There have also been scattered reports of impacts across manufacturing and distribution, though nothing indicating widespread targeting. What we are seeing is less about sophisticated nation‑state campaigns and more about attackers taking advantage of whatever weaknesses they can find.

This is especially important now because CISA continues to add vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. When a flaw lands on that list, it means attackers are actively using it, not just researching it. Several of the most recent additions affect widely used virtualization and management platforms common in manufacturing environments. At the same time, Microsoft’s March security updates addressed multiple important vulnerabilities across Windows, Azure, and modern workplace components. Together, these advisories paint a clear picture: unpatched systems are the easiest way into your environment.

Across incidents, one pattern keeps repeating. Attackers continue to rely on credential abuse, legacy systems, and unsupported software. These weaknesses are predictable, preventable, and unfortunately still widespread.

For organizations subject to CMMC, NIST 800‑171, DFARS, ITAR, or similar frameworks, this environment highlights a compliance reality that cannot be ignored. Unsupported or end‑of‑life systems do not just increase your risk, they put you out of alignment with regulatory expectations. Auditors increasingly expect organizations to stay on supported software versions, address known exploited vulnerabilities quickly, and demonstrate consistent patching and risk‑management discipline. “We will get to it later” is no longer a defensible position when KEV‑listed vulnerabilities are involved.

Manufacturing environments often include a mix of modern cloud services, on‑prem servers, legacy equipment, and specialized applications like Epicor. That complexity creates a larger attack surface and more opportunities for outdated systems to become liabilities. Now is the time to review your patching cadence, identify unsupported systems, validate identity protections, and ensure your backup and recovery plans are current and evaluated.

If you would like help assessing your current posture, exploring modernization options, or understanding how these developments apply to your Epicor or Microsoft environment, the 2W team is ready to support you. A brief review today can prevent a major disruption tomorrow. Please ensure your business is taking each Cybersecurity Advisory seriously.

Read More:

From Tribal Knowledge to Repeatable Processes: Building Role Based Training in Epicor Kinetic

FedEx Is Retiring Legacy Web Services: What Manufacturers Need to Know About the April 1 Quick Ship API Requirement

Back to IT News