article thumbnail

T-Mobile is one of the victims of the massive Chinese breach of telecom firms

Security Affairs

“The US government’s continued investigation into the People’s Republic of China (PRC) targeting of commercial telecommunications infrastructure has revealed a broad and significant cyber espionage campaign.” The Chinese APT focuses on government entities and telecommunications companies in Southeast Asia.

Mobile 113
article thumbnail

News alert: CyTwist launches threat detection engine tuned to identify AI-driven malware in minutes

The Last Watchdog

The cybersecurity landscape is evolving as attackers harness the power of artificial intelligence (AI) to develop advanced and evasive threats. Advanced detection CyTwist recently demonstrated its advanced detection capabilities during a red team simulation with a major telecommunications provider.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How to secure ‘Digital Twins’ to optimize asset use, while reducing exposures

The Last Watchdog

Related: The coming of a ‘bio digital twin” Over the last decade, we have seen the introduction of 4G and 5G telecommunication service, the iPad, Instagram, and the introduction, acceptance, and adoption of cloud services from Microsoft, Google, and Amazon, as well as cloud computing.

article thumbnail

Security Affairs newsletter Round 511 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Microsoft Windows, Zyxel device flaws to its Known Exploited Vulnerabilities catalog Microsoft Patch Tuesday security updates for February 2025 ficed 2 actively exploited bugs Hacking Attackers exploit a new zero-day to hijack Fortinet firewalls Security OpenSSL patched high-severity flaw CVE-2024-12797 Progress Software fixed multiple high-severity (..)

Spyware 70
article thumbnail

U.S. CISA Goes Global with First International Strategic Plan

SecureWorld News

These interconnections and interdependencies span the full range of critical infrastructure sectors: pipelines, telecommunications, and essential supply chains, among others. CISA took a pioneering step in the realm of artificial intelligence and cybersecurity by appointing its first Chief Artificial Intelligence Officer , Lisa Einstein.

article thumbnail

FCC Enacts Rules Against SIM Swapping to Protect Mobile Phone Users

SecureWorld News

These rules mark a significant step towards creating a more secure telecommunications environment and protecting consumer privacy. The FCC is not only focused on current threats but is also actively considering future challenges, as evidenced by an inquiry into the impact of artificial intelligence on robocalls and robotexts.

Mobile 109
article thumbnail

China Says U.S. Hacking Huawei Since 2009

SecureWorld News

are currently engaged in a fierce battle for technological supremacy, particularly in the rapidly advancing field of artificial intelligence. At the forefront of this rivalry stands Huawei, a prominent Chinese telecommunications company.

Hacking 104