image description
A Rogue

Cell Tower

hijacking outgoing cellphone connections from your board room.

image description
image description
a vulnerability

not covered

by your existing vulnerability scanner because it doesn’t have a CVE, and requires physical access to the device.

An outlier is a

Misconfigured Camera

set up on the wrong vlan and easily accessible for attackers in your network.

image description
image description
An Outlier is an

Unmanaged Device

plugged in by an employee outside of your IT department.

Offensive Security

Research and Development

image description
An Outlier is a

Blindspot

in your existing security infrastructure.

a vulnerability

In a Device

you didn’t know was connected to your network.

image description
image description
An Outlier

Is An Attack

on a protocol, that you have zero visibility into, like bluetooth.

image description
A Rogue

Access Point

an employee unknowingly connected to while transmitting sensitive information.

image description