Plus Def Con and Black Hat Updates In this webinar Dr. Walkenhorst provides updates on the now infamous Pegasus Spyware affecting billions of cell phones. In addition he reviews the latest RF vulnerabilities presented at Black Hat and DEF CON, including: 4G/5G API Vulnerabilities New Attack Surfaces of BLE Mesh Wireless Keystroke Injection via BLE Low-Level Router Vulnerabilities PIPEDREAM Automotive Rollback Attack Speaker: Dr. Brett Walkenhorst has over 20 years of experience as a technology leader in RF systems and…
Archives: Resources
Wireless Intrusion Detection Location and Alerting
In this webinar with Carahsoft, Dr. Brett Walkenhorst, Bastille’s CTO provides an Executive Briefing on how detecting cell phones, Bluetooth wearables and RF gadgets becomes reality with Bastille. Bastille’s real-time Cellular, Bluetooth, BLE and Wi-Fi detection and location system locates all authorized and unauthorized devices within a campus or forward deployed location. Wireless Devices Located include: Cell Phones: Individual phones located in real-time just by their cellular signal Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human…
Get Rid of Your Shadow-IT and Radio Frequency (RF) Network Blindness
RF Geofence Boundary Policy Enforcement with Bastille and Aruba Join our Brett Walkenhorst, Ph.D., and Aruba's Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area. With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can and cannot go, helping to ensure…
Securing Data Centers from Cellular, RF and Wireless Intrusion Threats
Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats. Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Data Center security. Learn about Data Exfiltration techniques such as: Rogue Wi-Fi access points and data ex-fil devices Rogue cameras Bluetooth-based data harvesting devices Cellular voice, data and video ex-fil devices, which can bridge physical networks Industrial Control System jammers, blockers…
Cell Phone Spyware and Vulnerabilities Update
Spyware and USB Cables Cell Phone Spyware and Vulnerabilities Update In this webinar Dr. Baxley will update you on the latest on the Pegasus Cell Phone Spyware, which affects billions of devices. Dr. Baxley will also review our own research into the variety of Cell Phone Spyware vendors and capabilities. Plus, he will review findings from our recent Cell Phone Spyware survey. While the news about Pegasus Spyware focused on the individuals whose phones were hacked, the real story is…
Cellular, Bluetooth, Wi-Fi, IoT Spyware and Vulnerabilities Update 2021
Pegasus Spyware, Def Con and Black Hates Updates Cellphone Spyware and Vulnerabilities Update In this webinar Dr. Bob Baxley, CTO and head of the Bastille Threat Research Team explains how hackers use the Pegasus cellphone spyware and other vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Dr. Baxley will also review the latest RF vulnerabilities presented at Black Hat and DEF CON. While the news about Pegasus Spyware focused on the individuals…
Bastille and CIS Mobile: Enabling the Safe Use of Employees Cell phones in Secure Facilities
Learn How to Use Bastille with CIS Mobile to Enable Employees to Safely Enter Secure Facilities with Cell Phones Bastille and CIS Integration Using Bastille with CIS Mobile's altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile's altOS "secure mode" solution can lock cell phone communication abilities when entered into the system. Then, with Bastille's cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is not…
Bastille for Red and Blue Teams
Learn How to Use the MITRE ATT&CK Framework to Identify and Locate New Advanced Persistent Threats for Data Exfiltration Red or Blue Team? We work with both Red and Blue teams to increase their knowledge of Advanced Persistent Threats and Vulnerabilities from Cellular, Bluetooth, Wi-Fi and IoT devices. Time and again we hear “If you want to hunt threats, you have to have data”, while networks provide lots of data about devices connected to them, there is far less data…
Zero Trust Security Posture
Protecting Organizations from Rogue Access Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access. Bastille provides full visibility into devices as they enter and exit your facilities. While devices may authenticate, many may not, and yet they are still inside your buildings, forming a shadow IT infrastructure capable of…
Bastille Tactical Solutions
Portable Kits for Cellular & RF Based Threat Detection and Location Learn how to Detect and Locate unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices at temporary sites such as forward deployed, conference/hotel, tent, and other remote locations using Bastille's tactical deployment kits. Bastille Tactical Solutions: Our portable tactical kit comes in specialized versions for government and commercial use. For deployment in a range of scenarios we offer kits capable of providing situational awareness in temporary locations from 5,000 square…