WPA3 & OWE: Are We Truly Secure in Modern Wireless Environments?

Emerging Wireless Standards Promise Better Security, But New Threats Are Already Here The wireless landscape is evolving rapidly, with new protocols like WPA3 and Opportunistic Wireless Encryption (OWE) designed to address longstanding vulnerabilities in Wi-Fi security. But as with every technological advancement, attackers are quick to adapt. The question organizations must ask: Are these new […]

Rogue Access Points Are Back — And Smarter Than Ever

Map all your wireless devices and access points under your control

They were one of the first wireless threats ever documented. Simple, crude, and often misconfigured — rogue access points used to be the rookie mistake of the early 2000s. But today? They’re back. And they’ve evolved. What was once the domain of interns plugging in Wi-Fi routers “for convenience” is now the playground of red […]

The Wireless Security Wake-Up Call: What EDR, NDR & XDR Still Miss

April 2025 | By the AirEye Team If your EDR, NDR, or even XDR solution isn’t watching your Network Airspace, your perimeter is already broken. Our recent Wireless Airspace Threat Modeling guide sent a clear message: Attackers are exploiting the wireless layer because no one’s watching it. “You can’t stop what you can’t see. And […]

Threat Modeling the Wireless Airspace in 2025

“Any Wi-Fi Attack Can Now Be a Remote Attack” By the AirEye Research TeamInspired by Mathy Vanhoef’s insights 1. Objective Wireless threats are no longer bound to physical proximity. Pre-auth vulnerabilities, beacon spoofing, and rogue access points can now be exploited remotely — even globally — thanks to cloud relays, malicious proxies, and antenna-for-hire models. […]

AirDrop: The Hackers Tool for Dummies

AirDrop: The Hackers Tool for Dummies

Recently passengers of a flight from Israel to Turkey received on their mobile phones pictures of airplane crashes, causing fright and leading the