Emerging Tech: Security — The Need for Wireless Airspace Cybersecurity
Download now▶Excerpt From Introduction to Wireless Threat Intelligence Webinar/
Check Out This Brief Video on Evil Twin Attack Detection /
A phone that has the same SSID as the local business network creates a hotspot in the scenario that CTO Dr. Brett Walkenhorst goes over in the brief clip below. Bastille flags this action as potentially dangerous as soon as it is identified.
Finally, I wanna show you a video of detecting an evil twin attack. So this is a specific threat that we wanna be mindful of, and we're gonna do this with a phone that that turns on a hot spot whose SSID is copying the corporate network in this space.
So he turns it on And Vasille is going to detect that and identify it as a red icon as in a a bad thing, and it did that, and you can see it hiding behind this green r once it does that, it sends webhooks to Splunk, which sends me an email, and another webhook goes a pager duty, which sends me an SMS alert indicating an evil twin attack is going on.
And you can see where that evil twin attack is in space and go do something about it.
Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.