Wireless Encryption: WPA3 and the Gotchas Every Company Should Know About

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines
Posted on November 18, 2025
Wireless Encryption: WPA3 and the Gotchas Every Company Should Know About

Written by Brian Tant

Raxis Chief Penetration Testing Officer Brian Tant is back with a sequel to his 2020 video about wireless network encryption. WPA3 encryption has been out for a few years, and many organizations have updated their systems.

While WPA3 offers greatly enhanced security in comparison to WPA2 encryption, in his new video, Brian discusses the most common vulnerabilities.

  • Transition Mode, often a default, allows the use of WPA2. While this is great for older devices and systems that are expensive to upgrade, it also means that all the old WPA2 vulnerabilities are still in play.
  • Side-channel attacks, such as Dragonblood attacks, focus on WPA3 itself. While these attacks still require technical know-how to perform, it’s only a matter of time before easier scripts and tools are available.
Wireless Encryption: WPA3 and the Gotchas Every Company Should Know About

Whether your organization is still using WPA2, transitioning to WPA3, or fully converted to WPA3, annual wireless network penetration testing is an important part of every security program, finding faulty configurations and default settings your team may not even know about.

Brian Tant

Brian Tant

Brian brings to Raxis a rich and varied background in Information Technology spanning more than 20 years. Sought after by clients for his unique blend of business acumen and technical prowess, Brian has consistently delivered value to hundreds of organizations spanning the globe throughout his career. Brian is the Chief Penetration Testing Officer for Raxis and currently leads the Raxis Penetration Testing and Social Engineering team.

Search The Exploit Blog

Stay up to date with the latest in penetration testing

Name(Required)
Newsletter(Required)
Do you wish to join our newsletter? We send out emails once a month that cover the latest in cybersecurity news. We do not sell your information to other parties.