Radix Logo

Radix Security




We make 5G security accessible

5G network technology is incredibly complex, and with the necessary security standards this complexity is even increased. At Radix Security we eliminate the complexity of 5G and we make 5G security accessible instead by providing the proper tools, training and research. We want to empower our customers to create a secure mobile network for the current generation of 5G, 6G and beyond.

5G Network



5G Network

Our Testing Tool

Our testing tool is a software that automates testing vulnerabilities and simulates attacks in a 5G core network.

Advantages

  • User-Friendly and Actionable: An intuitive command line tool designed for users without extensive security expertise.
  • Automation: High levels of automation allow for frequent and quick testing.
  • Compliance: Ensures security compliance with industry standards such as GSMA NESAS and BSI NESAS-CCS-GI.
  • Integration Options: We implement the usual industry use cases
    • CLI: Can be used as a stand-alone command line tool.
    • CI/CD pipeline: Can be integrated into a CI/CD pipeline for continuous testing.
    • Kubernetes: Can be used for regular scanning in a Kubernetes cluster.



Our Training

To counter 5G complexity, we provide training for the necessary 5G security know-how. In seminars or workshops we cover topics like:

  • Motivation for 5G sescurity
  • Attack vectors in public 5G networks and private campus networks
  • 5G security architecture
  • Hands-on security evaluations in practical sessions
  • Bring your own questions and challenges

Get in contact with us for more information.


Laptop



5G Network

Our Research

We push cyber security innovation by engaging in research related to 5G network technology and security.

Recent Projects

  • 5G Downgrade: We uncovered vulnerabilities that allowed downgrading the 5G standard to 2G.
  • ReVoLTE Attack: By reusing the same decryptions on consecutive calls, we discovered a vulnerability in the 5G network that could allow an attacker to eavesdrop on conversations.
  • aLTEr Attack: An active attack can redirect a user directly to malicious sites.