Sepio Solutions backed by Munich RE Group

Cyber Crime organizations and state sponsored groups use manipulated hardware or firmware, delivered directly by humans or through the supply chain, to carry out their attacks. Existing Cyber Security products lack the required level of visibility that is crucial to mitigate these types of risks. The attackers are very much aware of these limitations and, in recent years, focus on this attack vector. Multiple incidents were revealed, yet most of them didn’t go public. Those which did, for example the NASA JPL Raspberry Pi incident, shed some light on how these attackers are using Physical layer attack tools to hack into highly secured IT/OT infrastructure assets.

Download Case Study
  • Previous Post

    Captain RDM – Episode #16 – Meet the family

  • Next Post

    Captain RDM – Episode #17 – COVID-19 Vaccine Secrets