Slide 13
Slide 13 text
My way in.
● Ransomware
● Network Breach
● APT
● Reputation Damage
● Intelligence
● IP Theft
● Cryptomining
● Power Play
Outcome
LARGE
VOLUME OF
DEVICES
ONE
SPECIFIC
COMPANY
Openssl, TCP/IP,
BT Libraries, OS’s
Schneider Electric
APC (TLStorm),
VERKADA hack,
CISCO business router
Reversing
One
Targeted
Device
Target Way In Examples
3rd-party
Vulnerability