The Radiflow Cyber-Security Blog
Securing Remote Access in OT Enterprises
Given the level of access provided through remote connectivity, attackers are likely to take advantage of vulnerabilities to gain internal network access to the OT network.
Securing a Hospital Campus in the EMEA Region
Beyond typical BMS functions, hospitals operate a myriad of interdependent critical systems that require uninterrupted uptime. When it came to securing a major hospital campus in the EMEA campus, Radiflow’s OT security solutions were the obvious choice.
My Insights on the 2020 OT Threat Landscape Based on 2019’s Threat Analysis Reports
Mr. Rani Kehat, Radiflow VP Business Development, shares his predictions and recommendations for securing industrial networks, in light of trends including new attack tactics, techniques and procedures.
Protect Your Employees From Corona While Protecting Your OT Network: How to Properly Set up Remote Employee Access
The security implications of quickly moving a large number of employees to remote working are especially crucial in ICS-based enterprises (manufacturing and critical infrastructure).
Behind the News: Visser, Precision Parts Manufacturer for Tesla and SpaceX, Confirms Data Breach
The ransomware attack on Visser Precision, a Denver, Colorado-based precision parts maker, continues the trend of industrial organizations affected by IT malware. It also endangers customers and suppliers up and down the supply chain.
Radiflow CEO Ilan Barda: Unlocking the MSSP Potential within Manufacturing and ICS
Radiflow CEO Ilan Barda provides insights on OT-MSSPs and their advantages to manufacturing organizations that lack the skilled personnel to man an in-house SOC.
Behind the News: CISA Reports Ransomware Attacks on Pipeline Operations
Behind the News: CISA Reports Ransomware Attacks on Pipeline OperationsIf you've found this article interesting, please visit and follow Radiflow on LinkedIn, where you'll find a wealth of exclusive content. The Cybersecurity and Infrastructure Security Agency (CISA)...
The Top-10 Cyber Exploits of 2019
Which exploited were the most common in 2019? The list includes two vulnerabilities in Adobe Flash Player, four vulnerabilities affecting Microsoft’s Internet Explorer browser, three in MS Office and one WinRAR bug.
Setting up an OT-SOC: Interview with Mr. Yishai Shafran, SCADA Security Manager at Yanai Engineering
In this guest post, Mr. Yishai Shafran, Yanai’s Cyber Defense department manager, describes the company’s evolution into become a leading OT-MSSP and its collaboration with Radiflow.
Behind-the-News: Hacker Groups are Shifting from IT to OT
A notorious Iranian hacker group, “APT33”, has been observed shifting its targets from IT networks toward critical industrial (OT) infrastructures such as power generation, manufacturing and oil refineries. It is unclear at this time is APT33 is…
Hack the Modbus
SCADA/ ICS and similar MODBUS-based systems were always the target of many types of attacks. These systems become much more vulnerable. MODBUS communication protocol is a widespread communication standard in the critical infrastructures field…
Notes from Palo Alto Ignite 2019: helping system integrators bridge the IT-OT divide
Last week, Radiflow took part in Palo Alto Network’s Ignite 2019 conference, a meeting place for Palo Alto Network’s EMEA IT security partners, held in Barcelona, Spain. Radiflow participated…
CISS 2019: Where red teams and blue teams come together to protect water treatment systems
Last month I attended The International Critical Infrastructure Security Showdown (CISS) 2019 challenge as part of the Radiflow Blue team. (You can read all about the CISS challenge in our security brief, which describes each and every…
Bad Packets warns of over 14,500 Pulse Secure VPN Endpoints vulnerable to CVE-2019-11510
On August 22, BadPackets experts observed a mass scanning activity targeting Pulse Secure “Pulse Connect Secure” VPN endpoints vulnerable to CVE-2019-11510. BadPackets analyzed the number of Pulse Secure VPN endpoints vulnerable to the CVE-2019-11510…
Managed Cyber-Monitoring – The Next Evolution in Protecting OT Networks
Managed Cyber-Monitoring - The Next Evolution in Protecting OT NetworksaIf you've found this article interesting, please visit and follow Radiflow on LinkedIn, where you'll find a wealth of exclusive content. Recent attacks show that industrial cybersecurity requires...














