Cartel Phone‑Hacking Incident Exposes “Existential” Mobile Threat to U.S. Government Operations

Last week, the Department of Justice Inspector General unsealed an audit describing how a Mexican drug cartel hired a “hacker” who tracked an FBI Assistant Legal Attaché (ALAT) in Mexico City by hijacking the agent’s mobile phone metadata and live geolocation, then cross‑referenced the data with municipal camera feeds. The cartel reportedly used the resulting intelligence to intimidate, and in some cases, murder, human sources tied to the Bureau’s “El Chapo” investigation. “Some within the FBI and partner agencies, such as the CIA,…

BREAKING: Viasat Confirmed as Latest Target in China‑Linked “Salt Typhoon” Over‑the‑Air Surveillance Campaign

Satellite‑communications provider Viasat Inc. has quietly joined Verizon, AT&T, and Lumen as the latest victim of the Chinese state‑aligned “Salt Typhoon” espionage operation, federal investigators told Bloomberg earlier this week. What Happened The breach, uncovered in early 2025 but only now publicly confirmed, allowed attackers to siphon off roughly 100 million call‑detail and location records belonging to 1.3 million mobile users, many of them in greater Washington D.C. Single Entry Point Exposes Satellite Communications Infrastructure The breach of Viasat, discovered earlier this year, adds a concerning…

Bastille Showcases Wireless Threat Response with Cisco ISE at Cisco Live 2025

Cisco Live 2025 brought together thousands of IT and security leaders in Las Vegas to explore the technologies shaping the future of enterprise infrastructure. Bastille was proud to be part of this momentum, demonstrating how our wireless threat detection and response platform integrates with Cisco Identity Services Engine (ISE) to deliver enhanced security outcomes for joint customers. Closing Gaps in Wireless Threat Visibility One of the dominant themes at Cisco Live was the growing concern around wireless-enabled attack surfaces. From…

The Surge in IoT Attacks Targeting Government and Critical Infrastructure: How Bastille Can Help

The growing adoption of Internet of Things (IoT) devices in government agencies and critical infrastructure has introduced significant security risks that cybercriminals aggressively exploit. IoT devices, including IP cameras, environmental sensors, industrial controllers, and smart meters, play a crucial role in public safety, utilities, and defense operations. However, they often lack robust security controls, making them prime targets for cyberattacks. The 2025 SonicWall Cyber Threat Report reveals a 124% increase in IoT attacks, with IP cameras, smart building systems, and…

Wireless Intrusion Detection Systems: A Critical Tool in Preventing Government Security Leaks

The recent arrest of a Defense Intelligence Agency computer scientist for attempting to transmit classified information to foreign agents has highlighted a critical vulnerability in government security: unauthorized wireless devices in secure facilities. As insider threats continue to challenge national security, Wireless Intrusion Detection Systems (WIDS) are emerging as an essential defense mechanism. The Scope of the Problem According to retired Senior CIA Executive Rodney Alto, only 10 percent of the thousands of U.S. government Sensitive Compartmented Information Facilities (SCIF)…

Why NAC and Switch-Level Security Is Insufficient for Wireless Threats

Network security has traditionally focused on controlling everything at the switch level, a method effective for wired networks but increasingly inadequate for today's wireless-centric environments. As workplaces evolve, organizations must recognize and address the unique challenges posed by wireless devices and networks, moving beyond conventional methods, such as traditional Network Access Control (NAC), and incorporating wireless security solutions to enhance overall security. NAC and Switch-Level Security Limitations for Wireless Traditional NAC and switch-level security solutions effectively manage wired connections, where…

Possible Spyware Attack on High-Profile iPhone Users Underscores Growing Mobile Device Risk

iVerify links suspicious crash logs to flaws patched in iOS 18.3 A new report from mobile-forensics specialist iVerify claims that the iPhones of at least five prominent Americans, including former staffers on the 2024 Harris-Walz presidential ticket, show digital fingerprints consistent with a sophisticated “zero-click” spyware campaign. Apple disputes the conclusion, insisting the artifacts relate to “a conventional software bug that we identified and fixed in iOS 18.3.” While attribution remains uncertain, the discovery once again spotlights how nation-state adversaries…

Taiwanese President’s Security Personnel Used Phones to Steal Classified Documents for PRC

Four Taiwanese soldiers, including three from a security unit responsible for the president's office, have been sentenced to prison terms ranging from five years and 10 months to seven years for espionage activities conducted on behalf of China. The soldiers used their personal smartphones to photograph sensitive military documents and transmit this confidential information to Chinese intelligence agents. Inside the Security Breach According to the Taipei district court ruling, the soldiers: Used mobile phones to photograph classified military information Transmitted…

When AI Poses as the White House Chief of Staff’s Phone

FBI investigates sophisticated voice cloning attack on White House Chief of Staff Susie Wiles as compromised phone exposes nation's most powerful leaders. A quick recap of the incident Today, federal investigators confirmed they are probing an AI-Voice cloning attack targeting Susie Wiles, the White House chief of staff and the president’s closest adviser. An unknown caller, reportedly using an AI-generated clone of Wiles’ voice, spoke with governors, senators, Fortune-500 CEOs, and party rainmakers, requesting sensitive government information, asking members of…

DIA Insider Threat Analyst Arrested for Classified Information Leak Attempt Targeted at the Trump Administration

According to the Department of Justice, IT specialist Nathan Vilas Laatsch, who held a Top Secret security clearance working with the DIA’s Insider Threat Division, was arrested after an FBI sting operation revealed his attempts to provide classified information to what he believed was a foreign government official.  The Timeline of EventsNear-Miss at DIAExpert Knowledge Enabled Successful ExfiltrationWhat Insider Threat Strategies Did Laatsch Know The Government Was Blind ToA Pattern of Evolving Mobile Device Insider ThreatsThe Wireless Dimension of Modern…