Posted on
in Presentations
This session will outline the multi-vendor exploit series covered in CERT Case #667789 (and possibly others), a series of critical vulnerabilities in critical networking infrastructure. The researchers will demonstrate long lived and undisclosed critical flaws in IoT, how to map the software supply chain and internal networks of major corps from firmware updates, and critically expose many networks.
Protecting Data & the Supply Chain Ecosystem Technology Infrastructure & Operations
application security case studies cryptography infrastructure security industrial control security
Topic
Protecting Data & the Supply Chain Ecosystem
Technology Infrastructure & Operations
Subtopic
application security
case studies
cryptography
infrastructure security
industrial control security
Share With Your Community