TIOZ Howest

Howest Logo

News about
#Ethical Hacking

Example project image

Behind the Hack: the Unlocked Storage Container

A public dirt road led us straight to an unlocked storage container. Once inside, we plugged in a computer, scanned the network, found a PLC and rebooted it. This stopping a crane without any alerts. No passwords, no monitoring, no barriers.

Example project image

Behind the Hack: How Audio Visual Equipment like ClickShare became a Hacker's Gateway

In a recent ethical hacking test, we gained full access to a company’s internal network... by simply plugging our laptop into their ClickShare assigned Ethernet port in one of their conference rooms. Your weakest link may be hiding behind your projector.

Example project image

Behind the Hack: the Conference Room Laptop

This is the story of a public guest laptop in a conference room where they offered hands-on product demos. It became the gateway for a full-scale corporate breach by our ethical hackers. The servers were secured. Employees used strong passwords. The network had a firewall. Still, we hacked their internal network.

Events about
#Ethical Hacking

Example project image

Live Hacking Show: Artifhacking Intelligence

For years, we've been told that people are the weakest link in cybersecurity. But does that still hold true now that companies are deploying countless AI bots? Can artificial human-like intelligence also fall victim to phishing, scams, and manipulation?