Advertisement · 728 × 90
#
Hashtag
#Team82
Advertisement · 728 × 90
Post image

🚨 Trane resolved five vulnerabilities disclosed by #Team82 affecting its Tracer SC, SC+, and Concierge building management system products. The vulnerabilities enable information disclosure, code execution, or denial-of-service attacks.

Read more: claroty.com/team82/discl...

0 0 0 0
Preview
The Weaponization of Critical Infrastructure: How Attackers Leverage CPS for Political and Social Gain In the latest Team82 threat intelligence report, our research points to the same conclusion reached by the Cybersecurity & Infrastructure Security Agency (CISA) in December 2025: There is a noticeable...

🔬 New research from #Team82 shows attackers are increasingly targeting CPS to advance political and social agendas, often using low-tech methods against exposed, internet-facing assets. Find out what organizations can do to strengthen their defenses. 🔖 claroty.com/blog/the-wea...

0 0 0 0
Post image

⚠️ Schneider Electric Electric has addressed 2 vulnerabilities disclosed by #Team82 in its Modicon Controllers M241 / M251, and M262 PLC line, which can allow attackers to cause a Denial of Service condition that affects the availability of the controller.

🔎 Read more: claroty.com/team82/discl...

0 0 0 0
Video

🚨 New research today from #Team82 reveals cyber-physical systems (CPS) are becoming a preferred target for opportunistic threat actors, who are often inspired politically and socially by geopolitical events.

📰 Read more: claroty.com/press-releas...

0 0 0 0
Post image

🚨 Johnson Controls recommends that users of its Frick Controls Quantum HD platform update to current versions after a disclosure by #Team82 of 𝟔 new vulnerabilities. More info: claroty.com/team82/discl...

0 0 0 0
Post image

Copeland has provided updates for its XWEB and XWEB Pro monitoring solutions for #retail and #HVAC environments that address 🚨 𝟐𝟑 vulnerabilities disclosed by #Team82.

⚠️ Check out our Disclosure Dashboard for more details & remediation information: claroty.com/team82/discl...

0 0 0 0
Post image

⚠️ EnOcean has addressed 2 vulnerabilities disclosed by #Team82 in its SmartServer IoT product and #IoT edge server. claroty.com/team82/discl...

🔖 Read more about Team82's research into the LonTalk protocol: claroty.com/team82/resea...

0 0 0 0
Post image

🚨 New from #Team82: Our research team shares its analysis of the LonTalk networking protocol which is often optimized for control applications within building management and automation systems.

Read here: claroty.com/team82/resea...

0 0 0 0
Video

#Team82 lead Noam Moshe shares research on the Axis video surveillance platform, highlighting how many vulnerable servers and devices remain exposed to attackers and how these #IoT assets can be leveraged for lateral movement into networks.

▶️ Watch here: nexusconnect.io/nexus-25

0 0 0 0
Post image

New #Team82 research uncovers a 1-click remote-code execution vulnerability affecting IDIS Cloud Manager viewer that could allow attackers to view live video feeds, recordings, and search images on the video surveillance system. Read more: claroty.com/team82/resea...

1 0 0 0

Team82's Noam Moshe explores his team’s expansive look into IP-based surveillance cameras 🎥 manufactured by Axis Communications.

⚠️ #Team82 uncovered a number of vulnerabilities in the management framework.

▶️ Watch here: nexusconnect.io/videos/noam-...

0 0 0 0
Post image

⚠️ #Team82 and Trend Micro's Zero Day Initiative disclosed 18 vulnerabilities in Algo Communication Products Ltd's IP Audio Alerter product that expose devices to numerous types of remote attacks that could enable code execution, information disclosure.

ℹ️ More info: claroty.com/team82/discl...

0 0 0 0

#Team82 rocks ! 🤘

1 0 0 0
Video

Curious about what’s really happening in cyber-physical systems? Explore real-world research with #Team82 — from vulnerability analysis to practical, tactical insights. 💬 Join the Team82 Research Slack channel: join.slack.com/t/team82rese...

0 0 0 0
Post image

⚠️ Zenitel has provided an update to its TCIV-3+ IP/SIP video intercoms to address 5 vulnerabilities disclosed by #Team82 that could allow an attacker to run arbitrary code or crash systems. Zenitel advises users to upgrade to version 9.3.3.0 or later. claroty.com/team82/discl...

0 0 0 0
Post image

⚠️ METZ Connect has provided firmware updates for 5 vulnerabilities disclosed by #Team82 in Metz's EWIO2 Ethernet I/O Controller. These vulnerabilities could allow an attacker to control the device remotely or remote code execution. Read more: claroty.com/team82/discl...

1 0 0 0

Schwachstelle in Remote-Terminal-Units von Red Lion

@Claroty #Authentifizierung #potatophysischeSysteme #CPS #Potatosecurity #Potatosicherheit #RemoteTerminalUnit #RedLion #Sicherheitslücke #SixnetUniversalProtokoll #Team82

netzpalaver.de/2025/...

0 0 0 0
Post image

Schwachstelle in Remote-Terminal-Units von Red Lion

@Claroty #Authentifizierung #cyberphysischeSysteme #CPS #Cybersecurity #Cybersicherheit #RemoteTerminalUnit #RedLion #Sicherheitslücke #SixnetUniversalProtokoll #Team82

netzpalaver.de/2025/...

0 0 0 0
Post image

🔬 #Team82 has published some details on two serious ⚠️ vulnerabilities in two Red Lion's Sixnet remote terminal unit (RTU) products, and in the Sixnet Universal protocol. The vulnerabilities were assessed a CVSS v3 score of 10.0, and users are urged to apply patches. claroty.com/team82/resea...

0 0 0 0
Post image

⚠️ Danfoss has provided fixes for two vulnerabilities disclosed by #Team82 affecting the DANFOSS AK-SM 8xxA Series of refrigeration controllers that could enable remote code execution and a denial-of-service condition. More info: claroty.com/team82/discl...

0 0 0 0
Post image

⚠️ Siemens has addressed an input validation vulnerability disclosed by #Team82. An unauthenticated local attacker exploiting this vulnerability could crash the RTLS Locating Manager. More info on our Vulnerability Dashboard: claroty.com/team82/discl...

0 0 0 0
Post image

🗓️ New webinar Sept. 18! Join #Team82 for a demo of their Open Sesame attack and learn how attackers can exploit a key data transit point, such as a wireless access device, in order to move onto the network, manipulate data, and disrupt business. Sign up: discover.claroty.com/webinar_brin...

1 0 0 0
Video

Team82's Noam Moshe joins the 🎙️ Nexus Podcast to discuss his research on Axis Communications' popular video surveillance platform. ⚠️ #Team82 discovered four vulnerabilities and an exploit chain that resulted in pre-authentication remote code execution.

🎧 Listen here: nexusconnect.io/podcasts/nex...

1 0 0 0
Post image

🔬 In the latest from #Team82, read how we developed a unique exploit chain that enables remote-code execution on a target by leveraging a pre-authenticated format-string vulnerability that opened the door to overwriting global offset table (GOT) entries. claroty.com/team82/resea...

0 0 0 0
Post image

⚠️ #Team82 has uncovered a vulnerability in the BlueStacks Player virtualization platform stemming from a lack of SSL certificate validation in v5.20. BlueStacks has patched the vulnerability in a recent update. More info: claroty.com/team82/discl...

0 0 0 0
Post image

⚠️ AXIS patched 4 vulnerabilities disclosed by #Team82 in two of its video surveillance platforms. The vulnerabilities include authentication bypasses, privilege escalation, and the most serious, enabling an attacker to remotely execute code. More info: claroty.com/team82/discl...

1 0 0 0
Post image

⚠️ ControlID released an update for its vehicle access control systems iDSecure On-premises that fixes 3️⃣ vulnerabilities disclosed by #Team82. Users should update to version 4.7.50.0. More info: claroty.com/team82/discl...

0 0 0 0
Post image

⚠️ Microsense has provided an update for its NMP Web+ network management systems that addresses 3️⃣ vulnerabilities disclosed by #Team82, one of which was assessed a 🚨 CVSS v3 score of 9.8. More info: claroty.com/team82/discl...

0 0 0 0
Preview
New Research from Claroty's Team82 Reveals Riskiest Building Management System Exposures

New from #Team82: The “State of CPS Security 2025: Building Management System Exposures” highlights the riskiest exposures among building management systems (#BMS). 📁 Read more: claroty.com/press-releas...

1 1 1 1
Preview
New Claroty Research Unveils Alarming Vulnerabilities in Building Automation Systems Claroty's latest study highlights significant vulnerabilities in building management systems, indicating urgent need for cybersecurity measures.

New Claroty Research Unveils Alarming Vulnerabilities in Building Automation Systems #United_States #New_York #Claroty #Team82 #Building_Management_Systems

0 0 0 0