Artwork

Indhold leveret af Claroty. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Claroty eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Team82 on Attacking the Insecure IoT Cloud

31:38
 
Del
 

Manage episode 455242467 series 3308427
Indhold leveret af Claroty. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Claroty eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

Claroty Team82's Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team's latest publication on 10 vulnerabilities discovered in Ruijie Networks' Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network.
You can find the research here on Team82's website.
Listen and subscribe to the Nexus Podcast here.

  continue reading

93 episoder

Artwork
iconDel
 
Manage episode 455242467 series 3308427
Indhold leveret af Claroty. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Claroty eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

Claroty Team82's Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team's latest publication on 10 vulnerabilities discovered in Ruijie Networks' Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network.
You can find the research here on Team82's website.
Listen and subscribe to the Nexus Podcast here.

  continue reading

93 episoder

Alle afleveringen

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning

Lyt til dette show, mens du udforsker
Afspil