Triton maware

Analysis of Triton industrial malware

In this article the Sentryo Security team presents you with an analysis of a malware specially designed to cripple the security of industrial systems. Read on for an in-depth look at how the Triton industrial malware works and the measures to implement to ensure protection. Triton industrial malware: operational summary The Triton malware, also called […]

Sentryo / Cisco


CISCO, world leader in digital transformation, IT and networks, has published a case study on how Sentryo is reinforcing cybersecurity and the visibility of industrial systems with CISCO’s solutions. Industrial cybersecurity: many challenges to face In industry, and more specifically in manufacturing such as automobiles, aerospace and even railway construction, networks are generally quite massive […]

Gps spoofing of a military drone

The Sentryo Files
Season 2 – Episode 4: commandeering a stealth drone

Season 2 of the Sentryo Files strives to dig deeper into the most emblematic cyberattacks. Read on to find out about an attack targeted at diverting a stealth drone. Iran commandeers a US drone In 2011, Iranian engineers led an attack to take remote control of a US military stealth drone. Find out how the […]

control room industrial cyberattacks

Best practices for enforcing the security of industrial systems

In a previous article about the specific features of industrial systems, we discussed the cybersecurity challenges related to these types of networks and the constraints in ensuring their protection. Find out about some best practices you can adopt in order to fight against industrial cyberattacks and overcome the vulnerabilities of industrial systems when it comes […]

wastewater treatment plant

The Sentryo Files
Season 2 – Episode 1: breach of a wastewater treatment plant

The Sentryo Files are back for a second season! We would like to take a look back at an emblematic cyberattack in the environmental field. Read our account of the attack on a wastewater treatment plant. Remote breach of a wastewater treatment plant in Australia In 2000 a former employee of the IT company that […]

Social Engineering Rachel Tobac

[Interview] Rachel Tobac, white hat hacker, guides you through social engineering

Rachel Tobac (@racheltobac) is a ‘white hat hacker’. Her role is to help companies and individuals protect their data by raising their awareness of the dangers of social engineering. She twice was a winner of the ‘DEFCON Social Engineering Capture the Flag’ and is now CEO and co-founder of ‘SocialProof Security’. Rachel accepted to share […]

sharing security information

Information sharing: the key to cybersecurity

Sharing security information is primordial if companies want to remain up to date with trends in cyberattacks, enrich and fine-tune their reference databases, and improve their security solutions. A more relevant risk analysis Knowing how to properly use the information available is a determining factor in securing your IT and OT networks. The data in […]

denial of service on industrial installations

Cyberthreats to industrial systems: Denial-of-service on industrial installations

After discussing industrial sabotage, our series of attack scenarios on industrial systems continues. Of these attacks, a denial-of-service on an industrial installation is particularly dangerous: it can bring continuous production lines to a long-lasting standstill. Before going any further, read the article: What is an industrial system and how to protect it? What is a […]