Explore BLEEDINGBIT, two zero-day vulnerabilities in Texas Instruments' BLE chips used in Cisco, Meraki, and Aruba wireless access points, in this Black Hat conference talk. Delve into Bluetooth Low Energy technology, its use cases, and layers. Understand the potential impact of these vulnerabilities, including how attackers can penetrate enterprise networks over the air. Examine the packet structure, TI architecture, and the intricacies of the exploit. Witness demonstrations of the attack process, from initial exploitation to establishing a backdoor. Learn about mitigation strategies and gain three key takeaways to enhance network security against such threats.