Resources Video

Wireless Vulnerability

 

Summary

Excerpt From Introduction to Wireless Threat Intelligence Webinar
Find Out More on Wireless Vulnerability by CTO Dr. Brett Walkenhorst
Data indicates that there may be more vulnerabilities that have not yet been found or exploited as zero-day attacks. It also shows that the number of vulnerabilities connected to wireless issues reported in the CVE database throughout time represents the known vulnerabilities. The actual threat landscape and the vulnerability of wireless protocols to attacks are highlighted by the growing trend in vulnerabilities. Find out more in the video below.

Video Transcript

These protocols, these wireless protocols are vulnerable to This plot shows the growth in vulnerabilities for wireless related issues that have been published in the CPE database. You can see those numbers are growing year over year. And as with anything, this is the tip of the iceberg because we only know what we know but there's a lot more vulnerabilities out there that might get exploited by bad actors in the form of zero day attacks, but Just the trend of growth that we see here is indicative of the problem that the threat space is real, that these protocols are as vulnerable as wireline protocols and deserve our attention.

So again, the problem is that these devices and signals are everywhere. We cannot see them and the protocols that they utilize are vulnerable to attack.

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.