Israel's internal security service began investigations after it was detected in a routine security check that one of the several travel mugs gifted by the Chinese embassy to Israeli government offices contained a suspicious part.
Israel's internal security service began investigations after it was detected in a routine security check that one of the several travel mugs gifted by the Chinese embassy to Israeli government offices contained a suspicious part.
Banco do Brasil has faced cybersecurity incidents involving unauthorized access to sensitive data. Some of these cases have been linked to man-in-the-middle (MITM)–style attacks, where attackers intercept communications between users and banking systems. In certain scenarios, this has involved the introduction of unauthorized electronic devices or compromised internal access, enabling criminals to capture credentials and...
Testing and measurement instruments are trusted as the source of truth in factories and labs, but that trust collapses the moment the equipment itself is compromised. When attackers manipulate calibration files or test limits through malicious USB devices, the entire measurement chain becomes corrupted, silently producing “clean” results for defective or unsafe products. Without proper...
Hardware Asset Visibility refers to an organization’s ability to detect, identify, monitor, and track all physical devices connected to its network or infrastructure. This includes things like computers, servers, network switches, USB devices, IoT gadgets, peripherals (printers, keyboards, etc.), and any other hardware components. Download the Videos Download the Simply Visibility Video (mp4)
Mouse jigglers may seem harmless, but they silently bypass key security controls by keeping unattended systems active. As their use grows across remote and hybrid environments, these rogue USB devices create serious risks, from unauthorized access to compliance violations. With hardware‑level visibility, Sepio exposes mouse jigglers instantly, no matter how well they mimic legitimate activity....
Remote and hybrid work have opened new opportunities for productivity, but also for fraud. From fake activity tools to unauthorized devices and identity misuse, remote worker fraud is rising and creating dangerous gaps in organizational security. Companies need stronger hardware visibility and Zero Trust Hardware Access (ZTHA) to ensure that “working remotely” doesn’t become “working...
Sepio HWDR gives you continuous, expert‑managed visibility into every hardware asset across your environment, no specialization required. Strengthen your cybersecurity posture by uncovering rogue devices, eliminating blind spots, and reducing the risks and costs of hardware‑based incidents and data breaches. With Sepio’s patented, trafficless technology and 24/7 hardware threat specialists, you’ll enhance the value of...
Watch Sepio’s CMO, Bentsi Ben Atar, explain how to trust cyber-physical systems, combat rogue devices, and secure IT infrastructure.
Explore the full video series. You’ve seen these types of attacks in movies and TV shows, but did you think that it was just good editing and special effects?
Did you know that these don’t just take place on the silver screen? In fact, they can be carried out in places that you wouldn’t even expect… such as your office, whether it is in the center of the city, or your home in a quiet neighborhood.
Explore the full video series. Follow the never ending adventures of our superhero as he confronts cyber crime, state sponsored activities, internal abusers and supply chain attacks.
Check out our interview series, in which Jessie Amado, our content specialist interviews fascinating and experienced #womenincyber! Don’t miss out on these great and important discussions about the evolving cybersecurity threat landscape as well as personal experiences.
Explore the full video series. Today, women make up around 20 percent of the global infosec payrolls. It is so important to raise these numbers and put an emphasis on finding new avenues to recruit females to the workforce.
We are so lucky to have such wonderful and inspirational women on our team and board. Stay tuned with insightful videos in which the women on our team & board take a part of-including interviews, tutorials, and more!