The Supply Chain is Broken: The Case of BLUEMONDAY & How To Own Everything


Posted on in Presentations

This session will outline the multi-vendor exploit series covered in CERT Case #667789 (and possibly others), a series of critical vulnerabilities in critical networking infrastructure. The researchers will demonstrate long lived and undisclosed critical flaws in IoT, how to map the software supply chain and internal networks of major corps from firmware updates, and critically expose many networks.


Participants
Ken Pyle

Speaker

Partner, Exploit Developer / Graduate Professor of Cybersecurity, CYBIR


Share With Your Community