Attackers can use connections between wireless chips to steal data or credentials, researchers find
Source
Wireless coexistence – New attack technique exploits Bluetooth, WiFi performance features for ‘inter-chip privilege escalation’

Attackers can use connections between wireless chips to steal data or credentials, researchers find
Source