![image description](images/img3.png)
A Rogue
Cell Tower
hijacking outgoing cellphone connections from your board room.
![image description](images/img5.png)
a vulnerability
not covered
by your existing vulnerability scanner because it doesn’t have a CVE, and requires physical access to the device.
An outlier is a
Misconfigured Camera
set up on the wrong vlan and easily accessible for attackers in your network.
![image description](images/img7.png)
![image description](images/img6.png)
An Outlier is an
Unmanaged Device
plugged in by an employee outside of your IT department.
Offensive Security
Research and Development
![image description](images/img8.png)
An Outlier is a
Blindspot
in your existing security infrastructure.
a vulnerability
In a Device
you didn’t know was connected to your network.
![image description](images/img9.png)
![image description](images/img10.png)
An Outlier
Is An Attack
on a protocol, that you have zero visibility into, like bluetooth.
![image description](images/img11.png)
A Rogue
Access Point
an employee unknowingly connected to while transmitting sensitive information.
![image description](images/img2.png)