article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, stands as a vital domain within ethical hacking. It has significantly impacted various industries, from telecommunications and healthcare to transportation and entertainment. Why is RF Pentesting Necessary?

article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Kevin Mitnick, who turned legendary hacking exploits and two prison terms into a career as an esteemed cybersecurity leader, died Sunday at age 59 after a 14-month battle with pancreatic cancer, KnowBe4 revealed today. In a 2003 interview Mitnick claimed he never used stolen information or destroyed data during his hacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lyceum APT made the headlines with attacks in Middle East

Security Affairs

reported that Hexane is targeting organizations in the oil and gas industry and telecommunication providers. The group also used the ‘Decrypt-RDCMan.ps1,’ that is a password decryption tool included in the PoshC2 framework for penetration testing. SecurityAffairs – Lyceum, hacking). Pierluigi Paganini.

DNS 81
article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

The group has targeted a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East. I am a computer security scientist with an intensive hacking background.

article thumbnail

Guarding Against Solorigate TTPs

eSecurity Planet

The National Telecommunications and Information Administration (NTIA) offers the concept of a Software Bill of Materials (SBOM) to address this problem. Attackers can steal source code , detection tools, and penetration testing technologies built to fend off the best malicious threats in the world. Breached Organizations.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

The Global State of Information Security Survey 2017 suggests that companies should look into deploying threat detection tools and processes (including monitoring and analyzing security intelligence information), conducting vulnerability and threat assessments, penetration tests and security information, and event management (SIEM) tools.

article thumbnail

The Importance of a Proactive Cyber Defense Solution To Protect Your Critical Data

Security Affairs

As I write this article, news of a Florida water treatment plant being hacked with the perpetrators trying to poison the supply by dramatically increasing the sodium hydroxide levels in the water. This is what is referred to as a cyber Blind-Spot and is what makes them vulnerable to very specific exploits such as the SolarWinds hack.