BLOG

Research

New Vulnerability Allows for Next Generation Rogue Access Point

By Uriya Elkayam - As part of our research, we found a vulnerability by-design in the Wi-Fi protocol that under OWE mode exposes Hidden Networks. This means that a hidden wireless network name is open to all, not just to a device attempting to access a pre-known hidden network.

Subscribe to Our Newsletter

New Vulnerability Allows for Next Generation Rogue Access Point

By Uriya Elkayam - As part of our research, we found a vulnerability by-design in...

Network Security Listing

By Gali Carmel. Here’s your listing of the network security categories and their respective sample...

AirEye Named a Cool Vendor in 2022 “Gartner® Cool Vendors™ in Hybrid Work Security”

AirEye Identifies the Issue of the Ever-Increasing Wireless Networks Within the Corporate Vicinity and Provides...

The Network Security Stack

How should your network security stack look like? Here we show how attackers bypass current...

Wi-Fi Attacks: From White Vans, to Drones and on to Antenna for Hire

Earlier this week Greg Linares published research on a real-life Wi-Fi cyberattack against an east...

First-hand Account of an Anatomy of a Wireless Attack/ Hedgehog Security

Peter Bassill from Incident Response firm, Hedgehog Security, relayed to us the following fascinating anatomy...

AirEye delivers a free network airspace security posture report

Industry veteran joins groundbreaking cybersecurity startup in their mission to provide control and protection for...

AirDrop: The Hackers Tool for Dummies

Recently passengers of a flight from Israel to Turkey received on their mobile phones pictures...

Wi-Fi Spoofing: Employing RLO to SSID Stripping

A few months ago we published the details of a wireless vulnerability, dubbed SSID Stripping,...

Trends in Wi-Fi Vulnerabilities: This Time, It’s Qualcomm

Qualcomm’s monthly security bulletins show an interesting trend with their Wi-Fi chips, which for some...

AirEye Appoints Bryan Kissinger, Cyber Security Healthcare CISO, to Advisory Board

The VP & CISO of Trace3, formerly CISO of Banner Health joins AirEye’s CISO Advisory...

AirEye Appoints Honeywell’s Former VP & CSO, Rich Mason, to CISO Advisory Board

Industry veteran joins groundbreaking cybersecurity startup in their mission to provide control and protection for...

The Intel Vulnerabilities Disclosure: They Actually Can be Remotely Exploitable

Late last week, Intel issued security advisories, INTEL-SA-00539, INTEL-SA-00581, INTEL-SA-00582

It’s Not About Printer Security. It’s a Hole in Your Network Security

Researchers of F-Secure recently released the details of two critical Remote Code Execution (RCE) vulnerabilities...

The NACP Monthly News Roundup – November 2021

From new standard requests on wireless devices and Biden’s order on patching to new IoT...

AirEye Appoints Jason Lish to Advisory Board

The CSO of Lumen Technologies joins the pioneering cybersecurity startup on their mission to deliver...

The NACP Monthly News Roundup – October 2021

From a comprehensive survey of IoT in the Enterprise to the latest vulnerability security cameras...

The SSID Stripping Vulnerability: When You Don’t See What You Get

AirEye’s research team in collaboration with the Computer Science faculty at the Technion – Israel...

The problem with NSA’s public wireless guidance

The NSA guidance acknowledges the inherent insecurity risks of Wi-Fi communications. However, it shifts responsibility...