<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 7:48 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.telecomdefense.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Telecom Defense Limited Company</title>
		<link><![CDATA[https://www.telecomdefense.com]]></link>
		<description><![CDATA[Keeping mobile networks safe]]></description>
		<lastBuildDate><![CDATA[Tue, 10 Jun 2025 12:42:30 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.telecomdefense.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.telecomdefense.com/defense-against-sms-blaster-attacks/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/defense-against-sms-blaster-attacks/]]></link>
			<title>Defense against SMS blaster attacks</title>
			<pubDate><![CDATA[Tue, 10 Jun 2025 12:42:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/fraud-investigations/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/fraud-investigations/]]></link>
			<title>Fraud investigations</title>
			<pubDate><![CDATA[Tue, 10 Jun 2025 12:33:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/cli-spoofing-test/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/cli-spoofing-test/]]></link>
			<title>Anti CLI Spoofing Test</title>
			<pubDate><![CDATA[Tue, 10 Jun 2025 11:21:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/cloud-based-ss7-firewalls/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/cloud-based-ss7-firewalls/]]></link>
			<title>Cloud-based SS7 firewalls</title>
			<pubDate><![CDATA[Tue, 26 Apr 2016 19:00:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/blog/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sat, 23 Apr 2016 21:35:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2018/07/30/of-the-importance-of-ont-vulnerability-testing/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2018/07/30/of-the-importance-of-ont-vulnerability-testing/]]></link>
			<title>Of the importance of ONT vulnerability testing</title>
			<pubDate><![CDATA[Mon, 30 Jul 2018 03:03:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/signaling-penetration-tests/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/signaling-penetration-tests/]]></link>
			<title>Signaling Penetration Tests</title>
			<pubDate><![CDATA[Fri, 13 Jul 2018 21:39:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/gtp-penetration-test/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/gtp-penetration-test/]]></link>
			<title>GTP penetration test</title>
			<pubDate><![CDATA[Fri, 13 Jul 2018 21:35:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ims-volte-infrastructure-penetration-test/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ims-volte-infrastructure-penetration-test/]]></link>
			<title>IMS / VOLTE infrastructure penetration test</title>
			<pubDate><![CDATA[Fri, 13 Jul 2018 21:34:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/hardware-tests/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/hardware-tests/]]></link>
			<title>Hardware tests</title>
			<pubDate><![CDATA[Fri, 13 Jul 2018 21:31:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ont-hardware-vulnerability-assessment/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ont-hardware-vulnerability-assessment/]]></link>
			<title>ONT hardware vulnerability assessment</title>
			<pubDate><![CDATA[Fri, 13 Jul 2018 21:25:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-intelligence/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-intelligence/]]></link>
			<title>Signaling Intelligence</title>
			<pubDate><![CDATA[Fri, 13 Jul 2018 21:10:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2018/02/14/how-it-vulnerabilities-can-contribute-to-ss7-vulnerability-exposure/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2018/02/14/how-it-vulnerabilities-can-contribute-to-ss7-vulnerability-exposure/]]></link>
			<title>How &#8220;IT&#8221; vulnerabilities can contribute to SS7 vulnerability exposure</title>
			<pubDate><![CDATA[Wed, 14 Feb 2018 21:13:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-penetration-test/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-penetration-test/]]></link>
			<title>SS7 Penetration Test</title>
			<pubDate><![CDATA[Tue, 30 Jan 2018 17:05:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-vulnerabilities/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-vulnerabilities/]]></link>
			<title>SS7 Vulnerabilities</title>
			<pubDate><![CDATA[Tue, 30 Jan 2018 17:05:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Fri, 13 Jul 2018 21:14:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2019/02/05/ss7-based-attacks-still-used-to-to-fraudulently-deplete-bank-accounts/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2019/02/05/ss7-based-attacks-still-used-to-to-fraudulently-deplete-bank-accounts/]]></link>
			<title>SS7-based attacks still used to fraudulently deplete bank accounts</title>
			<pubDate><![CDATA[Mon, 11 Feb 2019 23:06:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-firewalls-2/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-firewalls-2/]]></link>
			<title>Signaling Firewalls</title>
			<pubDate><![CDATA[Tue, 30 Jan 2018 17:03:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/contact-us/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Tue, 23 Jan 2018 17:15:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2018/01/23/the-telecom-defense-limited-company-launches-ss7-cloud-scanner/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2018/01/23/the-telecom-defense-limited-company-launches-ss7-cloud-scanner/]]></link>
			<title>The Telecom Defense Limited Company launches SS7 Cloud Scanner</title>
			<pubDate><![CDATA[Tue, 23 Jan 2018 16:00:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2017/06/14/ss7-access-now-sold-to-the-public-on-tor/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2017/06/14/ss7-access-now-sold-to-the-public-on-tor/]]></link>
			<title>SS7 access now sold to the public on Tor</title>
			<pubDate><![CDATA[Thu, 15 Jun 2017 11:43:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2017/09/19/us-senate-turning-up-the-heat-on-us-mobile-operators-to-secure-ss7-vulnerabilities/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2017/09/19/us-senate-turning-up-the-heat-on-us-mobile-operators-to-secure-ss7-vulnerabilities/]]></link>
			<title>US Senate turning up the heat on US mobile operators to secure SS7 vulnerabilities</title>
			<pubDate><![CDATA[Sun, 14 Jan 2018 03:05:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2017/12/20/security-by-obscurity-not-viable-when-it-comes-to-ss7-vulnerabilities/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2017/12/20/security-by-obscurity-not-viable-when-it-comes-to-ss7-vulnerabilities/]]></link>
			<title>&#8220;Security by obscurity&#8221; not viable when it comes to SS7 vulnerabilities</title>
			<pubDate><![CDATA[Sun, 14 Jan 2018 03:04:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2017/03/14/world-first-ss7-intelligence-report/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2017/03/14/world-first-ss7-intelligence-report/]]></link>
			<title>World-First SS7 Intelligence Report</title>
			<pubDate><![CDATA[Thu, 16 Mar 2017 07:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2017/03/24/fcc-releases-long-awaited-csric-wg10-report-on-ss7-vulnerabilities/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2017/03/24/fcc-releases-long-awaited-csric-wg10-report-on-ss7-vulnerabilities/]]></link>
			<title>FCC releases long awaited CSRIC WG10 report on SS7 vulnerabilities</title>
			<pubDate><![CDATA[Sat, 06 May 2017 17:39:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2017/05/04/first-reported-for-profit-ss7-attacks/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2017/05/04/first-reported-for-profit-ss7-attacks/]]></link>
			<title>First reported for-profit SS7 attacks</title>
			<pubDate><![CDATA[Sat, 06 May 2017 17:36:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-cloud-scanner/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-cloud-scanner/]]></link>
			<title>SS7 Cloud Scanner</title>
			<pubDate><![CDATA[Mon, 22 Jan 2018 19:35:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2017/07/17/google-pushing-users-away-from-insecure-sms-two-factor-authentication/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2017/07/17/google-pushing-users-away-from-insecure-sms-two-factor-authentication/]]></link>
			<title>Google pushing users away from insecure SMS two factor authentication</title>
			<pubDate><![CDATA[Mon, 17 Jul 2017 03:44:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2016/04/23/listening-to-a-congressmans-calls-is-it-real/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2016/04/23/listening-to-a-congressmans-calls-is-it-real/]]></link>
			<title>Listening to a Congressman&#8217;s calls. Is it real?</title>
			<pubDate><![CDATA[Tue, 26 Apr 2016 19:00:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-firewalls/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-firewalls/]]></link>
			<title>On-premise SS7 Firewalls</title>
			<pubDate><![CDATA[Fri, 31 Jan 2020 16:25:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2017/01/26/forward-defense-and-the-telecom-defense-limited-company-sign-regional-strategic-partnership/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2017/01/26/forward-defense-and-the-telecom-defense-limited-company-sign-regional-strategic-partnership/]]></link>
			<title>Forward Defense and The Telecom Defense Limited Company sign regional strategic partnership</title>
			<pubDate><![CDATA[Thu, 26 Jan 2017 18:30:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2016/11/30/worlds-first-independent-certification-for-ss7-firewalls/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2016/11/30/worlds-first-independent-certification-for-ss7-firewalls/]]></link>
			<title>World&#8217;s first independent certification for SS7 firewalls</title>
			<pubDate><![CDATA[Tue, 03 Jan 2017 14:57:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-forensics/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-forensics/]]></link>
			<title>SS7 Forensics</title>
			<pubDate><![CDATA[Thu, 15 Sep 2016 17:23:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/telecom-defense-firewall-certification/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/telecom-defense-firewall-certification/]]></link>
			<title>Telecom Defense firewall certification</title>
			<pubDate><![CDATA[Thu, 03 Nov 2016 15:07:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-traffic-audit/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-traffic-audit/]]></link>
			<title>Malicious SS7 traffic audit</title>
			<pubDate><![CDATA[Sat, 11 Mar 2017 05:07:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2016/05/16/can-an-entire-mobile-network-be-taken-down-via-ss7/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2016/05/16/can-an-entire-mobile-network-be-taken-down-via-ss7/]]></link>
			<title>Can an entire mobile network be taken down via SS7?</title>
			<pubDate><![CDATA[Mon, 16 May 2016 20:36:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/diameter-penetration-test/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/diameter-penetration-test/]]></link>
			<title>Diameter Penetration Test</title>
			<pubDate><![CDATA[Mon, 13 Mar 2017 09:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/2016/10/10/why-a-mobile-network-needs-to-be-retested-for-ss7-vulnerabilities-after-installing-an-ss7-firewall/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/2016/10/10/why-a-mobile-network-needs-to-be-retested-for-ss7-vulnerabilities-after-installing-an-ss7-firewall/]]></link>
			<title>Why a mobile network needs to be retested for SS7 vulnerabilities after installing an SS7 firewall</title>
			<pubDate><![CDATA[Mon, 10 Oct 2016 18:02:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/ss7-intelligence-report/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/ss7-intelligence-report/]]></link>
			<title>SS7 intelligence report</title>
			<pubDate><![CDATA[Fri, 10 Mar 2017 17:21:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/cdma-penetration-test/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/cdma-penetration-test/]]></link>
			<title>CDMA Penetration Test</title>
			<pubDate><![CDATA[Fri, 10 Mar 2017 16:32:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.telecomdefense.com/training-course/]]></guid>
			<link><![CDATA[https://www.telecomdefense.com/training-course/]]></link>
			<title>Training / Course</title>
			<pubDate><![CDATA[Fri, 10 Mar 2017 14:21:10 +0000]]></pubDate>
		</item>
				</channel>
</rss>
