Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats. Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Data Center security. In the webinar we cover Data Exfiltration techniques such as: Rogue Wi-Fi access points and data ex-fil devices Rogue cameras Bluetooth-based data harvesting devices Cellular voice, data and video ex-fil devices, which can bridge physical networks Industrial Control…
Archives: Resources
Cell Phone Spyware and Vulnerabilities Update
SPYWARE AND USB CABLES Cell Phone Spyware and Vulnerabilities Update In this webinar Dr. Baxley will update you on the latest on the Pegasus Cell Phone Spyware, which affects billions of devices. Dr. Baxley will also review our own research into the variety of Cell Phone Spyware vendors and capabilities. Plus, he will review findings from our recent Cell Phone Spyware survey. While the news about Pegasus Spyware focused on the individuals whose phones were hacked, the real story is…
Cellular, Bluetooth, Wi-Fi, IoT Spyware and Vulnerabilities Update 2021
PEGASUS SPYWARE, DEF CON AND BLACK HAT UPDATES Cellphone Spyware and Vulnerabilities Update In this webinar Dr. Bob Baxley, CTO and head of the Bastille Threat Research Team explains how hackers use the Pegasus cellphone spyware and other vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Dr. Baxley will also review the latest RF vulnerabilities presented at Black Hat and DEF CON. While the news about Pegasus Spyware focused on the individuals…
Bastille and CIS Mobile: Enabling the Safe Use of Employees Cell phones in Secure Facilities
LEARN HOW TO USE BASTILLE WITH CIS MOBILE TO ENABLE EMPLOYEES TO SAFELY ENTER SECURE FACILITIES WITH CELL PHONES. Bastille and CIS Mobile Integration Using Bastille with CIS Mobile's altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile's altOS "secure mode" solution can lock cell phone communication abilities when entered into the system. Then, with Bastille's cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is…
Bastille for Red and Blue Teams
LEARN HOW TO USE THE MITRE ATT&CK FRAMEWORK TO IDENTIFY AND LOCATE NEW ADVANCED PERSISTENT THREATS FOR DATA EXFILTRATION Red or Blue Team? We work with both Red and Blue teams to increase their knowledge of Advanced Persistent Threats and Vulnerabilities from Cellular, Bluetooth, Wi-Fi and IoT devices. Time and again we hear “If you want to hunt threats, you have to have data”, while networks provide lots of data about devices connected to them, there is far less data…
Zero Trust Security Posture
PROTECTING ORGANIZATIONS FROM ROGUE ACCESS Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access. Bastille provides full visibility into devices as they enter and exit your facilities. While devices may authenticate, many may not, and yet they are still inside your buildings, forming a shadow IT infrastructure capable of…
Bastille Tactical Solutions
PORTABLE KITS FOR CELLULAR & RF BASED THREAT DETECTION AND LOCATION Learn how to Detect and Locate unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices at temporary sites such as forward deployed, conference/hotel, tent, and other remote locations using Bastille's tactical deployment kits. Bastille Tactical Solutions Our portable tactical kit comes in specialized versions for government and commercial use. For deployment in a range of scenarios we offer kits capable of providing situational awareness in temporary locations from 5,000 square…
Cyber Threat Hunting – Wireless Device APTs
FROM CELLULAR, BLUETOOTH, BLE AND IOT DEVICES Bastille’s threat detection capabilities allow full visibility into RF devices operating in or close to your environment. Bastille detects the persistent threats that other enterprise threat hunters cannot detect, sending data to your SIEM and existing enterprise infrastructure to give you all the information you need to identify and locate the threat Bastille-Threat-Hunting-Image-NO-Shadow.png devices by protocol.gif Use Case: Data Exfiltration -- Mobile Devices Remaining Suspiciously Static and / or Transmitting Inside OR Outside…
Enhanced Threat Hunting to include Wireless APTs
FROM CELLULAR, BLUETOOTH, BLE AND IOT DEVICES Time and again we hear “If you want to hunt threats, you have to have data.” Advanced Persistent Threats and Vulnerabilities from near-network devices using Cellular, Bluetooth or one of the many IoT protocols are invisible to most enterprise threat hunters, as few have any solution to collect the data regarding these devices. Without the data for threat hunters to investigate, the devices and threats persist, making the threat invisible. Bastille’s threat detection…
Radio Frequency IoT Threats
Dr. Bob Baxley, CTO and Head of the Bastille Threat Research Team examines Radio Frequency IoT vulnerabilities which enable hackers to bypass your security, gain access to your systems, and exfiltrate data and voice information. Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine Radio Frequency IoT Threats to Security. Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at…