Download pdf
The low-hanging fruit security problems shifted from the OS towards ISVs and IoT / embedded systems. This session will explore why the latter is how organisations will be compromised by red teams, hackers and nation-state actors alike. Two exploits by the Equation Group and one by GoSecure will be explored. The session will conclude with a live demo of how to quickly assess your hardware’s security.