This session will outline the multi-vendor exploit series covered in CERT Case #667789 (and possibly others), a series of critical vulnerabilities in critical networking infrastructure. The researchers will demonstrate long lived and undisclosed critical flaws in IoT, how to map the software supply chain and internal networks of major corps from firmware updates, and critically expose many networks.
Protecting Data & the Supply Chain Ecosystem Technology Infrastructure & Operations
application security case studies cryptography infrastructure security industrial control security
Share With Your Community