Millions of Patient Records at Risk: The Perils of Legacy Protocols

  Рет қаралды 3,114

Black Hat

Black Hat

Күн бұрын

...This talk will explain the security shortcomings of DICOM when it is exposed online and provide insights from our internet-wide research. We'll show how hackers can easily find, access, and exploit the exposed DICOM endpoints, extract all patients' data, and even alter medical records. Additionally, we'll explain how we were able to bypass DICOM security controls by gathering information from the statements provided by vendors and service providers regarding their adherence to DICOM standards....
By: Ibrahim Akkulak , Sina Yazdanmehr
Full Abstract and Presentation Materials:
www.blackhat.c...

Пікірлер
Three New Attacks Against JSON Web Tokens
40:18
Black Hat
Рет қаралды 7 М.
Privacy Detective: Sniffing Out Your Data Leaks for Android
30:04
To Brawl AND BEYOND!
00:51
Brawl Stars
Рет қаралды 17 МЛН
Quando eu quero Sushi (sem desperdiçar) 🍣
00:26
Los Wagners
Рет қаралды 15 МЛН
Hackers Who Get Paid to Hack Companies | Short Documentary
15:39
I'll Let Myself In: Tactics of Physical Pen Testers
44:56
Wild West Hackin' Fest
Рет қаралды 2,9 МЛН
Practical LLM Security: Takeaways From a Year in the Trenches
37:01
Solving a REAL investigation using OSINT
19:03
Gary Ruddell
Рет қаралды 205 М.
Tactics of Physical Pen Testers
44:17
freeCodeCamp Talks
Рет қаралды 938 М.
Lisbon Account Protocol and challenges - Tech Talk
33:59
Confidential Computing Consortium
Рет қаралды 76
Where People Go When They Want to Hack You
34:40
Cybernews
Рет қаралды 2,3 МЛН
To Brawl AND BEYOND!
00:51
Brawl Stars
Рет қаралды 17 МЛН