🎅🎁 Ho ho ho #Telco📡! 5GC Pentest Burp Suite ext under the tree! 🔐🎄 https://github.com/PentHertz/5GC_API_Pentest ✨🎉🚀 #5GSecurity
🚨 New research reveals #SNI5GECT, a powerful open-source tool that can sniff & inject messages into 5G pre-authentication traffic without rogue towers! It enables 5G downgrades, DoS, and identity leaks within 20m. A serious wake-up call for 5G security ⚠️🔓📶 Read more: https://cyberinsider.com/new-sni5gect-attacks-bypass-5g-security-without-rogue-towers/ #Cybersecurity #5GSecurity #Infosec #newz
New SNI5GECT Attacks Bypass 5G Security Without Rogue Towers

A powerful open-source framework called SNI5GECT can sniff and inject messages into pre-authentication 5G NR communication.

CyberInsider

🎥 What is O-RAN, really?

O-RAN isn't just a buzzword — it's a structural shift in how we build radio access networks.

By moving away from proprietary, locked-in systems and toward open, cloud-native architectures, operators gain flexibility… but also inherit new risks.

At the beginning of this analysis, we lay the groundwork — defining what O-RAN is before unpacking the security implications throughout the session.

▶️ Watch the full webinar for the complete breakdown: https://app.getcontrast.io/register/p1-security-open-ran

#ORAN #TelecomSecurity #5GSecurity #MobileNetworks #NetworkSecurity #CRAN #OpenRAN #TelcoSec #TelecomTransformation #CyberSecurity #P1Security

Last week, P1 Security was at MWC Barcelona, connecting with industry leaders to discuss the latest in mobile network security. From #5G vulnerabilities to #AI driven cyber threats, the conversations emphasized the need for advanced attack surface management, intrusion detection, and threat intelligence solutions.

🙏 A special thank you to Business France for their incredible support and organization throughout the event.

A huge thank you to our #partners, #customers, and industry #peers who joined us to exchange insights and drive innovation in telecom security. Looking forward to what’s next!

#MWC25 #TelecomSecurity #5GSecurity #CyberThreats #AIinTelecom #P1Security

💥Thank You for Attending Yesterday’s Power-Packed Webinar on 5G Security & Regulatory Frameworks💥

A big shoutout to everyone who joined us for our session: Aligning regulatory frameworks (like NIS2) & TelcoSec guidelines for real-world 5G security led by our CEO & Founder Philippe Langlois, and André Årnes, Partner at White Label Consultancy and former CISO of Telenor Group.

Philippe and André shared real-world insights on the challenges of securing 5G networks and making those regulatory frameworks work in practice. This was more than just theory—it was a practical guide to navigating the complexities of 5G security.

💡 Our Q&A was filled with great questions, covering topics like:

- How do we move from NIS2 & ENISA guidelines to real 5G security controls and audit points?
- How can European telecom operators ensure NIS2 compliance, especially with SS7 access points in high-risk regions?
- What are the key steps to conducting an effective maturity assessment?

Missed it live? No problem! You can catch the full recording here: https://app.getcontrast.io/videos/a557b7d8-afea-414f-94d5-52a86193cb35 🎥

Stay tuned for more insights and events on staying ahead in 5G security and compliance.

#5GSecurity #NIS2 #TelecomCompliance #TelcoSec #MobileNetworkSecurity

Aligning regulatory frameworks (such as NIS2) & TelcoSec guidelines for real world 5G security

Contrast videos

DeepSec 2024 Training: Attacking and Defending Private 5G Cores – Altaf Shaik

Security is paramount in private 5G networks because of their tailored nature for enterprises. They handle sensitive data, connect mission-critical devices, and are integral to operations. This advanced 5G Core Security Training is a

https://blog.deepsec.net/deepsec-2024-training-attacking-and-defending-private-5g-cores-altaf-shaik/

#Conference #Training #5GSecurity #DeepSec2024 #MobileNetwork #Training

DeepSec 2024 Training: Attacking and Defending Private 5G Cores - Altaf Shaik

The DeepSec conference offers a 5G core network security training course. Learn how to defend 5G infrastructure against original attacks.

DeepSec In-Depth Security Conference
Back from popular demand, register to our upcoming webinar on 5G Security vulnerabilities, best practices and state of the market.
And bring your questions !
https://app.getcontrast.io/register/p1-security-navigating-5g-security-realities-readiness-priorities-and-market-insights
#5GSecurity #webinar #TelcoSec
Navigating 5G Security Realities: Readiness, Priorities, and Market Insights

Join our exclusive webinar as we delve into the dynamic landscape of 5G security. As the industry hurtles towards a 5G-enabled future, understanding the nu...

Contrast videos
📱5G is revolutionizing connectivity, but what about its security aspects? Dive into our blog to discover what every consumer and cybersecurity pro should know! #5GSecurity #TechTrends #StaySafeOnline | https://zurl.co/NoQP
5G Security: What Consumers and Cybersecurity Teams Need to Know – Cyber Tips Guide

– The arrival of 5G heralds a new era in wireless technology, promising faster speeds, lower latency, and a more interconnected world. However, with these advances come new challenges, especially in the realm of security. Both consumers and cybersecurity teams must be aware of the potential threats and vulnerabilities associated with 5G. Let's delve into what 5G is not just about speed; it's about creating an infrastructure that supports a vast ecosystem of interconnected devices, but it comes with risks. Read more.

Cyber Tips Guide – Making Sense of Cyber Safety

Seattle and Bellevue area friends- join us tomorrow (Oct 10) at the T-Mobile Tech Experience #Cybersecurity Speaker Series Event.

Register (free) 👉 rsvp.theworldsbest.events/_rvj03

#infosec #cyber #5gsecurity @caseyjohnellis

A. Michalas et al., "From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem"¹

Despite the numerous pompous statements regarding 5G, it is indisputable that 5G creates a radical shift in telecommunications. The main reason is that 5G is an enabler of numerous applications we have long envisioned and either simulated or implemented in test environments, partially or on a smaller scale. 5G will soon unlock the potential of smart cities, industry 4.0, and IoT, to name a few. However, a crucial question is how much we can trust this technology. Since this technology will soon become the core infrastructure for all of the above, it is critical to understand the fundamental security mechanisms that comprise this technology and the guarantees they provide to assess the potential risks we are exposed to. This work follows a non-technical yet bottom-up approach to introduce the reader to the core security mechanisms and establish a baseline for the security of 5G, to demystify the principal notions and processes. Based on the above, we streamline future directions and highlight possible threats.

#ResearchPapers #arXiv #5GSecurity

__
¹ https://arxiv.org/abs/2212.09149

From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem

Despite the numerous pompous statements regarding 5G, it is indisputable that 5G creates a radical shift in telecommunications. The main reason is that 5G is an enabler of numerous applications we have long envisioned and either simulated or implemented in test environments, partially or on a smaller scale. 5G will soon unlock the potential of smart cities, industry 4.0, and IoT, to name a few. However, a crucial question is how much we can trust this technology. Since this technology will soon become the core infrastructure for all of the above, it is critical to understand the fundamental security mechanisms that comprise this technology and the guarantees they provide to assess the potential risks we are exposed to. This work follows a non-technical yet bottom-up approach to introduce the reader to the core security mechanisms and establish a baseline for the security of 5G, to demystify the principal notions and processes. Based on the above, we streamline future directions and highlight possible threats.

arXiv.org