Bastille's Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Part 2 of our earlier discussion of Wi-Fi Vulnerabilities. Part I Part II What's Discussed In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to Wi-Fi Vulnerabilities such as: Authentication Cracking - WEP, WPS PIN, PMKID, 4-way Handshake, Password Spraying Client Attacks - PitM, Captive Portal, NetNTLM hash stealing, etc. Hacker…
Archives: Resources
RF Threats & Vulnerabilities: 2023 Update
Bastille's Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Cell Phone-based spyware attacks, current threats and vulnerabilities within RF systems, and recent research presented at the 2023 BlackHat and DEF CON events. RF vulnerabilities, if not properly addressed, can have far reaching impact across your organization. Whether an attacker is targeting personal devices, large data centers, critical infrastructure systems, or enterprises, no industry is immune…
Wireless Insider Threat
In our ever-connected world, wireless devices have transformed how we communicate. However, let's not forget that all technology is susceptible to insider threats, including wireless devices. In this talk, Shawnee Delaney will shed light on the vulnerabilities that insiders exploit, whether maliciously or carelessly. Our lead speaker is Shawnee Delaney, founder and CEO of Vaillance Group, a decorated clandestine officer, and insider threat expert. Shawnee's expertise within the area of security, particularly in insider threat, provides a unique perspective into…
Continuous TSCM
Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Executive Protection series. Watch the webinar to learn more about securing your environment from unwanted and unauthorized radio emitting devices. What you'll learn about how to find: Rogue Wi-Fi access points and data ex-fil devices Rogue video and still-image cameras Bluetooth-based data harvesting devices Cellular voice, data and video ex-fil devices, which can bridge physical networks Industrial Control System jammers, blockers and signal interfering devices PLUS showcase some…
Wireless Threat Intelligence for Your Cloud Infrastructure
Join our CTO, Brett Walkenhorst, Ph.D., and Aaron Gosney, Director of Field Engineering, to learn more about improving Wireless Threat Intelligence for your Cloud Infrastructure. Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Cloud Infrastructure security. Learn about Data Exfiltration techniques such as: Rogue Wi-Fi access points and data ex-fil devices Rogue cameras Bluetooth-based data harvesting devices Cellular voice, data and video ex-fil devices, which can bridge physical networks Industrial…
Cellular Vulnerabilities and Exploitations, 2G to 5G and Beyond – Part 2
The Bastille Research webinar series aims to educate security professionals about the risks and vulnerabilities in RF devices and protocols. In this webinar we cover security vulnerabilities in cellular protocols. Our speakers, Dr. Altaf Shaik from the Technical University of Berlin and Bastille CTO Dr. Brett Walkenhorst review more modern forms of IMSI catchers, API vulnerabilities, and various forms of cell phone spyware. We also explore the value of wireless monitoring for real-time alerting and forensic analysis to help mitigate…
Bastille Technology Update
In this technology update webinar Dr. Brett Walkenhorst, CTO at Bastille, covers the latest features in Bastille's range of Wireless Threat Detection solutions for detecting, locating and responding to unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations. What will you learn? Latest technical updates on Bastille Recent RF threats seen by Bastille in the…
Bastille Technology Update
In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille's range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations. In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced…
Cellular Vulnerabilities and Exploitations, 2G to 5G and Beyond – Part 1
The Bastille Research webinar series aims to educate security professionals about the risks and vulnerabilities in RF devices and protocols. In this webinar we cover security vulnerabilities discovered in cellular protocols. Dr. Altaf Shaik from the Technical University of Berlin and Bastille, CTO Dr. Brett Walkenhorst review historical application layer, interconnect, and IMSI catchers. We also explore the value of wireless monitoring for real-time alerting and forensic analysis to help mitigate the impact of some of these threats. In this…
Continuous TSCM
Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your environment from unwanted and unauthorized radio emitting devices. Watch the webinar to learn about the latest techniques in Continuous Technical Surveillance and Countermeasures. Three things you will learn from the Webinar: How to detect and locate wireless devices Key challenges facing TSCM professionals Latest TSCM features in Bastille Speaker: Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech