#telecomsecurity

2025-12-02

A medium confidence data breach has targeted a Dutch telecom company, KPN N.V. 🇳🇱 in the Netherlands, within the Network & Telecommunications sector. #DataBreach #TelecomSecurity #CyberThreat

2025-11-29

DoT has clarified that the Telecom Cyber Security (TCS) Amendment Rules 2025 remain active, despite a duplicate Gazette publication being withdrawn.

The updates introduce MNV-based identity validation, enhanced IMEI verification for resold devices, and tighter coordination with TIUEs handling telecom identifiers - all with data-protection guardrails.

Thoughts from the security community on the practical impact?

Source: business-standard.com/industry

Follow @technadu for more vendor-neutral policy and infosec reporting.

#infosec #cybersecurity #telecomsecurity #DoT #DigitalIndia #fraudprevention #policy

DoT withdraws duplicate notice, confirms amended cyber security rules stand
2025-11-28

High confidence initial access attempt detected targeting Poland 🇵🇱 and its National Institute of Telecommunications in the Network & Telecommunications sector. #CyberThreats #TelecomSecurity #ThreatIntel

2025-11-28

High confidence initial access activity detected targeting the national institute of telecommunications in Poland 🇵🇱. The sector involved is Network & Telecommunications. #CyberThreat #Poland #TelecomSecurity

2025-11-22

The FCC has reversed a telecom security measure originally introduced after the Salt Typhoon intrusions.

Supporters cite authority and flexibility concerns; critics warn the shift may weaken protections around lawful intercept systems - longstanding targets of sophisticated threat actors.

đź’¬ Thoughts on whether CALEA needs a modernized, standards-based framework?
👍 Follow @technadu for more infosec insights.

#Infosec #FCC #TelecomSecurity #CALEA #SaltTyphoon #Cybersecurity #CriticalInfrastructure #ThreatIntel #DigitalSafety

FCC votes to reverse telecom security rulemaking issued under Biden
2025-10-30

Ribbon Communications was breached by nation-state hackers who lurked undetected for months—revealing just how deep and stealthy modern cyber espionage can be. How vulnerable is our digital infrastructure?

thedefendopsdiaries.com/inside

#nationstateattack
#cyberespionage
#telecomsecurity
#cyberthreats
#ribboncommunications

2025-10-28

📞 Caller ID spoofing is now industrialized.
Europol urges a unified European framework to stop “spoofing-as-a-service” kits enabling large-scale impersonation scams.

Losses exceed €850M annually, with law enforcement calling for cross-border cooperation and technical standards to trace calls.
Can telecoms realistically close this gap - or do we need new protocols at the network level?

đź’¬ Share your take & follow @technadu for more global cyber policy coverage.

#CyberSecurity #Europol #CallerIDSpoofing #TelecomSecurity #ThreatIntelligence #NetworkDefense #CyberPolicy #InfoSec

Fake number, real damage: Europol urges action against caller ID spoofing
2025-10-17

A global scam network renting out tens of thousands of phone numbers—Europol’s SIMCARTEL bust uncovered glaring telecom vulnerabilities and sparked international teamwork against cybercrime. How will this change our digital world?

thedefendopsdiaries.com/europo

#cybercrime
#europol
#telecomsecurity
#publicprivatepartnership
#infosec
#simbox
#cybersecurity
#lawenforcement
#forensicanalysis

Yonhap Infomax Newsinfomaxkorea
2025-09-18

KT assures markets that no SIM key data was compromised, eliminating concerns over cloned phones and reinforcing confidence in telecom security.

en.infomaxai.com/news/articleV

2025-09-10

Top 5G Security Vulnerabilities: Insights from P1 Security Pentest Activities

From weak authentication to misconfigured core functions, 5G deployments keep revealing new ways attackers can break into critical infrastructure.

Join our 5G Penetration Tester El Mehdi Regragui as he shares exclusive findings from P1 Security’s pentest activities, including:

âś” Real-world vulnerabilities in 5G networks

âś” Lessons learned from offensive security engagements

âś” Key takeaways for operators and vendors to strengthen defenses

Register here: watch.getcontrast.io/register/

#5G #TelecomSecurity #Pentesting #MobileSecurity #Webinar

2025-08-21

Orange Belgium’s cyberattack hit 850,000 accounts and exposed SIM unlock codes—an alarming wake-up call for telecom security. Think your phone data is safe? Discover the full story.

thedefendopsdiaries.com/orange

#cybersecurity
#telecomsecurity
#databreach
#orangecyberattack
#infosectrends

2025-08-18

Weekly output: Ford’s EV strategy, Open RAN security risks, Waymo + Spotify

After a week and a half on the West Coast that began with Black Hat, I can now turn my attention to catching up on the talks I had to skip at that conference, since on-demand video is now available for all but a handful of its sessions. Video of some DEF CON talks is also now starting to pop up, and I’m looking forward in particular to seeing the Voting Village talks that I missed because I bugged out of Vegas Friday afternoon of that week.

Patreon readers got a recap of Black Hat that included some observations about Washington’s wilted presence at this security conference and the generally skeptical take of conference speakers on AI hype.

8/11/2025: Ford Announces $5B Plan to Make EVs Cheaper, Starting With $30,000 Pickup, PCMag

With PCMag’s automotive writer traveling, I stepped in to write this breakdown of the automaker’s ambitious plan to reinvent electric-vehicle production. I hope Ford can deliver on this, and I hope the coming family of cheaper EVs will include a four-door hatchback (even if they call it an SUV or a crossover because it’s a little taller than a sedan).

8/14/2025: Researchers recap some security downsides to open RAN, Light Reading

This Black Hat briefing on Thursday of the previous week about possible vulnerabilites in Open RAN (Radio Access Network) sites went much deeper in the weeds than I usually get when covering telecom infrastructure. So I took an extra couple of days to look over the presentation again, read the reports linked to from it, listen again to my recording of the session, and briefly quiz researchers Tianchang Yang and Kai Tu over e-mail. And then I somehow typed two numbers wrong in the same graf, both of which I’d had correct in my notes. Fortunately, my editor quickly fixed those flubs after Yang brought them to my attention.

8/16/2025: Waymo Picks Up Spotify: Cue Up Personal Playlists on Robotaxi Rides, PCMag

I found out about this change to the Waymo ride experience not from one of that Alphabet subsidiary’s social-media posts, a note from any of its publicists, or an announcement on its site, but from an e-mail I got as a Waymo customer Friday morning. I felt a little bad learning that Waymo had posted this news on four different social platforms Tuesday, but then I realized that earlier news coverage had not mentioned Waymo’s removal of online documentation about an older, jankier way to play music from your phone through a Waymo robotaxi’s speakers.

#5G #BlackHat #correction #electricCars #electricVehicles #EVs #Ford #OpenRAN #robotaxi #Spotify #streamingMusic #telecomSecurity #Waymo

2025-08-15

One of the talks you can’t miss at #OrangeCon2025: KPN ethical hackers Sebastiaan Groot & Frank Cozijnsen reveal how they discovered a remote code execution (RCE) vulnerability in a standard Steering of Roaming system and how they creatively turned it into two-way communication across networks.

Check out the full schedule and get your tickets: orangecon.nl/#schedule

#OrangeCon2025 #Cybersecurity #TelecomSecurity #RCE #EthicalHacking

2025-08-06

📡 IMS and SIP: The Brains Behind Telecom Services — and Prime Targets for Attackers

Modern telecom systems rely heavily on IMS and SIP to deliver multimedia services across prepaid and postpaid platforms. But with great flexibility comes major exposure:

⚠️ SIP spoofing, session hijacking

⚠️ IMS DoS and third-party app vulnerabilities

⚠️ Weak authentication and interception risks

In our blog post, we break down:

🔍 How IMS and SIP actually work

🔍 Where the most critical vulnerabilities lie

🔍 How telcos can reinforce their infrastructure — both technically and operationally

đź”— Read the full article here:

đź’ˇ Want to go deeper? Our TS-250 training helps security teams and operators master IMS vulnerabilities: online-training.p1sec.com/cour

#TelecomSecurity #IMS #SIP #VoLTE #MobileNetworkSecurity #P1Security #VulnerabilityManagement #TS250 #Training #5G #Diameter #Smishing #SessionHijacking

2025-07-23

🚨 Why Responsible Disclosure in Telecom Still Fails – And How P1 Security Acts

Many telco vulnerabilities never make it into public CVEs. Vendors delay, ignore, or quietly patch—without alerting operators. Meanwhile, critical infrastructure stays exposed.

At P1 Security, our process doesn’t wait in silence:

🔍 We research, pen-test, and notify both clients and vendors
⏳ We follow a 180-day disclosure window (double the standard)
đź§  When vendors remain silent, we document and publish responsibly in our Vulnerability Knowledge Base
📣 Clients are always informed and can assess their risk

Transparency isn’t optional in telecom—it’s a necessity.

đź”— p1sec.com/blog/responsible-vul

#TelecomSecurity #ResponsibleDisclosure #CVE #VulnerabilityResearch #P1Security #VKB

2025-07-17

🎥 What is O-RAN, really?

O-RAN isn't just a buzzword — it's a structural shift in how we build radio access networks.

By moving away from proprietary, locked-in systems and toward open, cloud-native architectures, operators gain flexibility… but also inherit new risks.

At the beginning of this analysis, we lay the groundwork — defining what O-RAN is before unpacking the security implications throughout the session.

▶️ Watch the full webinar for the complete breakdown: app.getcontrast.io/register/p1

#ORAN #TelecomSecurity #5GSecurity #MobileNetworks #NetworkSecurity #CRAN #OpenRAN #TelcoSec #TelecomTransformation #CyberSecurity #P1Security

2025-06-05

Vodafone just got hit with a €51M fine over bogus contracts by shady partner agencies. How deep do these security breaches really go—and what does it mean for your data?

thedefendopsdiaries.com/vodafo

#vodafone
#databreach
#telecomsecurity
#gdprcompliance
#cybersecurity

2025-05-20

SK Telecom fell victim to a silent three-year cyberattack that exposed millions of users—thanks to a single web shell. How did such a massive breach slip by for so long, and what does it mean for our data security?

thedefendopsdiaries.com/unders

#sktelecombreach
#cybersecurity
#databreach
#infosec
#telecomsecurity

2025-05-19

O2 UK's VoLTE and WiFi Calling security breach could let hackers intercept your call data and track your location. How safe are your conversations? Dive into the details now.

thedefendopsdiaries.com/securi

#volte
#wifi-calling
#telecomsecurity
#encryptionflaw
#userprivacy

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst