Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Team82 on Attacking the Insecure IoT Cloud
Manage episode 455242467 series 3308427
Claroty Team82's Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team's latest publication on 10 vulnerabilities discovered in Ruijie Networks' Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network.
You can find the research here on Team82's website.
Listen and subscribe to the Nexus Podcast here.
98 episodes
Manage episode 455242467 series 3308427
Claroty Team82's Noam Moshe and Tomer Goldschmidt join the Nexus Podcast to discuss the research team's latest publication on 10 vulnerabilities discovered in Ruijie Networks' Reyee OS cloud platform. A chain of these vulnerabilities could allow an attacker to remotely execute code on any device connected to the Ruijie cloud. Team82 also developed an attack they call Open Sesame which allows an attacker in proximity of a Ruijie device to use leaked device information and access the internal network.
You can find the research here on Team82's website.
Listen and subscribe to the Nexus Podcast here.
98 episodes
All episodes
×
1 Megan Stifel on the Impact of the Ransomware Task Force 29:48

1 Joe Slowik on Identifying Truly 'Critical' Infrastructure 29:47

1 Danielle Jablanski on Critical Infrastructure Protection 41:26

1 Cassie Crossley on Hardware Security, HBOMs 28:20

1 Christiaan Beek on Ransomware's Evolution and Economics 30:05

1 Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard 40:39

1 Mike Holcomb on Starting and Succeeding in OT Cybersecurity 42:40

1 Ron Fabela on Low-Skilled OT and ICS Threat Actors 36:33

1 Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents 33:25

1 Brian Foster on the Risks of a Hyperconnected Grid 27:17

1 CISA's Matthew Rogers on Secure by Demand for OT 39:23

1 Volexity's Steven Adair on the Nearest Neighbor Attack 37:23

1 Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure 34:43

1 Grant Geyer on the Business Impact of Disruptions from Cyberattacks 25:03

1 Alethe Denis on Social Engineering, Red-Teaming 43:45

1 Alon Dankner on Extracting Crypto Keys from PLCs 27:58

1 Noam Moshe on Extracting Forensic Data from Unitronics PLCs 27:52

1 Alexander Antukh on Cyber Risk Quantification 43:05

1 Vincente Diaz on Using AI for Malware Analysis 27:38



1 Vinnie Liu on Offensive Security Testing During Incidents 29:30

1 Diana Kelley on Protecting the AI Lifecycle 26:11

1 Jennifer Minella on OT Cybersecurity Convergence 29:56

1 Charles Blauner on the Changing Role of the CISO 31:00

1 Mikko Hypponen on a Decade of Corporate Ransomware Attacks 32:18

1 Adm. Michael Rogers on Geopolitics and Cybersecurity 27:57

1 Abel Archundia on Complexity in Critical Infrastructure 35:37


1 Greg Garcia on the Change Healthcare Cyberattack 44:35

1 Ryan Pickren on New Web-Based PLC Malware Research 35:17

1 Mike Rogers on Understanding a CISO's Personal Exposure in Cyber Incidents 37:26

1 Team82 Answers More of your OT Cybersecurity Questions 31:58


1 David Elfering on CISOs and Cyber Liability Insurance 44:19

1 Team82 Answers Your Vulnerability Research Questions 28:47

1 Mandiant on Sandworm APT Attacks in Ukraine 30:27

1 Don Weber on Security Culture in Control Environments, STAR Methodology 44:41



1 Stephen Reynolds on Protecting the CISO During Incident Investigations 33:46

1 Team82 on NAS Research, OPC UA Exploit Framework 34:30

1 Bishop Fox on OSDP Weaknesses Putting Secure Facilities at Risk 26:30

1 Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector 46:42

1 Kathleen Moriarty on CIS' IoT Security Guidance 38:38

1 Walter Risi on the CISO's Journey from IT to OT 35:07

1 Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research 16:51

1 Charles Carmakal on Cybersecurity Threats to Healthcare 37:54

1 Lorrie Cranor on IoT Security and Privacy Labels 32:39

1 Skip Sorrels on the 405(d) HICP, Healthcare Cybersecurity 41:04



1 Adm. Mike Rogers on the National Cybersecurity Strategy 39:38

1 Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity 43:56

1 Noam Moshe on a Generic WAF Bypass Technique 30:46


1 Joe Slowik on TRITON Malware, XENOTIME Hacking Group 42:17


1 Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List 47:04

1 Vergle Gipson on Cyber-Informed Engineering 44:37


1 Dan Gunter on Threat Hunting in Industrial Control Systems 38:40



1 Don C. Weber on ICS Cybersecurity Training, Education 46:48

1 Idaho National Lab on the INL Control Environment Laboratory Resource (CELR) 46:01

1 Thomas Schmidt and Martin Scheu on the Common Security Advisory Framework 36:28

1 Daniel Kapellmann Zafra on Incontroller/Pipedream ICS Attack Tools 39:25

1 Sharon Brizinov on Hacking and Securing PLCs 34:21

1 Kylie McClanahan on Automating the Gathering of Vulnerability Information 41:05

1 Sean Tufts on OT SOC Playbooks, Culture Challenges 40:36

1 Patrick Miller on Securing Critical Infrastructure in a Time of Conflict 43:09

1 OT-ISAC on Information-Sharing, Incident Recovery 41:14

1 Tom VanNorman on OT Cybersecurity Skills Gap 40:04






1 Dennis Fisher on 'When Bug Bounties Went Boom' 42:06


1 Tony Baker on OT Cybersecurity Challenges, CIP Security 37:27

1 Inside the Water Sector Cybersecurity Survey 33:55



1 E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity 33:19

1 Katie Moussouris on Dan Kaminsky, Pay Equity, Vulnerability Disclosure Progress 41:50

1 Kaspersky, Claroty on OPC Security Research 43:59


1 Mauro Conti on Assessing the Use of Insecure ICS Protocols 31:32

1 Water ISAC on Oldsmar Hack, Sector Cybersecurity 41:02



1 Richard Thomas, Joe Gardiner on CVE Discovery Time for ICS 41:02

1 Dustin Childs on Vulnerability Disclosure, Pwn2Own, ZDI 36:30

Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.