On-Demand Videos & Webinars

Wireless Attacks and Data Exfiltration in Secure Environments: Mitiga Mic with Brett Walkenhorst

In this episode of Mitiga Mic, Brian welcomes Brett, CTO of Bastille, to explore the evolving world of wireless security and how invisible airspace threats are reshaping enterprise risk. Brett explains the mechanics behind the infamous “evil twin” attack, where attackers clone trusted Wi-Fi networks to steal user credentials or inject malicious payloads. He then dives into the “nearest neighbor” technique, a creative and persistent attack method that leverages nearby organizations’ wireless networks to infiltrate a target without being physically present, even from thousands of miles away. The conversation expands to the overlooked dangers inside data centers, where wireless exfiltration via Wi-Fi, Bluetooth, Zigbee, and even cellular networks can bypass traditional security tools. Brett shares real examples of hotspots, misconfigured IoT systems, and hidden devices quietly leaking sensitive data. He also highlights how Bastille’s advanced wireless monitoring and analytics bring visibility to these unseen threats, helping organizations secure their airspace and close the backdoor of modern cyber risk.

Don't miss these stories