Claroty

488 Madison Ave
11th floor
New York, NY 10022
[email protected]
https://www.claroty.com/
Claroty
Articles related to Claroty
Security

Exploited: Netgear Nighthawk RAX30 - Blog

September 18, 2023

By now, we all know that no matter the precautions, there will always be a way in, a way you haven’t thought of, a way to breach and control your connected … everything. To highlight these every changing vulnerabilities, whether minor or major, and promote overall secure IoT environments, the Zero Day Initiative (ZDI) organized a Pwn2Own competition in Toronto, to dive deeper into the machines we employ everyday and show how vulnerable we are when everything is connected. ZDI informed the participating teams that they will need to take their shared knowledge and apply it to printers, network-attached storage (NAS) devices, routers, and smart speakers.

Security

EXPLOITED: Dataprobe iBoot-PDU - Story

February 23, 2023

Modern power distribution units (PDUs) – devices that are commonly used to deliver power to server racks – can be managed remotely. While convenient and often efficient, these power delivery systems also represent an attack vector for bad actors looking to infiltrate networks, data centers, and anything connected to them.

Security

Team82 Releases its State of XIoT Security Report: 2H 2022 - News

February 16, 2023

New York. Claroty’s Team82 released findings that showed a 14% decline of cyber-physical system vulnerabilities disclosed in 2H of 2021 to 2H 2022, in its State of XIoT Security Report: 2H 2022. However, the research team did find an increase of 80% more vulnerabilities found by product security teams over the same time. Claroty describes their disclosure having an optimistic effect on the security of the Extended Internet of Things (XIoT) in environments across a vast array of industry applications such as, industrial, healthcare, and commercial.

Security

EXPLOITED: Siemens PLCs, SIMATIC S7-1200 & S7-1500 - Story

February 08, 2023

Hackers are looking to rise to that top echelon of attacks, achieving that single intrusion they can brag about for years. One of these hacks worth bragging about is to obtain undetected access to code executed on a programmable logic controller (PLC). Why? Because these systems have an abundance of in-memory protections needing to be bypassed. If successful, the integrated code would be in the thick of existing code going undetected by operating systems or security software. Previous work has required physical access and connections to the PLC, or techniques that target engineering workstations and other links to the PLC in order to gain that level of code execution.

Security

EXPLOITED: GE Proficy Historian - Story

January 18, 2023

Claroty’s Team82 has identified five liabilities within the GE Proficy Historian v8.0.1598.0. The vulnerabilities can be used to access the historian, remotely execute code, and crash it and other devices. Four of the vulnerabilities have a CVSS v3 score of 7.5 with one having a CVSS v3 score of 9.8. v7.0.

Processing

The CHIPS Act Passed. Now What? - Podcast

August 05, 2022

On this episode, the Insiders and Jonathan Cobb, CEO of Ayla Networks, take a closer look at the long-discussed Matter standard from smart home connectivity - how far it will go, and when it will go.

Industrial

Claroty Launches Research Arm Team82, Finds Critical Vulnerabilities in Cloud-based ICS Management Platforms - News

July 21, 2021

Claroty launched Team82, its new research arm that provides vulnerability and threat research to Claroty customers and defenders of industrial networks.