article thumbnail

New GTPDOOR backdoor is designed to target telecom carrier networks

Security Affairs

LightBasin targeted and compromised mobile telephone networks around the globe and used specialized tools to access calling records and text messages from telecommunications companies. CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by since 2019.

article thumbnail

Thales collaborates with Hewlett Packard Enterprise to Enhance 5G Subscriber Privacy and Security

Thales Cloud Protection & Licensing

Subscriber authentication and privacy are among the most critical data in telecommunication networks. With the arrival of 5G and the evolution to cloud architectures, managing subscriber data and services efficiently is essential to ensuring an operator’s business profitability. To learn more about Thales Luna 7 HSM, visit [link].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

MORPHEUS chip: unhackable because of 'encryption churn'? Austin calls this encryption churn and says it prevents reverse engineering, which sophisticated hackers sometimes use. Undefined semantics are nooks and crannies of the computing architecture—for example the location, format, and content of program code.

CISO 127
article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

Encryption uses mathematical algorithms to transform and encode data so that only authorized parties can access it. What Encryption Is and How It Relates to Cryptology The science of cryptography studies codes, how to create them, and how to solve them. How Does Encryption Process Data? How Does Encryption Process Data?

article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

However, simple actions like adopting multi-factor authentication (MFA) or encrypting sensitive data everywhere should be exercised throughout the year and not just during that month. The threat of attacks against Critical National Infrastructure (CNI) – energy, utilities, telecommunications, and transportation – is a top priority.

article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

This expansion and significant architectural changes will create highly complex networks, exposing new vulnerabilities and more significant risks as we move towards a post-quantum (PQ) world. Quantum computers could break cryptographic algorithms, posing a significant threat to modern telecommunications networks.

Mobile 71
article thumbnail

DePriMon downloader uses a never seen installation technique

Security Affairs

The group is very sophisticated and used zero-day exploits and complex malware to conduct targeted attacks against governments and organizations in almost every industry, including financial, energy, telecommunications, and education, aerospace. The second stage installs itself and loads the third stage using an encrypted, hardcoded path.

Malware 103