Armis Honored as Finalist in 2018 SC Media Excellence Award

Company recognized in Rookie Security Company category seven months after launch PALO ALTO, Calif., Feb. 5, 2018 /PRNewswire/ — Armis, the enterprise IoT security company, today announced it has been recognized by SC Magazine as an Excellence Award finalist in the … Continue Reading

Meltdown and Spectre – How to Protect the Enterprise

The news of Meltdown and Spectre has been all over the press. These exploits are critical vulnerabilities in modern processors that allow programs to steal data which is currently processed on the computer. They impact almost every system from desktops … Continue Reading

Bluetooth Worm and Linux Exploit Revealed by Armis at Black Hat Europe

By Ben Seri, Head of Research Today at the Black Hat security conference in Europe, I had the opportunity to reveal new details regarding BlueBorne, the airborne attack vector first disclosed discovered in September 2017. Along with Armis researcher Gregory … Continue Reading

BlueBorne Cyber Threat Impacts Amazon Echo and Google Home

Following the disclosure of the BlueBorne attack vector this past September, Armis discovered that critical Bluetooth vulnerabilities impact the Amazon Echo and Google Home. These new IoT voice-activated Personal Assistants join the extensive list of affected devices. Personal Assistants are … Continue Reading

BlueBorne on Android: Exploiting an RCE Over the Air

This past weekend, Armis researchers Ben Seri and Gregory Vishnepolsky presented a detailed explanation of the Android Remote Code Execution vulnerabilities related to the BlueBorne attack vector at the Hacktivity conference. This presentation included new information regarding the vulnerability, as … Continue Reading

Wi-Fi Attack Vulnerability: A Foundational KRACK in Enterprise Security

Today researchers have disclosed major weaknesses in WPA2. Called a Krack attack (key reinstallation attacks), it can allow an attacker to decrypt WPA2 traffic and in some cases inject or tamper with data. The attack targets the 4-way handshake that establishes … Continue Reading