article thumbnail

T-Mobile is one of the victims of the massive Chinese breach of telecom firms

Security Affairs

“The US government’s continued investigation into the People’s Republic of China (PRC) targeting of commercial telecommunications infrastructure has revealed a broad and significant cyber espionage campaign.” The Chinese APT focuses on government entities and telecommunications companies in Southeast Asia.

Mobile 113
article thumbnail

News alert: CyTwist launches threat detection engine tuned to identify AI-driven malware in minutes

The Last Watchdog

The cybersecurity landscape is evolving as attackers harness the power of artificial intelligence (AI) to develop advanced and evasive threats. Advanced detection CyTwist recently demonstrated its advanced detection capabilities during a red team simulation with a major telecommunications provider.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canadian Man Arrested in Snowflake Data Extortions

Krebs on Security

.” Sources involved in the investigation said UNC5537 has focused on hacking into telecommunications companies around the world. Allison Nixon is chief research officer with the New York-based cybersecurity firm Unit 221B.

article thumbnail

GUEST ESSAY: How to secure ‘Digital Twins’ to optimize asset use, while reducing exposures

The Last Watchdog

Related: The coming of a ‘bio digital twin” Over the last decade, we have seen the introduction of 4G and 5G telecommunication service, the iPad, Instagram, and the introduction, acceptance, and adoption of cloud services from Microsoft, Google, and Amazon, as well as cloud computing.

article thumbnail

Security Affairs newsletter Round 511 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Microsoft Windows, Zyxel device flaws to its Known Exploited Vulnerabilities catalog Microsoft Patch Tuesday security updates for February 2025 ficed 2 actively exploited bugs Hacking Attackers exploit a new zero-day to hijack Fortinet firewalls Security OpenSSL patched high-severity flaw CVE-2024-12797 Progress Software fixed multiple high-severity (..)

Spyware 70
article thumbnail

U.S. CISA Goes Global with First International Strategic Plan

SecureWorld News

These interconnections and interdependencies span the full range of critical infrastructure sectors: pipelines, telecommunications, and essential supply chains, among others. CISA took a pioneering step in the realm of artificial intelligence and cybersecurity by appointing its first Chief Artificial Intelligence Officer , Lisa Einstein.

article thumbnail

3 Percent ($30B) of U.S. Military Funding Dedicated to Cybersecurity

SecureWorld News

Key cybersecurity provisions Securing communications networks Five billion dollars is allocated to help local telecommunications providers replace potentially insecure Chinese technology (e.g., Huawei and ZTE equipment ). This includes covering a $3 billion shortfall from previous efforts.