Resource Type: Webinars

Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 2

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities – Part 2.”

Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases.

In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth:

Keystroke Injection

Pairing Attacks

Paired Attacks

Implementation Flaws

PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other protocols

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 1

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities – Part 1.”

Watch this webinar to learn more about the Bluetooth protocol and related vulnerabilities. As more and more devices use Bluetooth and BLE, the opportunity to find potential exploitations also increases.

In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth:

Monitoring

DoS Attacks

Session Hijacking

MitM Attacks

PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other protocols

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Continuous TSCM Update

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Executive Protection series.

Watch the webinar to learn more about the benefits of continuous monitoring. Point in time bug sweeps are essentially rendered obsolete after they are completed. Continuous monitoring, on the other hand, allows for ongoing visibility into your wireless space in addition to extensive historical device activity data.

In this webinar our CTO, Brett Walkenhorst, Ph.D., will discuss how to find:

  • Rogue Wi-Fi access points and data ex-fil devices
  • Rogue video and still-image cameras
  • Bluetooth-based data harvesting devices
  • Cellular voice, data and video ex-fil devices, which can bridge physical networks
  • Industrial Control System jammers, blockers and signal interfering devices
  • PLUS showcase some of the new features in the latest version of Bastille
  • Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wi-Fi Vulnerabilities

Part 2

Bastille’s Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Part 2 of our earlier discussion of Wi-Fi Vulnerabilities.

In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to Wi-Fi Vulnerabilities such as:

Authentication Cracking – WEP, WPS PIN, PMKID, 4-way Handshake, Password Spraying

Client Attacks – PitM, Captive Portal, NetNTLM hash stealing, etc.

Hacker Devices – Wi-Fi Pineapple, O.MG Cable, Wi-Fi USB Rubber Ducky, etc.

This threat of Wi-Fi Vulnerabilities often remains unseen by physical security due to the wireless nature of RF. However, Wi-Fi Vulnerabilities exploited by a malicious actor can compromise your organization’s security, thus necessitating the need for increased awareness and preparedness surrounding the range of current Wi-Fi Vulnerabilities.

In the webinar Dr. Walkenhorst details the current landscape of Wi-Fi Vulnerabilities, and provides techniques on how to mitigate this threat, including:

Monitoring for Suspicious Devices

Policies and Training for Employees

Best Practices for your Wi-Fi networks and devices

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

RF Threats & Vulnerabilities: 2023 Update

Bastille’s Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Cell Phone-based spyware attacks, current threats and vulnerabilities within RF systems, and recent research presented at the 2023 BlackHat and DEF CON events.

In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to RF Vulnerabilities such as:

Cell phone spyware

Vulnerabilities within RF systems

Mitigation strategies

Security best practices

RF vulnerabilities, if not properly addressed, can have far reaching impact across your organization. Whether an attacker is targeting personal devices, large data centers, critical infrastructure systems, or enterprises, no industry is immune from wireless threats. This is why staying up to date with the current landscape of RF Threats and Vulnerabilities is a critical step in maintaining the wireless security of your devices and your organization.

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wireless Insider Threat

In our ever-connected world, wireless devices have transformed how we communicate. However, let’s not forget that all technology is susceptible to insider threats, including wireless devices. In this talk, Shawnee Delaney will shed light on the vulnerabilities that insiders exploit, whether maliciously or carelessly.

Brett Walkenhorst, CTO, Bastille

Our lead speaker is Shawnee Delaney, founder and CEO of Vaillance Group, a decorated clandestine officer, and insider threat expert. Shawnee’s expertise within the area of security, particularly in insider threat, provides a unique perspective into the ways in which an organization may fall victim to an insider attack.

Shawnee will be joined by Bastille CTO Dr. Brett Walkenhorst as they discuss the Top 10 Wireless Insider Threats such as:

Unauthorized Access

Data Theft

Malicious Firmware Changes

Disruption of Operations

And More…

Wireless Insider Threats are real, and so too are the solutions. In this webinar, Shawnee will also detail strategies to mitigate these vulnerabilities including:

Smart Access Controls

Security Training

Strong Authentication Methods

Robust Incident Response Plans

And More…

Speakers:

Shawnee Delaney, Founder & CEO at Vaillance Group

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wi-Fi Vulnerabilities

Part 1

Bastille’s Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Wi-Fi Vulnerabilities.

In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to Wi-Fi Vulnerabilities such as:

Wi-Fi Monitoring Threats – Beacons, Directed Probe Requests, Eavesdropping, Wardriving

Denial of Service – Deauthentication, Beacon Flooding, RTS Flood, etc

Rogue AP / Evil Twin – Open Hotspot, Handshake Crack, EAP Relay, KARMA/MANA

Wi-Fi Vulnerabilities exploited by a malicious actor can compromise your organization’s security. Despite the clear and present danger posed by unaddressed Wi-Fi Vulnerabilities, they go largely unmonitored until a breach occurs, and by then it is too late. This threat often remains unseen by physical security due to the wireless nature of RF.

In the webinar Dr. Walkenhorst details the current landscape of Wi-Fi Vulnerabilities, and provides techniques on how to mitigate this threat, including:

Monitoring for Suspicious Devices

Policies and Training for Employees

Best Practices for your Wi-Fi networks and devices

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Continuous TSCM

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Executive Protection series.

Watch the webinar to learn more about securing your environment from unwanted and unauthorized radio emitting devices.

In this webinar our CTO, Brett Walkenhorst, Ph.D., will discuss how to find:

  • Rogue Wi-Fi access points and data ex-fil devices
  • Rogue video and still-image cameras
  • Bluetooth-based data harvesting devices
  • Cellular voice, data and video ex-fil devices, which can bridge physical networks
  • Industrial Control System jammers, blockers and signal interfering devices
  • PLUS showcase some of the new features in the latest version of Bastille
  • Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wireless Threat Intelligence for Your Cloud Infrastructure

Join our CTO, Brett Walkenhorst, Ph.D., and Aaron Gosney, Director of Field Engineering, to learn more about improving Wireless Threat Intelligence for your Cloud Infrastructure.

Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Cloud Infrastructure security.

In the webinar we cover Data Exfiltration techniques such as:

Rogue Wi-Fi access points and data ex-fil devices

Rogue cameras

Bluetooth-based data harvesting devices

Cellular voice, data and video ex-fil devices, which can bridge physical networks

Industrial Control System jammers, blockers and signal interfering devices

Any one of these threats can impact system stability, deny access to or steal data from applications, or compromise the integrity of the cloud infrastructure.

Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen by physical security.

Dr. Walkenhorst will also cover Data Exfiltration prevention techniques including:

Geofencing Cloud Infrastructure to Detect and Alert on intruding wireless devices

Enforcing a No Cell Phone Policy or Using a Nuanced Wireless Device Policy

Detecting Data Exfiltration by Cellular, Bluetooth, BLE, Wi-Fi or IoT devices

Locating Rogue Devices: Non-authorized RF/wireless devices, networks & hotspots

Speakers:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Aaron Gosney, Director of Field Engineering, Bastille

Cellular Vulnerabilities and Exploitations, 2G to 5G and Beyond… Part 2

The Bastille Research webinar series aims to educate security professionals about the risks and vulnerabilities in RF devices and protocols. In this webinar we cover security vulnerabilities in cellular protocols.

Our speakers, Dr. Altaf Shaik from the Technical University of Berlin and Bastille CTO Dr. Brett Walkenhorst review more modern forms of IMSI catchers, API vulnerabilities, and various forms of cell phone spyware. We also explore the value of wireless monitoring for real-time alerting and forensic analysis to help mitigate the impact of some of these threats.

One key area addressed in the webinar is 5G security. While 5G is more secure than prior generations it still has some key vulnerabilities and security risks.

In this webinar you will learn about:

  • Latest IMSI catchers
  • 5G security
  • API vulnerabilities for Cellular Networks
  • Pegasus and other Spyware threats to Cellular Networks

Speakers:

Dr. Altaf Shaik is a senior research scientist at the Technische Universität Berlin in Germany, and conducts advanced research in telecommunications especially, in 6G security architecture, openRAN, and 5G radio access and core network security. He has more than 12 years of experience in Telecom security and combines a professional background in embedded programming, wireless communications, and offensive network security. Dr. Shaik spent his career as a security engineer and expert at various leading telecommunication companies including Gemalto (currently Thales), Deutsche Telekom, and Huawei Technologies.

His research assisted in improving the 3GPP 4G security standards and exposed several vulnerabilities in commercial mobile networks affecting millions of base stations, networks, and handsets worldwide. Recently he also exposed vulnerabilities in the telecom APIs and 5G slice authentication leading to serious attacks.

Dr. Shaik is a frequent speaker at various prestigious international security conferences such as Blackhat USA & Europe, T2, SECT, Nullcon, Hardware.io and HITB, and many others. His accomplishments landed him in the hall of fame of organizations like Google, Qualcomm, Huawei, and GSMA. He is also the founder of Kaitiaki labs and FastIoT that trains internationally various companies and governmental organizations in exploit development and also building secure mobile and IoT networks including their testing and security assessment. View LinkedIn Profile.

Dr. Brett Walkenhorst has over 20 years of experience as a technology leader in RF systems and signal processing. Prior to Bastille, he led and executed R&D efforts at Lucent Bell Labs, GTRI, NSI-MI Technologies, Silvus Technologies, and Raytheon Technologies. He is a senior member of IEEE and has served as the Chair of the Atlanta Chapter of the IEEE Communications Society. View LinkedIn Profile.

Register to Watch