Belarussian “cyber activists” disrupted passenger rail traffic in the country by encrypting ticketing and other IT systems.
Belarussian “cyber activists” disrupted passenger rail traffic in the country by encrypting ticketing and other IT systems.
The cyber threat environment for rails operators grows steadily worse. Rail system operators urgently need cybersecurity designs and solutions that will repel even the most sophisticated of cyber attackers, today and throughout the foreseeable future. Waterfall’s Unidirectional Security Gateways e
Cyber attacks are targeting critical infrastructures, but shut downs are unacceptable. Waterfall’s products defeat 100% of online cyber attacks for future-proof industrial cybersecurity.
The largest exhibition in the world - the Dubai Expo, is hosting Waterfall Security as part of Waterfall's regular presence in the Gulf region, and following the opening of the company's new offices in Abu Dhabi
Ransomware attacks are on the rise, shutting down OT systems & critical infrastructure. Stay ahead of the trend.
In the cyber world the criminals are learning from each other. We need to do the same. In the final round of Knocking Out OT Cyber Risk we've provided resources to extend your knowledge. As national boxing champion, Rob Couzens puts it. "Always watch. Always learn."
Do your cybersecurity efforts feel like a game of whack-a-mole? It’s time to out smart our attackers, not out work them. Unhackable protections don't just reduce risk. They eliminate entire classes of risks. 4x national boxing champion, Rob Couzens, draws insightful parallels between the wolds of
In OT cybersecurity as in boxing, we must practice, practice, practice! When you get hit panic, inexperience and confusion are your enemy.
In both boxing and industrial security, we need be aware of the hidden blow that might be coming. Learn how to practice maintaining situational awareness and avoid sneak attacks.
Meet our CEO Lior Frenkel. Back in 2007, Frenkel founded Waterfall Security Solutions when he realized that software-only protection does not stop highly sophisticated online attack tools, then owned exclusively by nation-states. Watch the full video and learn more about us.
In round #1 we start with the basics – a strong guard. We learn, what are our soft targets in boxing vs. industrial security? And how do we defend them?
Whether it comes to boxing, or industrial cyber security, some techniques and some principles are universal. Join us for discussion on how to address OT cyber risks more effectively.
Manufacturing has become a major target for ransomware attacks. In the launch of our new industry series, brought to you by Waterfall’s Industrial Security Institute, Dr. Jesus Molina walks us through everything you need to know about protecting your manufacturing ICS and preventing a shut down.
Support feature turns attack tool. Andrew Ginter shows us how attackers can gain access to your ICS through one of your vendor’s software products.
Everyone expects something to be stolen when remote sites are trespassed… but how worried should we be about “leave behind attacks”? This week Andrew Ginter explains how a hacktivist can gain access to an ICS through a remote site.
The latest on the Colonial Pipeline and JBS Cyber Attacks - Are you at risk?
Learn how hacktivists can exploit security updates on vendors’ websites to cause an ICS shutdown, something like the Havex/Dragonfly malware
Why is it, that the Colonial pipeline had to be shut down? Targeted ransomware can affect physical operations in one of three ways
Watch: This attack on the Colonial pipeline is consistent with recent trends. Targeted ransomware has emerged the most capable of today’s “commonplace” attacks.
Remote support turns into remote attack. Outsourcing a support functions allows a disgruntled vendor technician to use legitimately acquired remote access credentials to shut down a water treatment plant