Researchers said it’s the first-ever mapping of attack traffic to mobile operator signalling infrastructure.
First seen on cyberscoop.com
Jump to article: cyberscoop.com/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-telecom-vulnerabilities/
![]()

