top of page
Writer's pictureIn The News

A Roaming Threat to Telecommunications Companies

Written by Jamie Harries and Dan Meyer, Crowdstrike

"Recent findings highlight this cluster’s extensive knowledge of telecommunications protocols, including the emulation of these protocols to facilitate command and control (C2) and utilizing scanning/packet-capture tools to retrieve highly specific information from mobile communication infrastructure, such as subscriber information and call metadata."

Click above for the full article, and remember to check back for more insights from B.K. Gogia himself and others in the industry.



6 views0 comments

Comments


Commenting has been turned off.
bottom of page