article thumbnail

New GTPDOOR backdoor is designed to target telecom carrier networks

Security Affairs

LightBasin targeted and compromised mobile telephone networks around the globe and used specialized tools to access calling records and text messages from telecommunications companies. CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by since 2019.

article thumbnail

China-linked LightBasin group accessed calling records from telcos worldwide

Security Affairs

A China-linked hacking group, tracked as LightBasin (aka UNC1945 ), hacked mobile telephone networks around the globe and used specialized tools to access calling records and text messages from telecommunications companies. CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by since 2019.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Dow Jones used the pandemic to undergo a zero trust overhaul

SC Magazine

That’s often where most companies start (and a fair amount end) their zero trust journey, but Guerra said they then established a new conditional access and authentication regime for users across the company. Now it’s different. We need to engage our IT workforce and train them to do something different.”.

IoT 70
article thumbnail

China's 'Volt Typhoon' Targeting U.S. Infrastructure, Microsoft Warns

SecureWorld News

According to the Microsoft Threat Intelligence announcement , Volt Typhoon gains initial access to targeted organizations through internet-facing security devices, specifically Fortinet FortiGuard firewalls. Then by using tools present in the environment, they are aiming to remain persistent and evasive.

article thumbnail

Data Loss Prevention for Small and Medium-Sized Businesses

IT Security Guru

Access Controls and Authentication : Implementing strict access controls and multi-factor authentication (MFA) mechanisms can significantly reduce the risk of unauthorised data access. Limiting user privileges to essential functions and regularly reviewing access rights can enhance security. Christos is also a writer for Bora.

article thumbnail

How to Apply the Lessons of 2019 to the Security of 2020

McAfee

From healthcare and insurance to manufacturing and telecommunications, cybercriminals spared no industry from their schemes, with a few key verticals bearing the brunt of this year’s attacks. Lack of Appropriate Authentication/Credentials for Sensitive Data. When reflecting on 2019, it’s clear why that is.

article thumbnail

News alert: Infobip identifies five typical security challenges impacting mobile users

The Last Watchdog

Company also explains its role as a co-guardian of the A2P ecosystem with MNOs, helping protect brands and mobile users with its firewall. That is why we have developed features like data anonymization, where our firewall separates sensitive customer data from the content, so customer’s privacy can’t be compromised.”

Mobile 100