Claroty
Exploited: Netgear Nighthawk RAX30 - Blog
September 18, 2023By now, we all know that no matter the precautions, there will always be a way in, a way you haven’t thought of, a way to breach and control your connected … everything. To highlight these every changing vulnerabilities, whether minor or major, and promote overall secure IoT environments, the Zero Day Initiative (ZDI) organized a Pwn2Own competition in Toronto, to dive deeper into the machines we employ everyday and show how vulnerable we are when everything is connected. ZDI informed the participating teams that they will need to take their shared knowledge and apply it to printers, network-attached storage (NAS) devices, routers, and smart speakers.
EXPLOITED: Dataprobe iBoot-PDU - Story
February 23, 2023Modern power distribution units (PDUs) – devices that are commonly used to deliver power to server racks – can be managed remotely. While convenient and often efficient, these power delivery systems also represent an attack vector for bad actors looking to infiltrate networks, data centers, and anything connected to them.
Team82 Releases its State of XIoT Security Report: 2H 2022 - News
February 16, 2023New York. Claroty’s Team82 released findings that showed a 14% decline of cyber-physical system vulnerabilities disclosed in 2H of 2021 to 2H 2022, in its State of XIoT Security Report: 2H 2022. However, the research team did find an increase of 80% more vulnerabilities found by product security teams over the same time. Claroty describes their disclosure having an optimistic effect on the security of the Extended Internet of Things (XIoT) in environments across a vast array of industry applications such as, industrial, healthcare, and commercial.
EXPLOITED: Siemens PLCs, SIMATIC S7-1200 & S7-1500 - Story
February 08, 2023Hackers are looking to rise to that top echelon of attacks, achieving that single intrusion they can brag about for years. One of these hacks worth bragging about is to obtain undetected access to code executed on a programmable logic controller (PLC). Why? Because these systems have an abundance of in-memory protections needing to be bypassed. If successful, the integrated code would be in the thick of existing code going undetected by operating systems or security software. Previous work has required physical access and connections to the PLC, or techniques that target engineering workstations and other links to the PLC in order to gain that level of code execution.
EXPLOITED: GE Proficy Historian - Story
January 18, 2023Claroty’s Team82 has identified five liabilities within the GE Proficy Historian v8.0.1598.0. The vulnerabilities can be used to access the historian, remotely execute code, and crash it and other devices. Four of the vulnerabilities have a CVSS v3 score of 7.5 with one having a CVSS v3 score of 9.8. v7.0.
The CHIPS Act Passed. Now What? - Podcast
August 05, 2022On this episode, the Insiders and Jonathan Cobb, CEO of Ayla Networks, take a closer look at the long-discussed Matter standard from smart home connectivity - how far it will go, and when it will go.
Claroty Launches Research Arm Team82, Finds Critical Vulnerabilities in Cloud-based ICS Management Platforms - News
July 21, 2021Claroty launched Team82, its new research arm that provides vulnerability and threat research to Claroty customers and defenders of industrial networks.