top of page
![](https://static.wixstatic.com/media/6d64a8_83d7bb6ae88b4b73afd7ec8b86157812~mv2.png/v1/fill/w_96,h_47,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/6d64a8_83d7bb6ae88b4b73afd7ec8b86157812~mv2.png)
jeu. 15 oct.
|GoTo Webinar
(CS)²AI ONLINE: Hacking the Supply Chain-Ripple 20 Ubiquitous Vulnerabilities
This is the story of how we found and exploited a series of critical vulnerabilities (later named Ripple20) affecting tens or hundreds of millions of IoT devices across all IoT sectors- industrial controllers, power grids, medical, home, networking, transportation, enterprise, retail, and more.
Registration is Closed
See other events![(CS)²AI ONLINE: Hacking the Supply Chain-Ripple 20 Ubiquitous Vulnerabilities](https://static.wixstatic.com/media/6d64a8_5e811ee296f4446a96996ab8c9ca6d45~mv2.png/v1/fill/w_49,h_43,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/6d64a8_5e811ee296f4446a96996ab8c9ca6d45~mv2.png)
![(CS)²AI ONLINE: Hacking the Supply Chain-Ripple 20 Ubiquitous Vulnerabilities](https://static.wixstatic.com/media/6d64a8_5e811ee296f4446a96996ab8c9ca6d45~mv2.png/v1/fill/w_49,h_43,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/6d64a8_5e811ee296f4446a96996ab8c9ca6d45~mv2.png)
bottom of page