The Radiflow Cyber-Security Blog
New Vulnerabilities potentially allowing a “wormable” WannaCry-like outbreak
New Vulnerabilities potentially allowing a "wormable" WannaCry-like outbreakIf you've found this article interesting, please visit and follow Radiflow on LinkedIn, where you'll find a wealth of exclusive content. By Radiflow CTO, Yehonatan Kfir Microsoft recently...
Video: Radifow CTO, Yehanotan Kfir, discusses new concepts in ICS security
Video: Radifow CTO, Yehanotan Kfir, discusses new concepts in ICS securityRadiflow CTO, Yehonatan Kfir, presents new concepts in ICS SecurityMr. Kfir discussed "ICS Security - Beyond Visibility, Towards Analytics" at an event hosted by Tekniska, Poland. [showmodule...
Automatic Risk Evaluation of Cyber-Attack Vectors
Automatic Risk Evaluation of Cyber-Attack VectorsIf you've found this article interesting, please visit and follow Radiflow on LinkedIn, where you'll find a wealth of exclusive content. In this post I will discuss risk evaluation of attack vectors and applying...
Insights into the Norsk Hydro Cyberattack: Using AD in IT/OT Networks
Insights into the Norsk Hydro Cyberattack: Using AD in IT/OT NetworksIf you've found this article interesting, please visit and follow Radiflow on LinkedIn, where you'll find a wealth of exclusive content. One of the world's biggest aluminum producers, multinational...
Notes from RSA SF 2019: No Longer Feeling Like an OT Fish in IT Water
If you've found this article interesting, please visit and follow Radiflow on LinkedIn, where you'll find a wealth of exclusive content. While not defined as such, the RSA annual conference, which I had just attended in San Francisco, has traditionally been seen as a...
Who Moved My Firmware?
Who Moved My Firmware?If you've found this article interesting, please visit and follow Radiflow on LinkedIn, where you'll find a wealth of exclusive content. The management of firmware risks in industrial facilities takes place on four levels: Within the supply...
How Dangerous is my ICS Vulnerability? Depends Who You Ask
How Dangerous is my ICS Vulnerability? Depends Who You AskIf you've found this article interesting, please visit and follow Radiflow on LinkedIn, where you'll find a wealth of exclusive content. What to do when ICS-CERT and NIST produce contradictory vulnerability...
Unified monitoring: Using OT infrastructure & protocols to send CS alerts to a SCADA control center
ISC operators typically need to reconcile between numerous constraints and influencers, to facilitate and simplify the project and reduce expenses. Unified Monitoring may be the way to go.
Sirens blaring, but is it a false alarm? Cybersecure your Public Warning System
public warning/announcement and emergency alarm systems are prone to cyber-attacks by hackers and other adversaries. It;s imperative that a comprehensive cyber-security “overhaul” project is launched to maintain the reliability and effectiveness of these systems.
Seeing is Believing: Live Demonstration of OT Cyber Attacks
The demo at CS4ICS IET 2018 highlighted the realization that one-size-fits-all OT network security is insufficient, and that cyber-threats, risks and attacks will only diversify and intensify.
Usability is key: Radiflow’s IEPP vs. the HatMan (aka Trisis, Triton) malware
It’s time that all of us in the cybersecurity industry recalibrate our expectations from users, and start developing solutions that match the way users really operate, rather than excellent solutions that users choose not to use correctly.
Five steps to assess the security of your industrial control system
Five Steps to Assess the Security of your Industrial Control SystemBased on the extent of cyber attacks on organizations that employ Industrial Control Systems (ICS), it should be assumed that there’s a good chance someone will try to hack into yours and cause...
The headache caused by protecting unmanned distributed sites
In this blog post, Radiflow CTO Yehonatan Kfir demonstrates two ways to secure small distributed assets in ICSs (i.e. assets with less than 20 devices).
Are Schools Ready for Cyber Attacks?
Are schools prepared for OT cyberattacks, and what needs to be done to protect them and bring them to the same security level as other industrial BMS systems?
Detection of unauthorized changes in a PLC’s logic
The Deep-Packet-Inspection (DPI) protocol for industrial network traffic helps accurately identify the industrial commands and parameters that are being sent.














