Posted on
in Presentations
This session will show how attackers can exploit the light sensitivity of a multifunction printer for infiltrating commands to a malware installed on an isolated organization. It will demonstrate the attack on a real organization using (1) a laser attached to a tripod stand; (2) a laser carried by a drone; and (3) a hijacked smart bulb.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community