APTs target telecom cores for tracking & intel. Recording: watch.getcontrast.io/register/p1-...
#5GSecurity #TelecomSecurity
Posts by P1 Security
Open source drives telecom innovation. It also needs real protocol security testing. Our latest Ella Core findings are on cve.p1sec.com #TelecomSecurity #OpenSourceSecurity
Cyber conflict has a long memory. In this clip, Hamid Kashfi touches on how methods evolve and resurface over time. Replay: watch.getcontrast.io/register/p1-...
#telcosec #telecomsecurity
Where are we actually exposed? TelcoASM helps telecom teams quickly visualize network risk exposure and benchmark it in minutes. Free: telcoasm.p1sec.com
At a radio site, they feared metal theft. The bigger risk was RAN to core compromise. Watch: watch.getcontrast.io/register/p1-security-physical-to-5g-core-compromise
Join us for TelcoSec Talk #2, with Philippe Langlois and Hamid Kashfi as we map the Iran-linked APT ecosystem. We’re connecting technical signals and infrastructure to see the full picture. Tomorrow 11am CET. 🛡️ Register: watch.getcontrast.io/register/p1-...
#CyberSecurity #APT #ThreatIntel #war
Next week: TelcoSec Talk #2 with Philippe Langlois and Hamid Kashfi on the Iran cyber threat landscape, using ApexThreats. Register: watch.getcontrast.io/register/p1-...
#CyberThreatIntelligence #TelecomSecurity #ThreatIntelligence #CyberSecurity #APT #Iran #TelcoSec #P1Security
MWC is done. The badge is off. The conversations are not.
What stood out most? Telecom security is a real operational priority.
If we missed you at MWC, let’s continue the discussion: contact@p1sec.com
#MWC26 #TelecomSecurity #5GSecurity #CyberSecurity #P1Security
P1 Security will be part of the Online [un]prompted conference this week.
Philippe Langlois, our founder and CEO, will moderate a lunchtime Zoom chat session titled:
Defense and Offense of Critical Infrastructure in the Age of AI
Contact: contact@p1sec.com
#AISecurity
“Open it temporarily so it works” is how 5G networks get permanently exposed.
“No firewall matrix, no traffic flow visibility, so people open the network until things work… then leave it like it is.”
Recording: watch.getcontrast.io/register/p1-...
#5GSecurity #TelecomSecurity #ZeroTrust
SMS blasters = high volume spam or fraud. At #MWC2026 in Barcelona, we’re bringing a fun SMS Blaster Detector experiment. Let’s meet: www.p1sec.com/mwc-2026
Physical access is not “local only”. In many environments it can become a network foothold, then pivot via the management plane, weak segmentation, insecure remote access, or stolen creds until the 5G core is reachable.
Register: watch.getcontrast.io/register/p1-...
How does physical exposure translate into risk for mobile critical infrastructure, and how can teams reduce it without slowing operations down?
Physical to 5G Core Compromise
Red team lessons learned + practical takeaways
Thu 5 Feb 2026, 14:00 CET
Register: watch.getcontrast.io/register/p1-...
Risk Matrix Overview showing exposure levels across telecom domains. Rows include Management Plane, Signalling Plane, Supply Chain, Virtualization Stack, and Monitoring and Analysis. Columns include 4G RAN, 5G RAN, 4G Packet Core, 5G Packet Core, IMS and VoLTE Core, and Legacy 2G and 3G. Cells display color coded risk levels such as Low, Moderate, High, and Critical, with some areas marked as Unknown. The matrix highlights higher exposure in Legacy 2G and 3G as well as in core and signalling domains.
We released the Telco Attack Surface Matrix to help teams visualise exposure across RAN, Core, IMS, signalling and more. Try it and share your feedback so we can improve it. telcoasm.p1sec.com #telcosec
Weak passwords still break 5G in 2025. No zero days needed. If your access controls rely on bad defaults, start fixing them.
Replay 👉 watch.getcontrast.io/register/p1-...
In 5G, you don’t lose the network when someone gets in you lose it when you realize there was never proper control in the first place.
Full replay: watch.getcontrast.io/register/p1-...
#5GSecurity #TelecomSecurity #CoreNetworkSecurity #5GPentest
Wednesday we held our webinar “Top 5G Security Vulnerabilities: Insights from P1 Security Pentest Activities.” Thanks for joining. As promised, here’s the recording — watch and share with your team: watch.getcontrast.io/register/p1-... #5GSecurity #Cybersecurity #Telecom
LTE’s All-IP design expands the attack surface—legacy SS7 meets Diameter, S1, X2 & GTP risks. Read real flaws & mitigations in the *LTE Pwnage* ebook: www.p1sec.com/white-paper/... #LTE #CyberSecurity #P1Security
Everyone talks about resilience. We focus on the foundation.
Strong passwords mean nothing if your 5G core is exploitable.
Join 5G Penetration Tester El Mehdi Regragui as he reveals real pentest findings across signaling & OAM.
🔗 watch.getcontrast.io/register/p1-...
#5GSecurity
🌏 Our Global Account Manager, Thilip Suppaiah, is at #DNSKualaLumpur representing P1 Security. Attending? Reach out: contact@p1sec.com
#DigitalNationSummit #GSMA
Top 5G Security Vulnerabilities revealed 🔓
Weak auth, misconfigured cores & more, 5G still opens doors for attackers.
Join P1 Security’s El Mehdi Regragui as he shares exclusive pentest insights
watch.getcontrast.io/register/p1-...
#5G #TelecomSecurity #Pentesting #MobileSecurity #Webinar
5G was built to be “secure by design.” In practice, many deployments still expose Diameter, GTP & SBA interfaces attackers can abuse.
Full replay 👉 watch.getcontrast.io/register/p1-...
Is your network secure in practice?
Book a call 👉 calendly.com/yves-mangamb...
#5G #TelecomSecurity #P1Security
📡 5G: More Features, More Attack Surfaces
SBA, slicing, NFV, HTTP/2 APIs… 5G isn’t just faster, it’s more complex (attackers love complex).
Learn to secure it with TS-501: 5G Telecom Security ⬇️
online-training.p1sec.com/course/5g-te...
#5G #TelecomSecurity #TS501
🛡️ From SS7 flaws to the latest HTTP/2 5G zero-days, P1 Security’s VKB tracks them all.
⚡ Always up-to-date
⚡ Telecom-native context
⚡ Actionable before attackers strike
🔗 saas.p1sec.com/home
www.p1sec.com/product/vuln...
#TelecomSecurity #VKB #5G #HTTP2 #SignalingSecurity
📡 IMS & SIP: Core to telecom — and top targets for attackers.
⚠️ SIP spoofing, session hijacking
⚠️ IMS DoS, weak auth, 3rd-party app risks
🔍 Learn how they work, where they break, and how to secure them:
www.p1sec.com/blog/ims-and...
#TelecomSecurity #IMS #SIP
🎥 O-RAN: Disaggregation = Bigger Attack Surface
More flexibility means more interfaces — and more exposure.
In this clip, we break down the real risks we see in the field.
📩 Rolling out O-RAN?
Let’s talk: www.p1sec.com/contact
#ORAN #5GSecurity #TelcoSec
🚨 Many telco vulns never get CVEs.
Vendors delay, ignore, or silently patch.
Operators? Left in the dark.
At P1 Security, we follow a 180-day disclosure policy—document and publish in our private VKB when silence persists.
🔗 www.p1sec.com/blog/respons...
#CVE #TelecomSecurity #VKB
O-RAN isn’t just open — it’s a full shift in how mobile networks are built.
In the intro to our webinar, we lay the groundwork: what O-RAN is, and why it introduces both flexibility and risk.
🎥 Watch the full session → app.getcontrast.io/register/p1-...
#ORAN #5GSecurity #TelcoSec
Telecom networks are under fire—attackers exploit core weaknesses, silently and persistently.
📅 Sept 10 | 🕒 15:00–16:00 CET
🎙️ Valeri Dragoev, P1 Security
📡 Real attack traces via PTM
🔗 app.getcontrast.io/register/p1-...
#TelecomSecurity #5GSecurity #PTM #CyberSecurity #SignalingSecurity
O-RAN’s flexibility comes at a cost: more interfaces = more attack surfaces.
In our latest webinar, we dive into how openness and vendor diversity reshape both deployment and the threat landscape.
🔗 Watch the recording: app.getcontrast.io/register/p1-...