Video Hub
Video

Bluetooth Vulnerabilities

Excerpt From Introduction to Wireless Threat Intelligence Webinar
Learn More in This Video From CTO Dr. Brett Walkenhorst on Bluetooth Vulnerabilities
CTO Dr. Brett Walkenhorst presents the various vulnerabilities found in Bluetooth technology. Attackers may use those vulnerabilities to infiltrate systems and obtain unauthorized access to private data. See this video to find out more about particular attack techniques and often used malicious Bluetooth-enabled devices.

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.