From Box to Backdoor: Discovering Just How Insecure an ICS Device is in Only 2 Weeks

By Talos Group Inspired by „From LOW to PWNED,“ we decided to take a look at one Industrial Control System (ICS) wireless access point and see just how many vulnerabilities we could find in two weeks.

Source:: Cisco Security Notice