A Rogue
Cell Tower
hijacking outgoing cellphone connections from your board room.
a vulnerability
not covered
by your existing vulnerability scanner because it doesn’t have a CVE, and requires physical access to the device.
An outlier is a
Misconfigured Camera
set up on the wrong vlan and easily accessible for attackers in your network.
An Outlier is an
Unmanaged Device
plugged in by an employee outside of your IT department.
Offensive Security
Research and Development
An Outlier is a
Blindspot
in your existing security infrastructure.
a vulnerability
In a Device
you didn’t know was connected to your network.
An Outlier
Is An Attack
on a protocol, that you have zero visibility into, like bluetooth.
A Rogue
Access Point
an employee unknowingly connected to while transmitting sensitive information.