article thumbnail

What Is Penetration Testing? Complete Guide & Steps

eSecurity Planet

Penetration tests are simulated cyber attacks executed by white hat hackers on systems and networks. There are different types of penetration tests, methodologies and best practices that need to be followed for optimal results, and we’ll cover those here. Additionally, tests can be comprehensive or limited.

article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, stands as a vital domain within ethical hacking. In contemporary times, with the exponential growth of the Internet of Things (IoT), smart homes, connected cars, and wearable devices, the importance of RF pentesting has soared significantly.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kyivstar Down: Cyberattack Cripples Ukraine’s Largest Telecom Provider

Penetration Testing

Kyivstar, Ukraine’s premier telecommunications operator serving over 25 million mobile and home internet subscribers, has experienced a cyberattack impacting its mobile and internet services.

article thumbnail

Secret Backdoors Found in German-made Auerswald VoIP System

The Hacker News

Multiple backdoors have been discovered during a penetration test in the firmware of a widely used voice over Internet Protocol (VoIP) appliance from Auerswald, a German telecommunications hardware manufacturer, that could be abused to gain full administrative access to the devices.

article thumbnail

Podcast Episode 122: will 5G increase Internet of Things Risk?

The Security Ledger

Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones. But what new kinds of Internet of Things use cases may become possible? Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones.

article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

Expanding attack surfaces require additional skills to secure, maintain, and monitor an ever-expanding environment of assets such as mobile, cloud, and the internet of things (IoT). Penetration tests use tools and experts to probe cybersecurity defenses to locate weaknesses that should be fixed. Outsourcing U.S.

article thumbnail

Scanning for Flaws, Scoring for Security

Krebs on Security

Is it fair to judge an organization’s information security posture simply by looking at its Internet-facing assets for weaknesses commonly sought after and exploited by attackers, such as outdated software or accidentally exposed data and devices? It took Equifax two weeks to fix that expired cert. ARE YOU EXPERIANSED?