Black Hat Europe 2025: Was that device designed to be on the internet at all?
ATT&CK techniques detected
T1133External Remote Services
71%
“using the fire controls to release all doors, they could let unauthorized people into the building ( this sounds a bit mission : impossible, but is very plausible ). all companies need to ensure the services that form the fabric of their buildings are secured to the same level as…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078Valid Accounts
54%
“using the fire controls to release all doors, they could let unauthorized people into the building ( this sounds a bit mission : impossible, but is very plausible ). all companies need to ensure the services that form the fabric of their buildings are secured to the same level as…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found