In our recently published video of the USB Ninja cable, we already gave a short glance into attacks which are based on using hardware rather than software. However, regardless of the danger associated with this, we thought that the chances of unintentionally using such a cables were slim. So we wondered, how common are hardware based attacks? What other types of hardware based attacks are out there?
To answer these questions, we turned to Bentsi Ben Atar, Chief Marketing Officer of Sepio Systems, who already published a compelling article on different types of CISOs with Cyberprotection Magazine. Sepio Systems is specialized in hardware based attacks, so we did gain a lot of insight into how these types of attacks work and how to prevent them.
Watch our interview with Bentsi: