article thumbnail

Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers

Security Affairs

Russia-linked APT group Sandworm has hacked eleven telecommunication service providers in Ukraine between since May 2023. The Russia-linked APT group Sandworm (UAC-0165) has compromised eleven telecommunication service providers in Ukraine between May and September 2023, reported the Ukraine’s Computer Emergency Response Team (CERT-UA).

article thumbnail

Key benefits of iSIM technology for enabling secure connectivity

CyberSecurity Insiders

With devices needing SIMs to authenticate them for mobile networks, advances in SIM technology will be critical f or the expansion of the connected world in years to come. . The integrated SIM (iSIM) provides a secure way of authenticating devices with the same security and convenience as the eSIM. ThalesDigiSec ! .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Did Someone at the Commerce Dept. Find a SolarWinds Backdoor in Aug. 2020?

Krebs on Security

An analysis of the malicious file and other submissions by the same VirusTotal user suggest the account that initially flagged the backdoor as suspicious belongs to IT personnel at the National Telecommunications and Information Administration (NTIA), a division of the U.S. Both Microsoft and FireEye published blog posts on Mar.

article thumbnail

The Upcoming UK Telecoms (Security) Act Part One: What, Why, Who, When and How

Cisco Security

In November 2020, the Telecommunications (Security) Bill was formally introduced to the UK’s House of Commons by the department for Digital, Culture, Media & Sport. What is the Telecommunications (Security) Act? Why has the Telecommunications (Security) Act been introduced?

article thumbnail

Best Facial Recognition Software for Enterprises In 2022

eSecurity Planet

The technology isn’t yet perfect, but it has evolved to a point that enterprise use is growing. The application of facial recognition technology in operations was primarily in law enforcement organizations until the last decade, when a massive advance in AI and deep learning allowed it to be more broadly applied.

Software 122
article thumbnail

News alert: SandboxAQ launches new open source framework to simplify cryptography management

The Last Watchdog

With an intuitive, unified API, Sandwich empowers developers to embed the cryptographic algorithms of their choice directly into their applications and to change them as technologies and threats evolve – without rewriting code. Air Force, the Defense Information Systems Agency (DISA), the U.S.

article thumbnail

Thales collaborates with Hewlett Packard Enterprise to Enhance 5G Subscriber Privacy and Security

Thales Cloud Protection & Licensing

Thales collaborates with Hewlett Packard Enterprise (HPE) to provide enhanced privacy and secure authentication for global 5G users, further extending its partner ecosystem. The multi-vendor landscape, complex infrastructure and distributed nature of 5G networks has historically made subscriber authentication and privacy a challenge.