P1 Security (@p1security) 's Twitter Profile
P1 Security

@p1security

P1 Security is a leading provider for its offensive security services, software and trainings on mobile networks unique protocols (2G to 5G)

ID: 385321127

linkhttp://www.p1sec.com calendar_today05-10-2011 09:02:11

154 Tweet

1,1K Followers

75 Following

P1 Security (@p1security) 's Twitter Profile Photo

2025 exposed critical weaknesses in global telecom networks. We will dive into Liminal Panda, Salt Typhoon, SK Telecom key exposure and the MTN data compromise. Register watch.getcontrast.io/register/p1-se…

2025 exposed critical weaknesses in global telecom networks.
We will dive into Liminal Panda, Salt Typhoon, SK Telecom key exposure and the MTN data compromise.
Register
 watch.getcontrast.io/register/p1-se…
P1 Security (@p1security) 's Twitter Profile Photo

Critical 5G vulnerabilities taking one or two years to patch. This is the telecom reality. Missing SBOMs mean operators often do not know they are vulnerable. One compromised library can run for months unnoticed. Full webinar watch.getcontrast.io/register/p1-se…

P1 Security (@p1security) 's Twitter Profile Photo

Live at 16:00 CET: TelcoSec Talk plus the first preview of our new tool to map real telco attack surface across RAN, core, IMS, signalling, and more. Join: watch.getcontrast.io/register/p1-se…

Live at 16:00 CET: TelcoSec Talk plus the first preview of our new tool to map real telco attack surface across RAN, core, IMS, signalling, and more. Join: watch.getcontrast.io/register/p1-se…
P1 Security (@p1security) 's Twitter Profile Photo

We released the Telco Attack Surface Matrix to help teams visualise exposure across RAN, Core, IMS, signalling and more. Try it and share your feedback so we can improve it. telcoasm.p1sec.com #telcosec

We released the Telco Attack Surface Matrix to help teams visualise exposure across RAN, Core, IMS, signalling and more. Try it and share your feedback so we can improve it. telcoasm.p1sec.com #telcosec
P1 Security (@p1security) 's Twitter Profile Photo

5G security becomes clear once you map what actually breaks in real pentests. Weak authentication, remote code execution in microservices, privilege escalation in Kubernetes, SSRF and DoS on the SBI all show up again and again. What would you add to the mitigation layer?

5G security becomes clear once you map what actually breaks in real pentests.

Weak authentication, remote code execution in microservices, privilege escalation in Kubernetes, SSRF and DoS on the SBI all show up again and again.

What would you add to the mitigation layer?
P1 Security (@p1security) 's Twitter Profile Photo

Regulatory disclosure changed telecom security. Public incident reporting confirms a hard truth: telecom flaws are actively exploited by persistent attackers targeting critical infrastructure. Full talk: watch.getcontrast.io/register/p1-se…

P1 Security (@p1security) 's Twitter Profile Photo

Reverse engineering is regulated, not a gray area. This paper explains when it is legal across regions and how it applies to telecom security. Read: p1sec.com/white-paper/re…

Reverse engineering is regulated, not a gray area. This paper explains when it is legal across regions and how it applies to telecom security. 
Read: p1sec.com/white-paper/re…
P1 Security (@p1security) 's Twitter Profile Photo

Default passwords are not the debate in 5G. Ownership is. Vendors assume cleanup. Operators assume it is done. That gap leaves real creds live in production. Full talk: watch.getcontrast.io/register/p1-se…

P1 Security (@p1security) 's Twitter Profile Photo

Closing the year with the same priority as always: securing mobile networks at global scale. Wishing everyone a bright, resilient, and secure New Year.

Closing the year with the same priority as always: securing mobile networks at global scale.
Wishing everyone a bright, resilient, and secure New Year.
P1 Security (@p1security) 's Twitter Profile Photo

Telecom security is not about finding risks. It is about explaining them to the business. The Telco Attack Surface Matrix helps MNOs structure exposure and justify security investment. telcoasm.p1sec.com

P1 Security (@p1security) 's Twitter Profile Photo

2025 telecom attacks delivered a clear lesson. The SK Telecom case shows that without basic controls like segmentation, hardening, and detection, impact follows. Full talk: watch.getcontrast.io/register/p1-se…

P1 Security (@p1security) 's Twitter Profile Photo

Most operators arrive at MWC asking how exposed they really are. In 45 minutes we map your attack surface and define a realistic 2026 reduction plan. Meet us: p1sec.com/mwc-2026

Most operators arrive at MWC asking how exposed they really are. In 45 minutes we map your attack surface and define a realistic 2026 reduction plan. Meet us: p1sec.com/mwc-2026
P1 Security (@p1security) 's Twitter Profile Photo

How does physical exposure translate into risk for mobile critical infrastructure, and how can teams reduce it without slowing operations down? Physical to 5G Core Compromise Red team lessons learned + practical takeaways Register: watch.getcontrast.io/register/p1-se…

How does physical exposure translate into risk for mobile critical infrastructure, and how can teams reduce it without slowing operations down?

Physical to 5G Core Compromise
Red team lessons learned + practical takeaways
Register: watch.getcontrast.io/register/p1-se…
P1 Security (@p1security) 's Twitter Profile Photo

Physical access is not “local only”. In many environments it can become a network foothold, then pivot via the management plane, weak segmentation, insecure remote access, or stolen creds until the 5G core is reachable.Register: watch.getcontrast.io/register/p1-se…

Physical access is not “local only”. In many environments it can become a network foothold, then pivot via the management plane, weak segmentation, insecure remote access, or stolen creds until the 5G core is reachable.Register: watch.getcontrast.io/register/p1-se…
P1 Security (@p1security) 's Twitter Profile Photo

Less than a month left until MWC Barcelona 2026. This year is going to be interesting. We have some exciting things lined up, and the team will be on site. Come meet us at Block 5B41, Stand 13. Drop by the booth, or book a meeting in advance: p1sec.com/mwc-2026 #MWC26

Less than a month left until MWC Barcelona 2026.

This year is going to be interesting.

We have some exciting things lined up, and the team will be on site.

Come meet us at Block 5B41, Stand 13.

Drop by the booth, or book a meeting in advance: p1sec.com/mwc-2026 

#MWC26
P1 Security (@p1security) 's Twitter Profile Photo

SMS blasters = high volume spam or fraud. At #MWC2026 in Barcelona, we’re bringing a fun SMS Blaster Detector experiment. Let’s meet: p1sec.com/mwc-2026

SMS blasters = high volume spam or fraud. At #MWC2026 in Barcelona, we’re bringing a fun SMS Blaster Detector experiment. Let’s meet: p1sec.com/mwc-2026