U.S. Memo Warns Salt Typhoon Infiltrated State National Guard Networks

A previously undisclosed Department of Homeland Security memorandum says a Chinese state‑linked hacking outfit known as “Salt Typhoon” spent nine months inside one state’s Army National Guard network last year, siphoning off network maps and traffic data tied to every other U.S. state and four territories. The memo, obtained by the transparency group Property of the People, shows that the intruders maintained access from March through December 2024, a breach that government analysts described as “extensive.” Investigators informed DHS that the…

From Zone-Level Alerts to Real-Time Precision: Modernizing In-Place Monitoring Systems (IPMS)

Wireless threat detection is not optional in secure government environments, such as SCIFs, forward operating locations, and classified contractor spaces. As RF-enabled devices proliferate and become more difficult to detect with traditional methods, the demand for accurate, continuous monitoring of the wireless spectrum has never been higher. In-Place Monitoring Systems (IPMS) have been a foundational technology for decades, enabling the detection of unauthorized wireless transmissions in sensitive areas. However, most legacy IPMS platforms have not kept pace with the complexity…

Bluetooth Vulnerability Exploit Chain Leaves Millions of Cars Vulnerable to Remote Control

An international team at PCA Cyber Security has disclosed PerfektBlue, a quartet of memory-corruption flaws within OpenSynergy BlueSDK, the Bluetooth stack embedded in head-units from at least four global automakers. Chained together, the bugs hand an attacker within radio range a one-click path to remote code execution (RCE) on in-vehicle infotainment (IVI) systems from Mercedes-Benz, Volkswagen, Škoda, and an unnamed fourth OEM. The discovered vulnerabilities include the following CVEs: CVEComponentCVSS v3.1Description2024‑45434AVRCP8.0Use‑After‑Free during media‑control handling2024‑45431L2CAP3.5Improper validation of remote Channel ID2024‑45433RFCOMM5.7Incorrect function…

Wireless Airspace Defense for Modern Data Centers

Datacenters increasingly support mission-critical operations, from AI model training to cloud infrastructure and co-located enterprise workloads. Threat actors seek unconventional pathways into high-value environments as organizations scale digital services and ramp up compute and storage capacity. Wireless airspace remains one of the least monitored and most vulnerable vectors in datacenter security. Security leaders have hardened networks, segmented infrastructure, and enforced physical access control. However, these controls leave a critical gap without visibility into the radio frequency (RF) spectrum. Rogue cellular…

Recap of HPE Discover: Spotlight on Bastille and Aruba Integration

The recent HPE Discover 2025 event brought together industry leaders, technology innovators, and security professionals from around the world. Bastille Networks’ participation underscored the growing need for comprehensive wireless threat detection and integration with leading network infrastructure solutions such as Aruba Networks. Bastille’s Role: Advancing Wireless Threat Management Bastille emphasized its wireless intrusion detection capabilities at the event. Bastille’s solution passively monitors the wireless spectrum from 100 MHz to 7.125 GHz, providing real-time detection and location of unauthorized devices operating…

Bastille’s Integration with Splunk: Enhancing Wireless Security Through Seamless Data Correlation

In today’s cybersecurity landscape, the growing threat of wireless attacks calls for a robust, integrated approach to network defense. Bastille Networks, known for its 100% passive Wireless Airspace Defense solution, has partnered with Splunk, a leading security information and event management (SIEM) platform. This integration enables users to enhance their ability to detect, monitor, and respond to wireless threats in real-time, providing an additional layer of security for enterprise environments. What the Integration Does Bastille’s integration with Splunk provides a…

Cartel Phone‑Hacking Incident Exposes “Existential” Mobile Threat to U.S. Government Operations

Last week, the Department of Justice Inspector General unsealed an audit describing how a Mexican drug cartel hired a “hacker” who tracked an FBI Assistant Legal Attaché (ALAT) in Mexico City by hijacking the agent’s mobile phone metadata and live geolocation, then cross‑referenced the data with municipal camera feeds. The cartel reportedly used the resulting intelligence to intimidate, and in some cases, murder, human sources tied to the Bureau’s “El Chapo” investigation. “Some within the FBI and partner agencies, such as the CIA,…

Viasat Confirmed as Latest Target in China‑Linked “Salt Typhoon” Over‑the‑Air Surveillance Campaign

Satellite‑communications provider Viasat Inc. has quietly joined Verizon, AT&T, and Lumen as the latest victim of the Chinese state‑aligned “Salt Typhoon” espionage operation, federal investigators told Bloomberg earlier this week. What Happened The breach, uncovered in early 2025 but only now publicly confirmed, allowed attackers to siphon off roughly 100 million call‑detail and location records belonging to 1.3 million mobile users, many of them in greater Washington D.C. Single Entry Point Exposes Satellite Communications Infrastructure The breach of Viasat, discovered earlier this year, adds a concerning…

Bastille Showcases Wireless Threat Response with Cisco ISE at Cisco Live 2025

Cisco Live 2025 brought together thousands of IT and security leaders in Las Vegas to explore the technologies shaping the future of enterprise infrastructure. Bastille was proud to be part of this momentum, demonstrating how our wireless threat detection and response platform integrates with Cisco Identity Services Engine (ISE) to deliver enhanced security outcomes for joint customers. Closing Gaps in Wireless Threat Visibility One of the dominant themes at Cisco Live was the growing concern around wireless-enabled attack surfaces. From…

The Surge in IoT Attacks Targeting Government and Critical Infrastructure: How Bastille Can Help

The growing adoption of Internet of Things (IoT) devices in government agencies and critical infrastructure has introduced significant security risks that cybercriminals aggressively exploit. IoT devices, including IP cameras, environmental sensors, industrial controllers, and smart meters, play a crucial role in public safety, utilities, and defense operations. However, they often lack robust security controls, making them prime targets for cyberattacks. The 2025 SonicWall Cyber Threat Report reveals a 124% increase in IoT attacks, with IP cameras, smart building systems, and…