The Radiflow Cyber-Security Blog

Subscribe to the Radiflow Security Blog – new posts will conveniently show up in your inbox the day they’re posted.

Automatic Risk Evaluation of Cyber-Attack Vectors

Defining attack-vector use cases according to attacker skill levelBy Liron Benbenishti, cybersecurity researcher, Radiflow LTDIn this post I will discuss risk evaluation of attack vectors and applying Radiflow’s cyber risk evaluation model, which is now incorporated...

read more

Who Moved My Firmware?

By Tsur Segal, VP Strategic Sales, Radiflow LTD Each and every component in an ICS (Industrial Control System) utilizes firmware, faulty firmware maintenance may result in critical cyber-risk. Here we discuss the topic and offer a number of simple, yet effective...

read more

How Dangerous is my ICS Vulnerability? Depends Who You Ask

What to do when ICS-CERT and NIST produce contradictory vulnerability analyses  Synopsis  Vulnerability disclosure organizations are considered to be the most important and reliable source of actionable information for vulnerability and risk assessment, including...

read more

Seeing is Believing: Live Demonstration of OT Cyber Attacks

By Gilad Bandel, VP Products, Radiflow Real-life live demonstrations of cyber-attacks scenarios are the best way to educate and create awareness of the potential risks and damages to ICS/SCADA systems, using various attack vectors. Such a demonstration was held at the...

read more