Download pdf
The insecurity of legacy and embedded systems affects the financials, medical and critical infrastructure industries. We demonstrate how a threat actor targets these systems without the use of any zero-day, just by using a 10-year-old exploit to penetrate a critical device, disrupt its activities and tamper with its controls.