From Box to Backdoor: Discovering Just How Insecure an ICS Device is in Only 2 Weeks
By Talos Group Inspired by „From LOW to PWNED,“ we decided to take a look at one Industrial Control System (ICS) wireless access point and see just how many vulnerabilities we could find in two weeks.
Source:: Cisco Security Notice