Claroty

488 Madison Ave
11th floor
New York, NY 10022
[email protected]
https://www.claroty.com/
Claroty
Articles related to Claroty
Security

EXPLOITED: Dataprobe iBoot-PDU - Blog

February 23, 2023

Modern power distribution units (PDUs) – devices that are commonly used to deliver power to server racks – can be managed remotely. While convenient and often efficient, these power delivery systems also represent an attack vector for bad actors looking to infiltrate networks, data centers, and anything connected to them.

Security

Team82 Releases its State of XIoT Security Report: 2H 2022 - News

February 16, 2023

New York. Claroty’s Team82 released findings that showed a 14% decline of cyber-physical system vulnerabilities disclosed in 2H of 2021 to 2H 2022, in its State of XIoT Security Report: 2H 2022. However, the research team did find an increase of 80% more vulnerabilities found by product security teams over the same time. Claroty describes their disclosure having an optimistic effect on the security of the Extended Internet of Things (XIoT) in environments across a vast array of industry applications such as, industrial, healthcare, and commercial.

Security

EXPLOITED: Siemens PLCs, SIMATIC S7-1200 & S7-1500 - Story

February 08, 2023

Hackers are looking to rise to that top echelon of attacks, achieving that single intrusion they can brag about for years. One of these hacks worth bragging about is to obtain undetected access to code executed on a programmable logic controller (PLC). Why? Because these systems have an abundance of in-memory protections needing to be bypassed. If successful, the integrated code would be in the thick of existing code going undetected by operating systems or security software. Previous work has required physical access and connections to the PLC, or techniques that target engineering workstations and other links to the PLC in order to gain that level of code execution.

Security

EXPLOITED: GE Proficy Historian - Story

January 18, 2023

Claroty’s Team82 has identified five liabilities within the GE Proficy Historian v8.0.1598.0. The vulnerabilities can be used to access the historian, remotely execute code, and crash it and other devices. Four of the vulnerabilities have a CVSS v3 score of 7.5 with one having a CVSS v3 score of 9.8. v7.0.

Processing

The CHIPS Act Passed. Now What? - Podcast

August 05, 2022

On this episode, the Insiders and Jonathan Cobb, CEO of Ayla Networks, take a closer look at the long-discussed Matter standard from smart home connectivity - how far it will go, and when it will go.

Industrial

Claroty Launches Research Arm Team82, Finds Critical Vulnerabilities in Cloud-based ICS Management Platforms - News

July 21, 2021

Claroty launched Team82, its new research arm that provides vulnerability and threat research to Claroty customers and defenders of industrial networks.

Networking & 5G

Claroty Releases its First Zero-Infrastructure Cybersecurity Solution - News

June 24, 2021

Claroty released the Claroty Edge, a new addition to The Claroty Platform that delivers 100% visibility into industrial systems within minutes.