Telecom operators and cloud providers are pitching a vision in which networks stop being passive pipes and become agentic, autonomous systems that sense, reason and act — promising faster service delivery, lower costs and new revenue streams, but also introducing fresh security, governance and...
China-linked state actors have spent the last several years systematically compromising backbone and edge networking equipment — from provider-edge routers to customer-facing devices — to build a global espionage capability that steals subscriber metadata, intercepts authentication traffic, and...
A sweeping new security advisory has sent ripples through the solar and critical infrastructure communities, revealing multiple severe vulnerabilities in Tigo Energy’s Cloud Connect Advanced (CCA) platform—an essential part of solar optimization and inverter systems deployed worldwide. With a...
In April 2025, SK Telecom, South Korea's largest mobile telecommunications provider, faced an unprecedented cyberattack that compromised the Universal Subscriber Identity Module (USIM) data of approximately 25 million customers. This breach not only exposed sensitive subscriber information but...
cyber defense
cyberattack
cybercrime
cybersecurity
data breach
data leakage
digital security
identity theft
mobile security
political and regulatory response
privacy
security breach
sim card
sk telecomtelecom industry
telecomsecuritytelecommunications
usim hacking
usim security
Original release date: October 14, 2016 | Last revised: November 30, 2016
Systems Affected
Internet of Things (IoT)—an emerging network of devices (e.g., printers, routers, video cameras, smart TVs) that connect to one another via the Internet, often automatically sending and receiving data...