English SHADOWFIREWALL – Author
Netcrook Logo
Author image

SHADOWFIREWALL

Adaptive Defense Architect

Professional Profile
ShadowFirewall creates behavioral firewalls based on hostile-pattern models. Background in AI and embedded systems, designs reactive defenses that learn from traffic.
Key Skills
Adaptive firewalls; Hostile-behavior modeling; Anomaly detection; Micro-segmentation; OT/SCADA security
Major Achievements
Designed the first behavioral firewall of a European smart factory.
Operational Style
Articles by SHADOWFIREWALL

NVIDIA, Akamai, Siemens & More: The Secret AI Alliance Defending Critical Infrastructure

24 Feb 2026

NVIDIA’s new alliance with Akamai, Forescout, Siemens, and other cyber leaders is quietly embedding AI and zero trust security into the world’s most critical infrastructure. Explore how this coalition is raising the bar for industrial cybersecurity.

Oscilloscopes Unleashed: Calculus Powers a New Wave of Electronic Investigation

23 Feb 2026

Oscilloscopes have evolved from simple waveform viewers to powerful math engines, with built-in calculus functions now enabling real-time analysis of capacitors and inductors. This investigative feature explores how these advances are transforming the way engineers and cyber sleuths interpret signals and solve electronic mysteries.

Ghosts in the Machine: How Industrial Deception Transforms Cyber Defense

22 Feb 2026

Industrial deception is evolving beyond honeypots, with high-fidelity decoys luring attackers and safeguarding critical infrastructure. Discover how these tactics work, where they're most effective, and why integrating them with asset visibility and segmentation is crucial for safe, proactive defense.

Legacy LonTalk Protocols: The Hidden Cybersecurity Threat in Smart Buildings

20 Feb 2026

Legacy LonTalk protocols, still embedded in modern building management systems, are exposing critical infrastructure to new cyber risks. Claroty Team82's investigation reveals how these outdated technologies, now connected to the internet, could become prime targets for attackers.

Shadow Networks: Attackers Embed in Critical Infrastructure Months Before Striking

20 Feb 2026

Sophisticated attackers are quietly embedding themselves in industrial and energy networks months in advance, setting the stage for potentially catastrophic disruptions. Team Cymru and recent real-world incidents highlight the urgent need for intelligence-driven, proactive defense in critical infrastructure.

Clouds of Deceit: Foxveil Malware Hides in Trusted Services

19 Feb 2026

Foxveil is a sneaky new malware loader that hides its payloads on trusted platforms like Cloudflare, Netlify, and Discord, making detection difficult and signaling the future of stealthy cyberattacks.

New Hacker Groups Breach Industrial Systems: OT Environments Under Siege

18 Feb 2026

A wave of newly identified cyber threat groups is targeting the operational technology that powers critical infrastructure worldwide. From exploiting edge devices to sophisticated social engineering, these attackers are reshaping the risks to utilities, manufacturing, and beyond.

Locked, Loaded, and Unpatched: The Looming Crisis Inside Industrial Control Systems

18 Feb 2026

A deep dive into the mounting cyber risks facing industrial control systems in 2026, where aging infrastructure meets advanced threats and resilience is the new imperative.

Industrial Saboteurs: How Hackers Target the Machinery of Modern Industry

18 Feb 2026

Dragos’s latest annual report exposes a dramatic shift: cyber attackers are no longer just breaching networks—they’re learning to control and disrupt the very machinery that powers industry.

Lithium’s Dirty Secrets: Inside the Deaths of 15 Battle Born Batteries

17 Feb 2026

A deep-dive autopsy of 15 failed Battle Born lithium batteries exposes a spectrum of alarming defects—shattering the myth of guaranteed safety for LFP power users.

1 2 3 4 5 Next
← Back to Authors