Security flaws in VoLTE protocol allow an attacker to spoof numbers and track users

The research paper by P1 Security was presented last week in a security conference in France A team of researchers from security firm P1 Security has detailed a list of flaws in the VoLTE protocol that allows an attacker to spoof anyone’s phone number and place phone calls under new identities, …

The Internet is still broken

BGP Hijacking is an actual problem that we need to solve Yesterday i have read a brief but interesting article about BGP Hijacking written by Johannes B. Ullrich, published on SANS ISC InfoSec Forum. About BGP Hijacking i have already written something about, you can read on https://andreafortuna.org/bgp-hijacking-current-state-and-future-developments-d4077c215d12. Essentially, BGP Hijacking …

Online PCAP analysis with PacketTotal

Why using Wireshark? PacketTotal is an online engine for analyzing .pcap files and visualizing the network traffic within, useful for malware analysis and incident response. PacketTotal leverages features of BRO IDS and Suricata to flag malicious/suspicious traffic, display detailed protocol information, and extract artifacts found inside the packet capture. What does PacketTotal …