Tag: communications
-
Chinese Hackers Exploit Telecom Networks to Spy on US
Chinese hackers have infiltrated the U.S. court wiretap system, as highlighted by the Wall Street Journal. The hackers compromised the networks of major telecommunications companies, including Verizon Communications, AT&T, and Lumen Technologies. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/chinese-hackers-breach-us-court-wiretap-system/
-
Chinese Group Hacked US Court Wiretap Systems
Chinese hackers have infiltrated the networks of major U.S. broadband providers, gaining access to systems used for court-authorized wiretapping. According to a Reuters report, the attack targeted the networks of Verizon Communications, AT&T, and Lumen Technologies. The breach raises severe concerns about the security of sensitive communications data handled by these companies. Prolonged Access and…
-
Comcast and Truist Bank customers caught up in FBCS data breach
Comcast Cable Communications and Truist Bank have disclosed they were impacted by a data breach at FBCS, and are now informing their respective customers that their data has been compromised. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/comcast-and-truist-bank-customers-caught-up-in-fbcs-data-breach/
-
Google Addresses Critical Baseband Flaws, Strengthens Pixel Defenses
Google recently addressed a flaw within cellular modem vulnerabilities that can pose risk to smartphone users. The cellular baseband is responsible for handling all cellular communications, including LTE, 4G, and 5G connectivity. However, the complexity of this software presents challenges in security hardening, making it an attractive target for malicious actors. First seen on thecyberexpress.com…
-
What Communications Companies Need to Know Before Q-Day
NIST standardized three algorithms for post-quantum cryptography. What does that mean for the information and communications technology (ICT) industry? First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/communications-ict-q-day
-
T-Mobile pays $31.5 million FCC settlement over 4 data breaches
The Federal Communications Commission (FCC) announced a $31.5 million settlement with T-Mobile over multiple data breaches that compromised the personal information of millions of U.S. consumers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/t-mobile-pays-315-million-fcc-settlement-over-4-data-breaches/
-
Cybersecurity Snapshot: NIST Program Probes AI Cyber and Privacy Risks, as U.S. Gov’t Tackles Automotive IoT Threat from Russia, China
Tags: access, ai, attack, breach, business, china, ciso, cloud, communications, compliance, corporate, csf, cyber, cybercrime, cybersecurity, data, defense, detection, encryption, framework, governance, government, guide, Hardware, healthcare, infrastructure, intelligence, Internet, iot, law, linux, microsoft, network, nist, privacy, programming, resilience, risk, russia, sbom, security-incident, software, strategy, supply-chain, technology, threat, tool, training, update, vulnerability, wifi, zero-trustA new NIST program will revise security frameworks like NIST’s CSF as AI risks intensify. Plus, the U.S. may ban cars with Russian and Chinese IoT components. Meanwhile, the CSA adds AI insights to its zero trust guide. And get the latest on cybersecurity budgets, SBOMs and the Ghost cybercrime platform! Dive into six things…
-
Governments Urge Improved Security and Resilience for Undersea Cables
The US, UK, EU and other global partners have called for a global approach to strengthening the security of global communications and data First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/governments-security-undersea/
-
China’s ‘Salt Typhoon’ Cooks Up Cyberattacks on US ISPs
The state-sponsored advanced persistent threat (APT) is going after high-value communications service provider networks in the US, potentially with a dual set of goals. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/chinas-salt-typhoon-cyberattacks-us-isps
-
Exploring the foundations of lattice-based cryptography
Tags: communications, computer, computing, cryptography, data, encryption, government, military, vulnerabilityLattice-based cryptography is a quantum-resistant encryption method that uses complex mathematical lattices, offering security against quantum computing attacks. Unlike traditional encryption methods such as RSA and ECC, which are vulnerable to quantum computers, lattice-based cryptography remains secure due to the computational difficulty of solving lattice problems. It is expected to play a central role in…
-
Quantum Computing: Revolutionizing Cybersecurity Risks and Solutions
Quantum computing revolutionizes various fields, leveraging the unique properties of quantum mechanics. Its impact on cybersecurity, however, presents both significant risks and opportunities. Traditional cryptographic systems, such as RSA and Elliptic Curve Cryptography (ECC), which underpin everything from online transactions to government communications, rely on the complexity of certain mathematical problems. First seen on thecyberexpress.com…
-
International law enforcement operation dismantled criminal communication platform Ghost
An international law enforcement operation infiltrated the encrypted messaging app Ghost, which was widely used by criminals, resulting in the arrest of dozens of individuals. An international law enforcement operation infiltrated the encrypted communications app Ghost, designed for criminal use, leading to numerous arrests. The alleged administrator of the app, Jay Je Yoon Jung (32),…
-
What’s Next for Secure Communication After Exploding Pagers?
No OpSec Measure Is Bulletproof to the Effects of a Corrupted Supply Chain Secure communications in an age of network insecurity has focused mostly on encryption and fears of surveillance tracking. But as this week revealed to the dismay of terrorists and criminals alike, no OpSec measure is bulletproof to the effects of a corrupted…
-
Swiss Post to Strengthen Cybersecurity With Open Systems Buy
Acquisition Set to Boost SASE Protection, Network Connectivity for Swiss Businesses. Swiss Post has signed an agreement to acquire Open Systems, a cybersecurity leader specializing in secure access service edge. The deal, expected to close by late 2024, will expand Swiss Post’s offerings for secure digital communications for public and private organizations across Switzerland. First…
-
Europol takes down “Ghost” encrypted messaging platform used for crime
Europol and law enforcement from nine countries successfully dismantled an encrypted communications platform called “Ghost,” which was used by organized crime such as drug trafficking and money laundering. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/europol-takes-down-ghost-encrypted-messaging-platform-used-for-crime/
-
Police make arrests after hacking Ghost encrypted comms app
An international police operation has penetrated an end-to-end encrypted communications service allegedly used by organised criminals in Australia, Ireland, Sweden and Italy First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366611112/Police-make-arrests-after-hacking-Ghost-encrypted-comms-app
-
GSMA Plans EndEnd Encryption for Cross-Platform RCS Messaging
The GSM Association, the governing body that oversees the development of the Rich Communications Services (RCS) protocol, on Tuesday, said it’s working towards implementing end-to-end encryption (E2EE) to secure messages sent between the Android and iOS ecosystems.”The next major milestone is for the RCS Universal Profile to add important user protections such as interoperable end-to-end…
-
AT&T pays $13 million FCC settlement over 2023 data breach
The Federal Communications Commission (FCC) has reached a $13 million settlement with AT&T to resolve a probe into whether the telecom giant failed to protect customer data after a vendor’s cloud environment was breached three years ago. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/atandt-pays-13-million-fcc-settlement-over-2023-data-breach/
-
House Dem urges FCC to press ahead with disclosure rule around AI in political ads
The top Democrat on the House Administration Committee is signaling “strong support” for the Federal Communications Commission’s ongoing efforts to mandate disclosure of AI use in political ads, emphasizing transparency as essential as lawmakers assess how to regulate the technology in the future. In July, the FCC proposed a new regulation that would require broadcasters…
-
19th August Threat Intelligence Report
The campaign of United States presidential nominee Donald Trump has had its internal communications hacked and leaked, allegedly by an Iranian threat … First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/19th-august-threat-intelligence-report/
-
New Backdoor Used By Iranian State-Sponsored Group
The backdoor is being used for intelligence gathering campaigns against U.S. organizations in the government, communications equipment, oil and gas an… First seen on duo.com Jump to article: duo.com/decipher/new-backdoor-used-by-iranian-state-sponsored-group
-
Telegram Removes Deepfake Videos at South Korea’s Behest
Social Media Platform Deleted 25 Videos South Korean Government Said Showed Crimes. Telegram deleted 25 videos the South Korean Communications Standar… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/telegram-removes-deepfake-videos-at-south-koreas-behest-a-26202
-
Kiteworks captures $456M at a $1B+ valuation to help secure sensitive data
Mark up another unicorn and large funding round for the cybersecurity industry: Kiteworks, a company that builds tools to secure email communications,… First seen on techcrunch.com Jump to article: techcrunch.com/2024/08/14/kiteworks-captures-456m-at-a-1b-valuation-to-help-secure-sensitive-data/
-
Axis Communications launcht 8K-Bullet-Kamera – Detailgenaue Videobilder aus großen Entfernungen
Tags: communicationsFirst seen on security-insider.de Jump to article: www.security-insider.de/detailgenaue-videobilder-aus-grossen-entfernungen-a-db0071e1491e4e17c910290a393fe917/
-
Attackers Steal, Sell AMD’s Internal Communications
Tags: communicationsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/brief/attackers-steal-sell-amds-internal-communications
-
Angreifer können Ciscos VoIP-System Unified Communications Manager lahmlegen
First seen on heise.de Jump to article: www.heise.de/news/Angreifer-koennen-Ciscos-VoIP-System-Unified-Communications-Manager-lahmlegen-9843447.html
-
Zoom Fixes Critical Vulnerabilities Allowing Privilege Escalation
Zoom Video Communications has recently disclosed several critical vulnerabilities affecting its Workplace Apps, SDKs, and Rooms Clients. These vulnera… First seen on gbhackers.com Jump to article: gbhackers.com/zoom-fixes-vulnerabilities/
-
An Overview: Why are SSL/TLS Certificates Getting Revoked?
Tags: communicationsSSL, or Secure Sockets Layer, is a protocol designed to encrypt, secure, and authenticate communications over the Internet. While SSL has been succeed… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/an-overview-why-are-ssl-tls-certificates-getting-revoked/
-
Verizon to pay $16 million in TracFone data breach settlement
Verizon Communications has agreed to a $16,000,000 settlement with the Federal Communications Commission (FCC) in the U.S. concerning three data breac… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/verizon-to-pay-16-million-in-tracfone-data-breach-settlement/