Sept. 6, 2023, 2:16 p.m. | Emmaline

Blog - Praetorian www.praetorian.com

Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. Exposed embedded devices are a particular area of concern because they typically do not have host-based security controls such as EDR or Antivirus, but still […]


The post Back to the 90s: Fujitsu “IP series”  Real-time Video Transmission Gear Hard Coded Credentials appeared first on Praetorian.

area back credentials customers devices embedded embedded devices exposed fujitsu gear hard hard coded host impact labs organizations proactive research safeguard security series transmission video vulnerabilities vulnerability vulnerability research zero-day zero-day vulnerabilities

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts