Remove Hacking Remove Penetration Testing Remove Technology Remove Telecommunications
article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, stands as a vital domain within ethical hacking. The rapid advancement of technology has woven a complex fabric of wireless networks, each interwoven with vulnerabilities waiting to be exposed. What is Radio Frequency (RF)?

article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Kevin Mitnick, who turned legendary hacking exploits and two prison terms into a career as an esteemed cybersecurity leader, died Sunday at age 59 after a 14-month battle with pancreatic cancer, KnowBe4 revealed today. In a 2003 interview Mitnick claimed he never used stolen information or destroyed data during his hacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lyceum APT made the headlines with attacks in Middle East

Security Affairs

reported that Hexane is targeting organizations in the oil and gas industry and telecommunication providers. A superficial analysis of the document content might conclude that this document was intended for individuals working with industrial control systems (ICS) or operational technology (OT).” Security experts at Dragos Inc.

DNS 81
article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

The group has targeted a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East. I am a computer security scientist with an intensive hacking background.

article thumbnail

APT34: Glimpse project

Security Affairs

The group conducts operations primarily in the Middle East, targeting financial, government, energy, chemical, telecommunications and other industries. The developing technologies (.NET, I am a computer security scientist with an intensive hacking background.

DNS 84
article thumbnail

Iran-linked APT34: Analyzing the webmask project

Security Affairs

The group conducts operations primarily in the Middle East, targeting financial, government, energy, chemical, telecommunications and other industries. I am a computer security scientist with an intensive hacking background. I’ve also been encharged of testing uVote voting system from the Italian Minister of homeland security.

DNS 74
article thumbnail

The Importance of a Proactive Cyber Defense Solution To Protect Your Critical Data

Security Affairs

As I write this article, news of a Florida water treatment plant being hacked with the perpetrators trying to poison the supply by dramatically increasing the sodium hydroxide levels in the water. The product we built is based entirely on Open Source technology, and one of our security modules utilises a technology called Falco.