connected industrial robots

Industry 4.0: Industrial robots vs. Cyberattacks

Industry 4.0 represents a major cybersecurity challenge for companies. In a study conducted by Trend Micro and the Polytechnic University of Milan, a team of researchers and students in the field of cybersecurity successfully demonstrated the vulnerability of industrial robots. This weakness is coupled with the era of artificial intelligence and the IIoT! The security […]

Triton maware

Analysis of Triton industrial malware

In this article the Sentryo Security team presents you with an analysis of a malware specially designed to cripple the security of industrial systems. Read on for an in-depth look at how the Triton industrial malware works and the measures to implement to ensure protection. Triton industrial malware: operational summary The Triton malware, also called […]

Sentryo / Cisco

CISCO CASE STUDY – SENTRYO
“DEEPER SECURITY AND VISIBILITY IN MANUFACTURING”

CISCO, world leader in digital transformation, IT and networks, has published a case study on how Sentryo is reinforcing cybersecurity and the visibility of industrial systems with CISCO’s solutions. Industrial cybersecurity: many challenges to face In industry, and more specifically in manufacturing such as automobiles, aerospace and even railway construction, networks are generally quite massive […]

Gps spoofing of a military drone

The Sentryo Files
Season 2 – Episode 4: commandeering a stealth drone

Season 2 of the Sentryo Files strives to dig deeper into the most emblematic cyberattacks. Read on to find out about an attack targeted at diverting a stealth drone. Iran commandeers a US drone In 2011, Iranian engineers led an attack to take remote control of a US military stealth drone. Find out how the […]

control room industrial cyberattacks

Best practices for enforcing the security of industrial systems

In a previous article about the specific features of industrial systems, we discussed the cybersecurity challenges related to these types of networks and the constraints in ensuring their protection. Find out about some best practices you can adopt in order to fight against industrial cyberattacks and overcome the vulnerabilities of industrial systems when it comes […]

wastewater treatment plant

The Sentryo Files
Season 2 – Episode 1: breach of a wastewater treatment plant

The Sentryo Files are back for a second season! We would like to take a look back at an emblematic cyberattack in the environmental field. Read our account of the attack on a wastewater treatment plant. Remote breach of a wastewater treatment plant in Australia In 2000 a former employee of the IT company that […]

Social Engineering Rachel Tobac

[Interview] Rachel Tobac, white hat hacker, guides you through social engineering

Rachel Tobac (@racheltobac) is a ‘white hat hacker’. Her role is to help companies and individuals protect their data by raising their awareness of the dangers of social engineering. She twice was a winner of the ‘DEFCON Social Engineering Capture the Flag’ and is now CEO and co-founder of ‘SocialProof Security’. Rachel accepted to share […]

sharing security information

Information sharing: the key to cybersecurity

Sharing security information is primordial if companies want to remain up to date with trends in cyberattacks, enrich and fine-tune their reference databases, and improve their security solutions. A more relevant risk analysis Knowing how to properly use the information available is a determining factor in securing your IT and OT networks. The data in […]