Revealing Web-Connected Critical Devices

Revealing Web-Connected Critical Devices

Revealing Web-Connected Critical Devices By Yehonatan Kfir, CTO, Radiflow September 30, 2015 Background In my last entry I mentioned shortly the reconnaissance stage in ICS attack campaigns. In this post I will present the risks involved, and I will describe one of...
Yes We SCAN!

Yes We SCAN!

Yes We SCAN! By Yehonatan Kfir, CTO, Radiflow Early detection of ICS attacks decreases the probability of causing damage to the network. In this post I will focus on one of the first stages in ICS attacks, where the attacker attempts to scan the network for devices....