Attackers can exploit vulnerabilities in 5G networks to steal subscriber data

Positive Technologies has published its “5G standalone core security assessment”. The report discusses vulnerabilities and threats for subscribers and mobile network operators, which stem from the use of new standalone 5G network cores.

Read more

All mobile operators vulnerable to denial of service and fraud through GTP protocol

Based on the findings gathered by Positive Technologies’ experts testing on mobile networks, a new report highlights the cyber security risks to networks that originate with the GTP protocol – which is used to transmit user data and control traffic on 2G, 3G, and 4G networks. Non-standalone 5G networks are also vulnerable.

Read more

Don’t let software chew a dangerous hole in next generation networks and the IoT

Once deployed, the business of managing mobile networks used to be relatively straightforward. Voice and text had a certain predictability. Special events aside, usage of these two services would take place within a set of parameters that the forward-looking network ops team could estimate with sufficient accuracy to stop problems occurring.

Read more