Posts

Attackers can use surveillance cameras and infrared for bi-directional covert comms between the internal networks of organisations.