Tag: 5G
-
ZTE, China Unicom Liaoning and Dalian Changhai Airport launch 5G-A ISAC private network to elevate low-altitude security and airport safety
Millimeter-wave ISAC and edge AI create unified sensing-communication capabilities for next-generation low-altitude security First seen on theregister.com Jump to article: www.theregister.com/2025/11/25/zte-launches-5g-a-isac-network/
-
Telecommunications Network Security: Defending Against Nation State APTs with Unified AI Defense
The global telecommunications ecosystem has entered its most dangerous cyber era.As 5G, O RAN, cloud workloads, and massive IoT ecosystems expand, telecom networks have become the number one target for nation-state APTs. Attacks like Salt Typhoon, labeled the worst telecom breach in U.S. history, prove one reality: Traditional enterprise security tools cannot defend networks operating…
-
Telecommunications Network Security: Defending Against Nation State APTs with Unified AI Defense
The global telecommunications ecosystem has entered its most dangerous cyber era.As 5G, O RAN, cloud workloads, and massive IoT ecosystems expand, telecom networks have become the number one target for nation-state APTs. Attacks like Salt Typhoon, labeled the worst telecom breach in U.S. history, prove one reality: Traditional enterprise security tools cannot defend networks operating…
-
Handelsverband Deutschland: Merz will chinesische 6G-Ausrüstung nicht zulassen
Bundeskanzler Friedrich Merz will nach Möglichkeit auch 5G-Ausrüstung durch selbst produzierte Komponenten ersetzen. Bei 6G will er ein Verbot. First seen on golem.de Jump to article: www.golem.de/news/handelsverband-deutschland-merz-will-chinesische-6g-ausruestung-nicht-zulassen-2511-202215.html
-
NDSS 2025 Workshop On Security And Privacy Of Next-Generation Networks (FutureG) 2025, Session 1. Panelists Papers SESSION Opening Remarks, Panel And FutureG 2025 Session 1: AI-Assisted NextG
Tags: 5G, ai, conference, detection, government, Internet, LLM, network, open-source, privacy, vulnerabilityPanelists: Ted K. Woodward, Ph.D. Technical Director for FutureG, OUSD (R&E) Phillip Porras, Program Director, Internet Security Research, SRI Donald McBride, Senior Security Researcher, Bell Laboratories, Nokia This panel aims to bring together various participants and stakeholders from government, industry, and academia to present and discuss recent innovations and explore options to enable recent 5G…
-
NDSS 2025 Workshop On Security And Privacy Of Next-Generation Networks (FutureG) 2025, Session 3 Session 3: Novel Threats In Decentralized NextG And Securing Open RAN
PAPERS Feedback-Guided API Fuzzing of 5G Network Tianchang Yang (Pennsylvania State University), Sathiyajith K S (Pennsylvania State University), Ashwin Senthil Arumugam (Pennsylvania State University), Syed Rafiul Hussain (Pennsylvania State University) Trust or Bust: A Survey of Threats in Decentralized Wireless Networks Hetvi Shastri (University of Massachusetts Amherst), Akanksha Atrey (Nokia Bell Labs), Andre Beck (Nokia…
-
Nato chooses Oracle to secure battlefield communications
Nato has chosen Oracle and Druid to secure private 5G networks for cyber defence, war gaming and research, using Oracle Cloud and edge technology First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632128/Nato-chooses-Oracle-to-secure-battlefield-communications
-
Nato chooses Oracle to secure battlefield communications
Nato has chosen Oracle and Druid to secure private 5G networks for cyber defence, war gaming and research, using Oracle Cloud and edge technology First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366632128/Nato-chooses-Oracle-to-secure-battlefield-communications
-
Cybersecurity in smart cities under scrutiny
Tags: 5G, attack, breach, ciso, control, cyber, cyberattack, cybersecurity, data, detection, governance, government, infrastructure, intelligence, international, iot, monitoring, network, service, strategy, technology, tool, vulnerability, zero-trustEnrique DomÃnguez, Accenture Accenture. En la imagen, Enrique DomÃnguez.Rosa DÃaz Moles, director of public sector at S2GRUPO, also highlights smart cities’ complexity and their resulting cybersecurity issues.The digital transformation of public services involves “an accelerated convergence between IT and OT systems, as well as the massive incorporation of connected IoT devices,” she explains, which gives rise…
-
Cybersecurity in smart cities under scrutiny
Tags: 5G, attack, breach, ciso, control, cyber, cyberattack, cybersecurity, data, detection, governance, government, infrastructure, intelligence, international, iot, monitoring, network, service, strategy, technology, tool, vulnerability, zero-trustEnrique DomÃnguez, Accenture Accenture. En la imagen, Enrique DomÃnguez.Rosa DÃaz Moles, director of public sector at S2GRUPO, also highlights smart cities’ complexity and their resulting cybersecurity issues.The digital transformation of public services involves “an accelerated convergence between IT and OT systems, as well as the massive incorporation of connected IoT devices,” she explains, which gives rise…
-
Cybersecurity in smart cities, under scrutiny
Tags: 5G, attack, breach, ciso, control, cyber, cyberattack, cybersecurity, data, detection, governance, government, infrastructure, intelligence, international, iot, monitoring, network, service, strategy, technology, tool, vulnerability, zero-trustEnrique DomÃnguez, Accenture Accenture. En la imagen, Enrique DomÃnguez.Rosa DÃaz Moles, director of public sector at S2GRUPO, also highlights smart cities’ complexity and their resulting cybersecurity issues.The digital transformation of public services involves “an accelerated convergence between IT and OT systems, as well as the massive incorporation of connected IoT devices,” she explains, which gives rise…
-
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB).The attack, per the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and Design (SUTD), relies on a new open-source software toolkit…
-
Spanien: Telefónica nutzt weiter das Kernnetz von Huawei
Telefónica kümmert sich nicht um den Druck aus den USA und nutzt bei 5G auf seinem Heimatmarkt weiterhin das Kernnetz von Huawei. First seen on golem.de Jump to article: www.golem.de/news/spanien-telefonica-nutzt-weiter-das-kernnetz-von-huawei-2508-199458.html
-
New Sni5Gect Attack Targets 5G to Steal Messages and Inject Payloads
Tags: 5G, attack, communications, cyber, cybersecurity, framework, infrastructure, malicious, technology, vulnerabilityCybersecurity researchers at Singapore University of Technology and Design have unveiled a sophisticated new attack framework calledSNI5GECTthat can intercept 5G communications and inject malicious payloads without requiring a rogue base station. The research demonstrates significant vulnerabilities in the current 5G infrastructure that could allow attackers to crash devices, downgrade connections, and steal user identities from…
-
Boffins say tool can sniff 5G traffic, launch ‘attacks’ without using rogue base stations
Sni5Gect research crew targets sweet spot during device / network handshake pause First seen on theregister.com Jump to article: www.theregister.com/2025/08/18/sni5gect/
-
Wie Telekommunikationsanbieter ihre Cyberrisiken reduzieren
Telekommunikationsunternehmen zählen heute zu den zentralen Akteuren kritischer Infrastrukturen und stehen entsprechend im Fokus von Cyberangriffen. Ihre weit verzweigten Netze, der Betrieb zahlreicher Cloud- und IoT-Dienste sowie die Einführung neuer Technologien wie 5G schaffen ein komplexes Angriffsszenario mit enormem Risiko. Um dieses beherrschbar zu machen, ist ein umfassender Überblick über die eigene Angriffsfläche essenziell. Telekommunikationsanbieter…
-
Top cybersecurity M&A deals for 2025
Tags: 5G, access, ai, api, apple, application-security, attack, automation, awareness, banking, breach, business, ceo, cisco, cloud, compliance, control, crowdstrike, cyber, cybersecurity, data, ddos, defense, detection, edr, email, endpoint, finance, firewall, gitlab, government, group, ibm, identity, incident response, infrastructure, intelligence, leak, microsoft, mitigation, network, password, programming, risk, risk-management, saas, service, software, sophos, strategy, supply-chain, technology, threat, tool, training, vulnerability, waf, zero-trustPalo Alto Networks to buy CyberArk for $25B as identity security takes center stage July 30, 2025: Palo Alto Networks is making what could be its biggest bet yet by agreeing to buy Israeli identity security company CyberArk for around $25 billion. “We envision Identity Security becoming the next major pillar of our multi-platform strategy, complementing our leadership…
-
Check Point Unveils Quantum Spark 2500 Series, Bringing Enterprise-Level Security and Advanced Connectivity to SMBs
Check Point has unveiled the new Quantum Spark 2500 series, a next-generation firewall family designed for small and medium-sized businesses (SMBs) and managed service providers (MSPs). With built-in Wi-Fi 7, 5G, SD-WAN, and AI-powered threat prevention, the 2500 series delivers fast, secure, and resilient connectivity as part of the Check Point Infinity architecture. “The Quantum…
-
Overcoming the Myths About 5G and OT Security
5G OT Security Summit Speakers on Delicate Balance Between Innovation, Cyber Risk. Digital transformation – which now includes a convergence of cloud-based applications, AI and OT systems – introduces new threat vectors particularly as legacy systems struggle to adapt. Speakers at the 5G OT Security Summit discussed cyber defenses and policies and for securing OT…
-
Unified Cyber Standards Are Vital for 5G Resilience
5G OT Security Summit Speakers on Secure Frameworks for Regional Infrastructure. At a time when ASEAN nations are accelerating 5G deployments, cybersecurity leaders at the 5G and OT Security Summit in Malaysia issued a sobering warning: Fragmented regulations and uneven OT readiness threaten to undermine the region’s digital ambitions. First seen on govinfosecurity.com Jump to…
-
Fresh UK postcode tool points out best mobile network in your area
Pick a provider based on how good their local 4G and 5G coverage is First seen on theregister.com Jump to article: www.theregister.com/2025/06/27/ofcoms_postcode_checker_points_out/
-
Private 5G: New Possibilities, and Potential Pitfalls
While ushering in great operational value for organizations, private 5G networks add yet another layer to CISOs’ responsibilities. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/securing-private-5g-networks-new-challenges-for-cisos
-
Unmasking the silent saboteur you didn’t know was running the show
Tags: 5G, access, ai, api, attack, authentication, backup, blockchain, breach, ciso, cloud, compliance, control, cybersecurity, data, defense, endpoint, firewall, firmware, GDPR, governance, Hardware, incident response, iot, ISO-27001, login, malicious, network, nis-2, PCI, service, siem, supply-chain, threat, zero-trustCybersecurity depends on accurate clocks : Your logs are only as valuable as your clocks are accurate. If your servers are out of sync, forget to reconstruct timelines. You’ll spend hours chasing phantom alerts. Event correlation and forensics Your SIEM is only as good as the timestamps it gets. Correlating events across endpoints, firewalls and cloud…
-
Krieg: Nokia und Rheinmetall-Tochter bauen 5G-Militärnetze
Tags: 5GNokia und die Rheinmetall-Tochter Blackned wollen zusammen 5G-Technik für das Schlachtfeld entwickeln. First seen on golem.de Jump to article: www.golem.de/news/krieg-nokia-und-rheinmetall-tochter-bauen-5g-militaernetze-2505-196707.html
-
RSAC 2025: 5G connectivity will force adoption of zero trust
First seen on scworld.com Jump to article: www.scworld.com/news/rsac-2025-5g-connectivity-will-force-adoption-of-zero-trust
-
Private 5G: Sicherheit im industriellen Umfeld im Fokus – NTT DATA und Palo Alto Networks: Zero Trust für Private 5G
First seen on security-insider.de Jump to article: www.security-insider.de/ntt-data-und-palo-alto-networks-zero-trust-fuer-private-5g-a-3e85b5922ba2dbe5d299db885f42a46c/

