The Radiflow Cyber-Security Blog
Calculating the Cost of a Power Outage
Calculating the Cost of a Power Outage By Rani Kahat, VP Business Development, RadiflowWhat is the cost of a power outage caused by a cyber-attack? And how does one calculate the predicted cost? Beyond the actuary purpose of estimating the cost of a power outage...
Convergence of Cyber & Physical Security to Protect OT Networks
Convergence of Cyber & Physical Security to Protect OT NetworksBringing together Cyber and Physical security Integrated physical security systems, e.g. between a video surveillance system and a swipe card-based access control/user permissions system, have been...
Analysis of the Ukrainian Outage
In this paper we will review the snippets of information that were confirmed about the Ukraine blackout, as well as those that are still under investigation.
Seeing in the Dark: ICS Network Visibility
Seeing in the Dark: ICS Network VisibilityIn this post I will describe the usage of an IDS (Intrusion Detection System) tool for achieving Network Visibility in ICS networks. This post will be divided into two sections. First, I will cover the operational and security...
Industrial IDS Deployment
Industrial IDS Deployment By Yehonatan Kfir, CTO, RadiflowBackground In our previous posts we discussed the various types of attacks on operational (OT) networks. We’ve also discussed the means of mitigating different types of attacks, with the exception of “In-Field”...
Revealing Web-Connected Critical Devices
Background In my last entry I mentioned shortly the reconnaissance stage in ICS attack campaigns. In this post I will present the risks involved, and I will describe one of the tools used for reconnaissance. If you read this post through, you will be able to search on your own for web-connected SCADA controllers.
Yes We SCAN!
Early detection of ICS attacks decreases the probability of causing damage to the network. In this post I will focus on one of the first stages in ICS attacks, where the attacker attempts to scan the network for devices. First, I will explain the motivation behind the scanning stage, followed by a description of the scanning techniques used…
Designing an ICS Attack Platform
Early detection of ICS attacks decreases the probability of causing damage to the network. In this post I will focus on one of the first stages in ICS attacks, where the attacker attempts to scan the network for devices.
ICS Firewall Deployment
We take it as a given that it’s essential to deploy firewalls inside ICS networks. However, it is less clear why and which properties should such firewalls have: should they be stateful? DPI? Signature-based? In this post I will try to shed some light on the topic.
The weakness of ICS maintenance operations
What would you say is your biggest concern when it comes to cyber threats to your ICS system? When I asked several cyber-officers in big utilities, they told me that their biggest concern was the interaction between people and the ICS network.









