Hackers can gain access to the internal networks of corporations by exploiting two security failings in as little as 30 minutes. Ethical hackers and cybersecurity researchers at Positive Technologies ...