WPA3 & OWE: Are We Truly Secure in Modern Wireless Environments?

Emerging Wireless Standards Promise Better Security, But New Threats Are Already Here The wireless landscape is evolving rapidly, with new protocols like WPA3 and Opportunistic Wireless Encryption (OWE) designed to address longstanding vulnerabilities in Wi-Fi security. But as with every technological advancement, attackers are quick to adapt. The question organizations must ask: Are these new […]

Critical Cisco Wireless LAN Controllers exploit details go public

Published: June 3, 2025 Summary: A serious vulnerability (CVE‑2025‑20188, CVSS 10.0) has been published publicly, affecting Cisco Wireless LAN Controllers (WLCs) running IOS XE. Attackers can exploit a hard‑coded JWT secret to bypass authentication, allowing arbitrary file uploads and potential remote code execution. All Cisco customers using the affected WLC platforms should immediately apply the […]

Does Micro-Segmentation Really Offer Ultimate Protection for OT/IoT/IoMT Devices?

Micro-segmentation – dividing up your network and setting controls for each part – is currently the trendy solution to have for securing OT, IoT, and IoMT devices, but this belief overlooks several critical realities. Limited Visibility Problem: In environments with OT, IoT, and IoMT devices, installing agents is not feasible, nor do these devices always […]

Rogue Access Points, Evil Twins, Spoofs, and the Risks They Pose

Wireless networks have nowadays become an integral part of our daily lives. However, with this convenience comes a set of risks that every user should be aware of. We’d like to delve into the world of malicious wireless access points, and explore the dangers posed by Rogue Access Points, Evil Twins, and Spoofs. We’ll uncover […]

Network Security Listing

By Gali Carmel.
Here’s your listing of the network security categories and their respective sample vendors

The Network Security Stack

How should your network security stack look like? Here we show how attackers bypass current security solutions through the network airspace, such as the latest Wi-Fi drone attack, and how the network security stack should be updated accordingly.