i24 – When Hackers Go Hardware
Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
i24 – When Hackers Go Hardware
Bentsi Benatar, CMO and cofounder of Sepio discusses the risks of hardware-based attacks following the FBI flash alert about infamous hacker group, FIN7 using BadUSB devices to target US companies.
Printer Hacked
Did you think that this only happens in the movies? Think again.
Cybersecurity Trends and Predictions
Cybersecurity Predictions are always challenging due to the evolving nature of technology and threats. However, here are some trends.
Challenges in Enforcing Hardware Security for IIoT and IoMT
Jessica Amado, Head of Cyber Research at Sepio presented the challenges in enforcing hardware security for IIoT and IoMT.
Hardware Security Measures
Discover key hardware security measures as Sepio’s Bentsi Benatar explores OSINT challenges in preventing hardware-based attacks.
Captain RDM – Episode #22 – Don’t Get Sick
An attacker disguised as a sick patient waits for the perfect moment to carry out a USB Rubber Ducky attack when least expected. Embracing Zero Trust Hardware Access could make the difference when lives are at stake…
Rubber Ducky Attack: The Evil Patient
A rubber ducky attack is a type of cyber attack that involves using a specially crafted USB device to exploit a computer system’s security.
The Role of Zero Trust Hardware in Cybersecurity
This report explains hardware security for zero trust and illustrates the concept using the Sepio commercial solution.
Physical Layer Visibility
Explore the OSI Model’s Physical Layer (Layer 1) in hardware data transmission, connections and hardware security.
Tamir Pardo
Tamir Pardo, Former Director of the MOSSAD discusses global threats that supply chain attacks pose, hardware security attack tools, and more!
Mitigating Wi-Fi Risks
Mitigating Wi-Fi risks is crucial to detect Rogue Access Points that are not authorized to be operating on the network.
Pharmaceutical Industry Cybersecurity
Discover essential strategies for enhancing Pharmaceutical Cybersecurity. Learn how to prevent data breaches and mitigate ransomware risks.