Sept. 6, 2023, 2:16 p.m. | Emmaline

Blog - Praetorian www.praetorian.com

Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. Exposed embedded devices are a particular area of concern because they typically do not have host-based security controls such as EDR or Antivirus, but still […]


The post Back to the 90s: Fujitsu “IP series”  Real-time Video Transmission Gear Hard Coded Credentials appeared first on Praetorian.

area back credentials customers devices embedded embedded devices exposed fujitsu gear hard hard coded host impact labs organizations proactive research safeguard security series transmission video vulnerabilities vulnerability vulnerability research zero-day zero-day vulnerabilities

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)