New Report: From Project File to Code Execution—Exploiting Vulnerabilities in XINJE PLC Program Tool
Team82 discloses some details about two vulnerabilities in the XINJE PLC Program Tool. If exploited, the vulnerabilities in the engineering workstation software can be used to gain code execution.Read the report
Team82’s innovative research into ICS vulnerabilities and OT protocols has elevated Claroty’s research team as leaders in the field.
Team82 Vulnerability Dashboard
Team82 is the leading industrial cybersecurity research team doing vulnerability research for industrial control systems and operational technology networks. Track the latest ICS and OT vulnerabilities here.See the Dashboard
TEAM82 Research Reports
VP of Research
Amir Preminger is the Vice President of Research at Claroty. He brings over 10 years of cybersecurity experience in a variety of research and managerial roles. Prior to joining the company, Amir spent almost a decade in one of the IDF's elite technological units where he played a key role in the research and development of advanced Cyber Solutions across multidisciplinary domains. Amir was directly involved in a number projects that won the prestigious Israel Defense Award. Amir holds a B.Sc. in Computer Science from the Academic College of Tel-Aviv Yafo.
Principal Vulnerability Researcher
Sharon Brizinov is principal vulnerability researcher and team lead, responsible for finding new attack vectors in industrial control systems and operational technology devices and protocols. Sharon has more than seven years of experience with network security, malware research and information security data analysis.
Team82 Coordinated Disclosure Policy
Team82 is committed to privately reporting vulnerabilities to affected vendors in a coordinated, timely manner in order to ensure the safety of the industrial cybersecurity ecosystem worldwide. To engage with the vendor and research community, Team82 invites you to download and share our Coordinated Disclosure Policy. Team82 will adhere to this reporting and disclosure process when we discover vulnerabilities in products and services.Download