Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Telecoms

Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector

On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus state-sponsored actor that CrowdStrike Counter Adversary Operations tracks as LIMINAL PANDA.

Telcos Evolving in a SASE-driven World

This blog is part of the ongoing “I&O Perspectives” series, which features insights from industry experts about the impact of current threats, networking, and other cybersecurity trends. In the previous blogs of this series, we explored how the internet has evolved into a primary channel for corporate business traffic and how secure access service edge (SASE) has become the foundational security pillar of this new framework.

The Importance of Security Culture: When Telecom Giants Resort to Malware

I recently read a story about a South Korean telecom company that pushed out malware to over 600,000 of its customers who were using torrents to share files, in a bid to limit their file-sharing capabilities. Users reported that their files went missing, random folders appeared, and in some cases, their PCs were disabled.

Solving telecom network security challenges with Defensics

The telecommunications industry has undergone tremendous changes in recent years. From the days when consumers could only make and receive voice calls on a landline to the broadband internet era in which people use data and stream videos on the go, telecom networks constitute an important backbone of the national economy. Telecom networks have evolved from 3G to 4G and 5G technologies.

TSSR: Protecting Australian Telecos Against Cyber Threats

The telecommunications sector provides critical infrastructure for many countries, enabling the exchange of information across various industries. Due to the widespread use of digital information in telecommunications, the sector has become a prime target for cyber threats from hackers, state actors, and cyber criminals. In 2023, telecommunications experienced higher credential stuffing rates than other sections, according to F5.
Featured Post

How Telecommunications Providers Can Best Tackle DDoS Attacks

The UK's 2023 National Risk Register, published by the government in the summer, highlights the increasing cyberthreat posed to telecommunications providers who are a vital part of the communications critical national infrastructure (CNI) sector. The report lays out the volatile landscape these providers operate in and the government's acknowledgement of the seriousness of cyber threats to telecommunications infrastructure. It also details the difficulty in implementing the Telecommunications (Security) Act 2021, which establishes guidelines for telcos to follow.

Data Modernisation in Telecom: From Reactive Protection to Proactive Opportunity

In our last blog, we discussed the many challenges faced by telecom organisations in this ever-changing regulatory and technical landscape. While it is clear to see the challenges the industry faces in this digital world, there’s also a unique opportunity to solve the many problems that hold them back.

Balancing Data Privacy, Regulations and Revenue in Telecom

The need to find the balance between providing a unique and tailored customer experience, ensuring data privacy, and adhering to market regulations has become more critical than ever for Communications Service Providers (CSPs). In a world where customers are more demanding, regulations are more stringent, and attacks are more sophisticated, it’s easy to see how telecom organisations deem balancing act challenging.