Want your brand in front of 1000s of RF engineers, SDR enthusiasts, and wireless security researchers?

RF Hackers Sanctuary is open for 2026 sponsors.

Your gear.

Their hands.

Real signal.

https://rfhackers.com/sponsors/
#SDR #RFHacking #WirelessSecurity #HamRadio

RF Hackers Sanctuary

RF Hackers Sanctuary

RF Hackers Sanctuary

Passive RF sensing is becoming real.
Open-source ฯ€ RuView uses WiFi CSI data and low-cost ESP32 microcontroller nodes to reconstruct human body pose through walls.

Inspired by research from Carnegie Mellon University.

New physical-layer surveillance risk?

Source: https://cybersecuritynews.com/wifi-signals-reveal-human-activities/

Follow TechNadu for infosec insights.

#Infosec #WirelessSecurity #CyberSecurity

๐ŸŽ Holiday Giveaway๐ŸŽ

Sponsored by Suzu Labs, the Phillip Wylie Show is giving away a HAK5 WiFi Pineapple Pager โ€” a powerful tool for wireless security assessments and red team operations.

๐Ÿ‘‰ Enter here: https://suzulabs.com/giveaway

Huge thanks to Suzu Labs for supporting the cybersecurity community.

#Cybersecurity #OffensiveSecurity #PenTesting #WirelessSecurity #Giveaway

Enhance Safety with Wireless Security Camera Systems Dubai

VRS Technologies LLC provides top-grade Wireless Security Camera Systems Dubai for homes and businesses. Our advanced wireless CCTV solutions ensure seamless monitoring, reliability, and easy installation. For expert setup and support, contact us at +971505319306.

Visit Us: https://www.cctvinstallationdubai.ae/services/wireless-security-camera-systems-dubai-uae/

#wirelesscctv #securitycameras #cctvuae #dubaisecurity #cctvinstallation #surveillance #vrtstechnologiesllc #wirelesssecurity

Auch 2026 findet wieder ein #GI-SPRING-Graduiertenworkshop der Fachgruppe Security - Intrusion Detection and Response (SIDAR) statt. Diesmal am 21. und 22.04.2026 in #Heidelberg.

Zu den Themen gehรถren #VulnerabilityAssessment, #ThreatIntelligence, #IntrusionDetection, #Malware, #IncidentManagement, #WirelessSecurity, #DigitalForensics usw.

Einreichungen werden bis zum 15.03.2026 angenommen.

https://spring.fg-sidar.gi.de

#CyberSecurity #Conference

Graduierten-Workshop SPRING

Ein Workshop fรผr Nachwuchswissenschaftler auf dem Gebiet der Reaktiven Sicherheit.

๐Ÿ‰ Kali Linux 2025.3 Release โ€” Vagrant, Nexmon & NetHunter Love ๐Ÿš€

Kali 2025.3 just dropped with a tidy set of quality-of-life updates and some neat platform improvements. The team refreshed how they build Vagrant images (moving the VM workflow away from Packer towards a cleaner build pipeline), making virtual images easier to manage for labs and CI. ๐Ÿงฉ๐Ÿ–ฅ๏ธ

A big win for wireless researchers: Nexmon support returns (Broadcom/Cypress chips), bringing monitor mode and injection support back to devices including Raspberry Pi models (now supporting Pi 5). That means more accessible packet capture and radio experiments on compact SBCs. ๐Ÿ“ก๐Ÿง

Kali is also trimming legacy support โ€” dropping ARMel โ€” and polishing desktop niceties like a configurable Xfce VPN-IP panel so multi-VPN users can choose which interface to show. ๐ŸŒ๐Ÿ”ง

New tools (10) were added to the repos โ€” highlights include Caido, Detect It Easy (DiE), krbrelayx, ligolo-mp, llm-tools-nmap, and patchleaks โ€” plus many package updates. Expect easier reverse/forensics workflows, Kerberos tooling, AI-cli helpers, and utilities to speed up patch validation. ๐Ÿงฐโœจ

Kali NetHunter also got attention: a Nexmon-enabled Samsung Galaxy S10 image (budget-friendly internal monitor + injection), CARsenal (car-hacking toolkit) updates and refactors, Magisk module support for kernel modules (experimental), and a raft of bug fixes/UI work for mobile tooling. ๐Ÿ“ฑโš™๏ธ

ARM builds were refined (recommend arm64 Raspberry Pi images, Pi 5 support, kernel update fixes) and there are the usual documentation updates, community wallpapers, and repository tweaks. If you run Kali in lab or mobile setups, this release is worth testing. ๐Ÿ”๐Ÿ“š

โš ๏ธ Disclaimer:
For educational & authorized use only. Kaliโ€™s wireless/attack-capability features (monitor/injection, CARsenal, NetHunter) must be used responsibly in controlled labs or with explicit permission.

#KaliLinux #Kali2025 #NetHunter #Nexmon #Infosec #PenTesting #WirelessSecurity #CyberSecurity #InfoSec

The fourth presentation was Ayoub et al.'s "BlueScream: Screaming Channels on Bluetooth Low Energy," exploring real-world firmware attacks via side-channel vulnerabilities in #BLE devices. (https://www.acsac.org/2024/program/final/s103.html) 5/6 #SideChannelAttack #WirelessSecurity

This summer, our researcher Nikola Antonijeviฤ‡ attended #WiSec2025 & wrote a blog post on "Security in the Inaudible World" โ€“ challenges in inaudible communication ๐Ÿ‘‡
๐Ÿ”— https://www.esat.kuleuven.be/cosic/blog/wisec-2025-spotlight-security-in-the-inaudible-world/

Nikola also presented "ZeroTouch" at #SACMAT2025, reinforcing RSS for secure geofencing ๐Ÿ‘‡ https://www.esat.kuleuven.be/cosic/blog/zerotouch-reinforcing-rss-for-secure-geofencing/
#WirelessSecurity #Geofencing

Wireless Security Protocols Explained: WEP, WPA, WPA2 & WPA3 ๐Ÿ“ก๐Ÿ”

Understanding wireless security protocols is essential for protecting your network from unauthorized access and ensuring data confidentiality.

๐Ÿ“˜ Key Protocols & Their Characteristics:

1. WEP (Wired Equivalent Privacy)
โ€ข Introduced in 1997
โ€ข Weak encryption (RC4), easily cracked
โ€ข Deprecated and insecure

2. WPA (Wi-Fi Protected Access)
โ€ข Interim solution after WEP
โ€ข Improved encryption with TKIP
โ€ข Still vulnerable to certain attacks

3. WPA2
โ€ข Widely used today
โ€ข Uses AES-based CCMP encryption
โ€ข Supports enterprise (RADIUS) and personal (PSK) modes

4. WPA3
โ€ข Latest standard with stronger security
โ€ข Resistant to brute-force attacks
โ€ข Supports SAE (Simultaneous Authentication of Equals)
โ€ข Enhanced encryption and forward secrecy

Why it matters:
Choosing the right wireless protocol significantly affects your networkโ€™s resilience against common attack vectors such as packet sniffing, replay attacks, and credential theft.

Disclaimer: This post is for educational and awareness purposes only. Always secure your wireless networks using the latest standards.

#WirelessSecurity #WPA3 #WEP #WPA2 #CyberSecurity #InfoSec #EducationOnly #WiFiProtocols #NetworkSecurity #WiFiEncryption

Wireless Penetration Testing Tools You Should Know ๐Ÿ“ก๐Ÿ”

Wireless networks can be a critical attack surface if not properly secured. These tools are widely used in authorized lab environments to assess the strength of Wi-Fi configurations and encryption protocols.

Use cases include:
โ€ข Testing weak encryption (WEP/WPA)
โ€ข Detecting rogue access points
โ€ข Capturing and analyzing authentication handshakes
โ€ข Teaching wireless attack vectors in controlled labs

Disclaimer: This content is for educational and ethical use only. Wireless testing must only be performed on networks you own or have explicit authorization to audit.

#WirelessSecurity #WiFiPentest #CyberSecurity #InfoSec #EthicalHacking #EducationOnly #RedTeamTools #WirelessAuditing #AircrackNG #WPA2