article thumbnail

Alleged China-Tied Hackers Are Targeting Telecommunications Sector

SecureWorld News

Since 2016, this cybercrime organization has been building customized tools to invade the world's telecommunications sector. According to the blog, at least 13 telecommunications companies have been breached by LightBasin since 2019. LightBasin hacks critical infrastructure with intention and competence.

article thumbnail

How to combat insider threats as organisations increasingly rely on cloud computing to telecommunicate

CTOvision

Read why Matt Middleton-Leal says that it is difficult to combat insider threats as more and more business communications are using cloud on Tech Radar : Cloud providers including Microsoft, Google, and others, have recently acknowledged that they are struggling to deal with a spike in remote tools usage.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Configuration as code: securing the cloud

TM Forum

The great migration to the cloud has created lucrative opportunities for telecommunications companies to generate revenue. In addition to creating revenue opportunities, the cloud has provided a modern approach for telecommunications companies to empower their workforces to work remotely. The first is by using open-source tooling.

Cloud 130
article thumbnail

The Increasing Demand for Telecoms During a Pandemic

Spearline Testing

“The demand for telecommunications services during the COVID-19 pandemic, for both business continuity and personal reasons, has never been greater.” Network providers adjusted to the increasing customer demand, prompting the Chinese government to label telecommunications an essential service.

article thumbnail

TM Forum's Open APIs win IT industry awards

TM Forum

The Forum’s Open Application Programming Interfaces (API) Tooling IT Team took away a prize from both sets of judges. It won a gold award in the IT Team of the Year category in the Stevies and a gold award for Technology Department of the Year category 2022 from Best in Biz.

Industry 130
article thumbnail

Part 1: Guarding against sophisticated threats: Strategies for your best defense

CIO Business Intelligence

This formidable threat group poses significant challenges to telecommunications, technology and software automation industries. Muddled Libra employs legitimate persistence tools from trusted vendors to fly under the radar to target firms with access to high-value cryptocurrency holders.

Strategy 119
article thumbnail

Verizon accelerates 5G rollouts with automation platform

CIO Business Intelligence

Network Alpha Factory’s job is to facilitate the seamless movement of all kinds of traffic from older, slower networks to newer, high-efficiency networks, he says, adding that the tool is compatible with all legacy Verizon networks and can be used to migrate to edge networks as well.