Skip to content
Logo air
  • Why Aireye?
    • Network Airspace Threats
    • Resources
      • Hadassah Medical Center Use case
      • Enterprise Wireless Security Best Practices
      • Anatomy of an Over-the-Air Attack
  • Solutions
    • By Over-the-Air Threat
      • Unauthorized Access
      • Data Leakage
      • Segmentation Hopping
      • Device Hijacking
    • By Industry
      • Healthcare Providers
  • Technology
    • Platform
      • How it Works
      • Comparison of Features
      • The Gap in Network Airspace Security & How We Close It
    • Values
      • Visibility
      • Control
      • Protection
    • Partners
      • Meraki
  • About
    • Who We Are
    • In The News
    • Blog
    • Careers
    • Contact Us
  • Request Demo
  • Why Aireye?
    • Network Airspace Threats
    • Resources
      • Hadassah Medical Center Use case
      • Enterprise Wireless Security Best Practices
      • Anatomy of an Over-the-Air Attack
  • Solutions
    • By Over-the-Air Threat
      • Unauthorized Access
      • Data Leakage
      • Segmentation Hopping
      • Device Hijacking
    • By Industry
      • Healthcare Providers
  • Technology
    • Platform
      • How it Works
      • Comparison of Features
      • The Gap in Network Airspace Security & How We Close It
    • Values
      • Visibility
      • Control
      • Protection
    • Partners
      • Meraki
  • About
    • Who We Are
    • In The News
    • Blog
    • Careers
    • Contact Us
  • Request Demo

In The News

Home | About | In The News

In The News

Sep 18, 2021
forbes
New ‘WiFi Stripping’ Exploit Supercharges Smartphone Hotspot Hacks
new_wifi_stripping_exploit_supercharges_smartphone_hotspot_hacks
Sep. 30, 2021
scmagazine
Wireless device users under attack, using ‘SSID Stripping’ phishing techniques
wireless_device_users_under_attack_using_ssid_stripping_phishing_techniques
Sep. 13, 2021
security_week
SSID Stripping: New Method for Tricking Users Into Connecting to Rogue APs
ssid_stripping_new_method_for_tricking_users_into_connecting_to_rogue_aps (1)
Sep 15, 2021
the_mac_observer
‘SSID Stripping’ Can Trick You Into Joining a Malicious Wi-Fi Network
ssid_stripping_can_trick_you_into_joining_a_malicious_wi-fi_network
Sep. 14, 2021
the_cyberwire
Zero-click iOS exploit used by Pegasus spyware. Malicious version of Cobalt Strike for Linux.
zero-click_ios_exploit_used_by_pegasus_spyware_malicious_version_of_cobalt_strike_for_linux (1)
Aug. 4, 2021
the_new_york_times
Beware Free Wi-Fi: Government Urges Workers to Avoid Public Networks
beware_free_wi-fi_government_urges_workers_to_avoid_public_networks
Jul 17, 2021
forbes
New iPhone WiFi SSID Hack Is Now Considerably More Dangerous
new_iphone_wifi_ssid_hack_is_now_considerably_more_dangerous
Jul 6, 2021
forbes
New iPhone WiFi Hack Becomes More Dangerous, Affects All iOS 14 iPhones
new_iphone_wifi_hack_becomes_more_dangerous_affects_all_ios_14_iphones (1)
Jul 3, 2021
forbes
New iPhone WiFi Hack Is Potentially Very Dangerous
new_iphone_wifi_hack_is_potentially_very_dangerous (1)
June 29, 2021
gartner
A 100 Day Plan on Your Road to Securing Critical Infrastructure & Beyond
a_100_day_plan_on_your_road_to_securing_critical_infrastructure__beyond
Jul 13, 2021
dark_reading
Why We Need to Raise the Red Flag Against FragAttacks
new_iphone_wifi_hack_becomes_more_dangerous_affects_all_ios_14_iphones (1)
Jun 21, 2021
the_register
It’s 2021 and a printf format string in a wireless network’s name can break iPhone Wi-Fi
its_2021_and_a_printf_format_string_in_a_wireless_networks_name_can_break_iphone_wi-fi (1)
June 22, 2021
arstechnica
Connecting to malicious Wi-Fi networks can mess with your iPhone
connecting_to_malicious_wi-fi_networks_can_mess_with_your_iphone
Apr 22, 2021
calcalistech
AirEye raises $8 million to extend network security in digital airspace
aireye_raises_8_million_to_extend_network_security_in_digital_airspace
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do..
AI-driven | Saas | Zero-touch | Non-intrusive
Request a Demo
Logo air
Linkedin

Why Aireye?

Network Airspace Threats

Resources

Hadassah Medical Center Use case
Enterprise Wireless Security Best Practices
Anatomy of an Over-the-Air Attack

Solutions

By Over-the-Air Threat

Unauthorized Access
Data Leakage
Segmentation Hopping
Device Hijacking

By Industry

Healthcare Providers
Defense Manufacturers
Other Industries

Technology

Platform

How it Works
The Gap in Network Airspace Security & How We Close It

Values

Visibility
Control
Protection

Partners

Meraki

About

Who We Are
In The News
Blog
Careers
Contact Us

Copyright © 2024 Aireye | All Rights Reserved | Cookies Policy | Privacy Policy