article thumbnail

China-linked LightBasin group accessed calling records from telcos worldwide

Security Affairs

A China-linked hacking group, tracked as LightBasin (aka UNC1945 ), hacked mobile telephone networks around the globe and used specialized tools to access calling records and text messages from telecommunications companies. CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by since 2019.

article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

History of MSSPs As internet service providers (ISPs) and telecommunications companies (telecoms) began offering commercial access to the internet in the late 1990s, they began to also offer firewall appliances and associated managed services. and then monitors the endpoint alerts to respond to detected threats. Outsourcing U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What are Common Types of Social Engineering Attacks?

eSecurity Planet

Vishing attacks are also similar to phishing and smishing, but these attacks target VoIP and telecommunications services rather than text-based mediums. Usually this is accomplished either by deploying malware that changes the target computer’s host files, or by using a technique known as DNS cache poisoning.

article thumbnail

How to Stop DDoS Attacks: Prevention & Response

eSecurity Planet

For example, the 2016 DDoS attack on the Dyn managed domain name service (DNS) caused the DNS service to fail to respond to legitimate DNS inquiries and effectively shut down major sites such as PayPal, Spotify, Twitter, Yelp, and many others. Also read: How to Secure DNS. Types of DDoS Attacks. Harden infrastructure.

DDOS 145
article thumbnail

Best Network Monitoring Tools for 2022

eSecurity Planet

The ManageEngine OpManager Plus includes a bundle of tools for bandwidth and traffic analysis (NetFlow Analyzer), networking performance monitoring (OpManager), and tools for firewalls , IP addresses, switch ports, and configuration policies. Catchpoint Features. Read more : Best Identity and Access Management (IAM) Solutions for 2022.

Marketing 120
article thumbnail

Guarding Against Solorigate TTPs

eSecurity Planet

Amending firewall rules to allow sensitive, outgoing protocols. The National Telecommunications and Information Administration (NTIA) offers the concept of a Software Bill of Materials (SBOM) to address this problem. Mail DNS controls. These included: Avoiding any share indicators for each compromised host. Encryption.

article thumbnail

DDoS attacks in Q4 2020

SecureList

The DTLS (Datagram Transport Layer Security) protocol is used to establish secure connections over UDP, through which most DNS queries, as well as audio and video traffic, are sent. In October, telecommunications firm Telenor Norway was another to fall victim. Extortionists’ activity regularly made the news throughout 2020.

DDOS 129