The Supply Chain is Broken: The Case of BLUEMONDAY & How To Own Everything

Posted on in Presentations

This session will outline the multi-vendor exploit series covered in CERT Case #667789 (and possibly others), a series of critical vulnerabilities in critical networking infrastructure. The researchers will demonstrate long lived and undisclosed critical flaws in IoT, how to map the software supply chain and internal networks of major corps from firmware updates, and critically expose many networks.

Ken Pyle


Partner, Exploit Developer / Graduate Professor of Cybersecurity, CYBIR

Share With Your Community